Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
45,093
12,541,488,676
IssuesEvent
2020-06-05 12:26:48
NREL/EnergyPlus
https://api.github.com/repos/NREL/EnergyPlus
closed
Surface Convection Algorithm AdaptiveModelSelections is not truncatable.
Defect
Issue overview -------------- The SurfaceConvectionAlgorithm:(Inside/Outside):AdaptiveModelSelections algorithm selection cannot be truncated even though all the inputs have a default defined in the idd. The expected behavior here would be that the user can input: " SurfaceConvectionAlgorithm:Inside:AdaptiveModelSelections, Default Algorithm; !- Name" into their idf and expect to get all default algorithm selections. However, a ',' must be input for each field for this object in order to get default values. ### Details - Platform: All - Version of EnergyPlus: 9.3 ### Checklist Add to this list or remove from it as applicable. This is a simple templated set of guidelines. - [ ] Defect file added (list location of defect file here) - [ ] Ticket added to Pivotal for defect (development team task) - [ ] Pull request created (the pull request will have additional tasks related to reviewing changes that fix this defect)
1.0
Surface Convection Algorithm AdaptiveModelSelections is not truncatable. - Issue overview -------------- The SurfaceConvectionAlgorithm:(Inside/Outside):AdaptiveModelSelections algorithm selection cannot be truncated even though all the inputs have a default defined in the idd. The expected behavior here would be that the user can input: " SurfaceConvectionAlgorithm:Inside:AdaptiveModelSelections, Default Algorithm; !- Name" into their idf and expect to get all default algorithm selections. However, a ',' must be input for each field for this object in order to get default values. ### Details - Platform: All - Version of EnergyPlus: 9.3 ### Checklist Add to this list or remove from it as applicable. This is a simple templated set of guidelines. - [ ] Defect file added (list location of defect file here) - [ ] Ticket added to Pivotal for defect (development team task) - [ ] Pull request created (the pull request will have additional tasks related to reviewing changes that fix this defect)
non_priority
surface convection algorithm adaptivemodelselections is not truncatable issue overview the surfaceconvectionalgorithm inside outside adaptivemodelselections algorithm selection cannot be truncated even though all the inputs have a default defined in the idd the expected behavior here would be that the user can input surfaceconvectionalgorithm inside adaptivemodelselections default algorithm name into their idf and expect to get all default algorithm selections however a must be input for each field for this object in order to get default values details platform all version of energyplus checklist add to this list or remove from it as applicable this is a simple templated set of guidelines defect file added list location of defect file here ticket added to pivotal for defect development team task pull request created the pull request will have additional tasks related to reviewing changes that fix this defect
0
27,473
7,968,752,817
IssuesEvent
2018-07-16 05:48:10
hashicorp/packer
https://api.github.com/repos/hashicorp/packer
closed
vmware-iso: ESXi - ssh times out
builder/vmware-esxi need-more-info question waiting-reply
Hi Team, While using the packer to convert OVA to AMI it stuck always at below "opening new ssh session"(this is happening on the latest version of packer). The same script used to work for a long time and started failing suddenly on a few occurrences(When running the old packer version). debug level logs: https://gist.github.com/harshchauhan1988/c1ba804aef94874f8af2654b58818907 Script used: https://gist.github.com/harshchauhan1988/2e53a62ad741290bed640cd21976ff0b Can you please take a look by simulating this issue? This is hampering build automation for a long time.
1.0
vmware-iso: ESXi - ssh times out - Hi Team, While using the packer to convert OVA to AMI it stuck always at below "opening new ssh session"(this is happening on the latest version of packer). The same script used to work for a long time and started failing suddenly on a few occurrences(When running the old packer version). debug level logs: https://gist.github.com/harshchauhan1988/c1ba804aef94874f8af2654b58818907 Script used: https://gist.github.com/harshchauhan1988/2e53a62ad741290bed640cd21976ff0b Can you please take a look by simulating this issue? This is hampering build automation for a long time.
non_priority
vmware iso esxi ssh times out hi team while using the packer to convert ova to ami it stuck always at below opening new ssh session this is happening on the latest version of packer the same script used to work for a long time and started failing suddenly on a few occurrences when running the old packer version debug level logs script used can you please take a look by simulating this issue this is hampering build automation for a long time
0
180,217
14,742,322,467
IssuesEvent
2021-01-07 12:05:37
eclipse/capella
https://api.github.com/repos/eclipse/capella
closed
Add release note and update some sections in the documentation
documentation normal
Add release note and update some sections in the documentation `🆔 ECLIPSE-564346` `👷 minh.tu.ton.that` `📅 2020-06-16` `🔎 1.4.1`
1.0
Add release note and update some sections in the documentation - Add release note and update some sections in the documentation `🆔 ECLIPSE-564346` `👷 minh.tu.ton.that` `📅 2020-06-16` `🔎 1.4.1`
non_priority
add release note and update some sections in the documentation add release note and update some sections in the documentation 🆔 eclipse 👷 minh tu ton that 📅 🔎
0
111,381
11,731,062,952
IssuesEvent
2020-03-10 22:56:47
admin341/INSTA341
https://api.github.com/repos/admin341/INSTA341
opened
Rewrite acceptance tests for Core + Additional features
documentation
Made format error in sprint #3 and need acceptance tests for additional features for the final fourth sprint.
1.0
Rewrite acceptance tests for Core + Additional features - Made format error in sprint #3 and need acceptance tests for additional features for the final fourth sprint.
non_priority
rewrite acceptance tests for core additional features made format error in sprint and need acceptance tests for additional features for the final fourth sprint
0
133,126
12,532,668,424
IssuesEvent
2020-06-04 16:18:00
microsoft/BotFramework-Composer
https://api.github.com/repos/microsoft/BotFramework-Composer
closed
Docs: Publish to Azure Functions
Needs-triage Type: Documentation Type: Enhancement
The [docs pages on how to publish a bot to Azure](https://docs.microsoft.com/en-us/composer/how-to-publish-bot#create-azure-resources) are well written, but mostly with only Azure Web App publishing in mind. Please include in the docs pages that parameter `-customArmTemplate` with value `DeploymentTemplates/function-template-with-preexisting-rg.json` is required in the 'node provisionComposer.js' command to deploy the bot to Azure Functions. Since the Composer UI still allows to create a publishing profile to publish to Azure Functions (even though the node provisionComposer.js, as listed in the docs, deployed the Azure WebApp Services), it took me quite some time to figure out why I was not seeing an Azure Function appear in Azure after publishing via the Azure Functions publishing profile. Ultimately the option to create a publishing profile should be related to the type of Azure Services deployed via the node command, and it should not allow me to choose a publishing profile that doesn't match the Azure Services deployed. Better even would be if the publishing profile could run the node provisionComposer.js automatically from within Composer. That way the correct Azure Services would be deployed based on the user's choice in the Composer UI. ![image](https://user-images.githubusercontent.com/23324404/83463023-1b9ebd80-a46d-11ea-964e-37a754cf1ac1.png)
1.0
Docs: Publish to Azure Functions - The [docs pages on how to publish a bot to Azure](https://docs.microsoft.com/en-us/composer/how-to-publish-bot#create-azure-resources) are well written, but mostly with only Azure Web App publishing in mind. Please include in the docs pages that parameter `-customArmTemplate` with value `DeploymentTemplates/function-template-with-preexisting-rg.json` is required in the 'node provisionComposer.js' command to deploy the bot to Azure Functions. Since the Composer UI still allows to create a publishing profile to publish to Azure Functions (even though the node provisionComposer.js, as listed in the docs, deployed the Azure WebApp Services), it took me quite some time to figure out why I was not seeing an Azure Function appear in Azure after publishing via the Azure Functions publishing profile. Ultimately the option to create a publishing profile should be related to the type of Azure Services deployed via the node command, and it should not allow me to choose a publishing profile that doesn't match the Azure Services deployed. Better even would be if the publishing profile could run the node provisionComposer.js automatically from within Composer. That way the correct Azure Services would be deployed based on the user's choice in the Composer UI. ![image](https://user-images.githubusercontent.com/23324404/83463023-1b9ebd80-a46d-11ea-964e-37a754cf1ac1.png)
non_priority
docs publish to azure functions the are well written but mostly with only azure web app publishing in mind please include in the docs pages that parameter customarmtemplate with value deploymenttemplates function template with preexisting rg json is required in the node provisioncomposer js command to deploy the bot to azure functions since the composer ui still allows to create a publishing profile to publish to azure functions even though the node provisioncomposer js as listed in the docs deployed the azure webapp services it took me quite some time to figure out why i was not seeing an azure function appear in azure after publishing via the azure functions publishing profile ultimately the option to create a publishing profile should be related to the type of azure services deployed via the node command and it should not allow me to choose a publishing profile that doesn t match the azure services deployed better even would be if the publishing profile could run the node provisioncomposer js automatically from within composer that way the correct azure services would be deployed based on the user s choice in the composer ui
0
143,388
13,062,206,593
IssuesEvent
2020-07-30 14:52:36
r-lib/gh
https://api.github.com/repos/r-lib/gh
closed
Link to the new docs location
documentation
I will do this in the remaining places that need it after #121 gets merged, which makes a start on this.
1.0
Link to the new docs location - I will do this in the remaining places that need it after #121 gets merged, which makes a start on this.
non_priority
link to the new docs location i will do this in the remaining places that need it after gets merged which makes a start on this
0
14,663
11,044,933,025
IssuesEvent
2019-12-09 14:15:17
jhu-sheridan-libraries/jhuda-general-issues
https://api.github.com/repos/jhu-sheridan-libraries/jhuda-general-issues
closed
investigate and propose a specific messaging technology
infrastructure
the technologies mentioned include: ActiveMQ, Kafka, Microsoft Azure Messaging Service Please make a recommendation based on known restrictions/conditions of JHU and Data Archive specific infrastructure. part of ticket #13
1.0
investigate and propose a specific messaging technology - the technologies mentioned include: ActiveMQ, Kafka, Microsoft Azure Messaging Service Please make a recommendation based on known restrictions/conditions of JHU and Data Archive specific infrastructure. part of ticket #13
non_priority
investigate and propose a specific messaging technology the technologies mentioned include activemq kafka microsoft azure messaging service please make a recommendation based on known restrictions conditions of jhu and data archive specific infrastructure part of ticket
0
430,473
30,186,356,883
IssuesEvent
2023-07-04 12:23:52
NetAppDocs/ontap-systems-switches
https://api.github.com/repos/NetAppDocs/ontap-systems-switches
closed
Add a section for source switch CN1610 and destination switch NVIDIA SN2100
documentation
### Page URL https://docs.netapp.com/us-en/ontap-systems-switches/switch-nvidia-sn2100/migrate-cisco-sn2100-cluster-switch.html ### Page title Migrate from a Cisco cluster switch to a NVIDIA SN2100 cluster switch ### Summary We have a significant number of CN1610 switches in the field. I have used this procedure to migrate from CN1610's to Cisco 9336 switches successfully. Customer's a hesitant to use the procedure, since we are not calling out the CN1610 in our documentation. Please a section for CN1610 to Cisco 9336, and section for CN1610 to NVIDIA SN2100 ### Public issues must not contain sensitive information - [X] This issue contains no sensitive information.
1.0
Add a section for source switch CN1610 and destination switch NVIDIA SN2100 - ### Page URL https://docs.netapp.com/us-en/ontap-systems-switches/switch-nvidia-sn2100/migrate-cisco-sn2100-cluster-switch.html ### Page title Migrate from a Cisco cluster switch to a NVIDIA SN2100 cluster switch ### Summary We have a significant number of CN1610 switches in the field. I have used this procedure to migrate from CN1610's to Cisco 9336 switches successfully. Customer's a hesitant to use the procedure, since we are not calling out the CN1610 in our documentation. Please a section for CN1610 to Cisco 9336, and section for CN1610 to NVIDIA SN2100 ### Public issues must not contain sensitive information - [X] This issue contains no sensitive information.
non_priority
add a section for source switch and destination switch nvidia page url page title migrate from a cisco cluster switch to a nvidia cluster switch summary we have a significant number of switches in the field i have used this procedure to migrate from s to cisco switches successfully customer s a hesitant to use the procedure since we are not calling out the in our documentation please a section for to cisco and section for to nvidia public issues must not contain sensitive information this issue contains no sensitive information
0
225,768
24,881,305,732
IssuesEvent
2022-10-28 01:32:13
easycv/easycv
https://api.github.com/repos/easycv/easycv
opened
CVE-2022-39286 (High) detected in jupyter_core-4.7.1-py3-none-any.whl
security vulnerability
## CVE-2022-39286 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jupyter_core-4.7.1-py3-none-any.whl</b></p></summary> <p>Jupyter core package. A base package on which Jupyter projects rely.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/53/40/5af36bffa0af3ac71d3a6fc6709de10e4f6ff7c01745b8bc4715372189c9/jupyter_core-4.7.1-py3-none-any.whl">https://files.pythonhosted.org/packages/53/40/5af36bffa0af3ac71d3a6fc6709de10e4f6ff7c01745b8bc4715372189c9/jupyter_core-4.7.1-py3-none-any.whl</a></p> <p>Path to dependency file: /tmp/ws-scm/easycv</p> <p>Path to vulnerable library: /easycv</p> <p> Dependency Hierarchy: - :x: **jupyter_core-4.7.1-py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds. <p>Publish Date: 2022-10-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-39286>CVE-2022-39286</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3363</a></p> <p>Release Date: 2022-10-26</p> <p>Fix Resolution: jupyter-core - 4.11.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-39286 (High) detected in jupyter_core-4.7.1-py3-none-any.whl - ## CVE-2022-39286 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jupyter_core-4.7.1-py3-none-any.whl</b></p></summary> <p>Jupyter core package. A base package on which Jupyter projects rely.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/53/40/5af36bffa0af3ac71d3a6fc6709de10e4f6ff7c01745b8bc4715372189c9/jupyter_core-4.7.1-py3-none-any.whl">https://files.pythonhosted.org/packages/53/40/5af36bffa0af3ac71d3a6fc6709de10e4f6ff7c01745b8bc4715372189c9/jupyter_core-4.7.1-py3-none-any.whl</a></p> <p>Path to dependency file: /tmp/ws-scm/easycv</p> <p>Path to vulnerable library: /easycv</p> <p> Dependency Hierarchy: - :x: **jupyter_core-4.7.1-py3-none-any.whl** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Jupyter Core is a package for the core common functionality of Jupyter projects. Jupyter Core prior to version 4.11.2 contains an arbitrary code execution vulnerability in `jupyter_core` that stems from `jupyter_core` executing untrusted files in CWD. This vulnerability allows one user to run code as another. Version 4.11.2 contains a patch for this issue. There are no known workarounds. <p>Publish Date: 2022-10-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-39286>CVE-2022-39286</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3363">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3363</a></p> <p>Release Date: 2022-10-26</p> <p>Fix Resolution: jupyter-core - 4.11.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jupyter core none any whl cve high severity vulnerability vulnerable library jupyter core none any whl jupyter core package a base package on which jupyter projects rely library home page a href path to dependency file tmp ws scm easycv path to vulnerable library easycv dependency hierarchy x jupyter core none any whl vulnerable library found in base branch master vulnerability details jupyter core is a package for the core common functionality of jupyter projects jupyter core prior to version contains an arbitrary code execution vulnerability in jupyter core that stems from jupyter core executing untrusted files in cwd this vulnerability allows one user to run code as another version contains a patch for this issue there are no known workarounds publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jupyter core step up your open source security game with mend
0
183,889
14,961,723,837
IssuesEvent
2021-01-27 08:14:31
smithtalk/Warehouse-Management
https://api.github.com/repos/smithtalk/Warehouse-Management
opened
Make SQL Commands to integrated database to this Software
bug documentation enhancement prior:high question
Here the Checklist : - [ ] Create the Database - [ ] Create the Table
1.0
Make SQL Commands to integrated database to this Software - Here the Checklist : - [ ] Create the Database - [ ] Create the Table
non_priority
make sql commands to integrated database to this software here the checklist create the database create the table
0
169,665
26,838,818,542
IssuesEvent
2023-02-02 21:59:46
sandboxnu/graduatenu
https://api.github.com/repos/sandboxnu/graduatenu
closed
Design: UX Mockups For Add Course Modal
Design
Some work has already been done. The mockups need to be finalized and moved to the handoff page.
1.0
Design: UX Mockups For Add Course Modal - Some work has already been done. The mockups need to be finalized and moved to the handoff page.
non_priority
design ux mockups for add course modal some work has already been done the mockups need to be finalized and moved to the handoff page
0
11,245
9,292,002,811
IssuesEvent
2019-03-22 00:58:16
Azure/azure-sdk-for-js
https://api.github.com/repos/Azure/azure-sdk-for-js
opened
[Service Bus] Renaming as per API review feedback
Client Service Bus
_From API review notes in #1481_ - `getReceiver` -> `createReceiver` + throw error when an open receiver already exists - `getSender` -> `createSender` + throw error when an open sender already exists - `getSessionReceiver` -> `createSessionReceiver` - `messageCount` -> `maxMessageCount` in peek() functions - `Namespace` -> `ServiceBusClient` - `SqlExpression` need not be exported, use string instead in `RuleDescription`
1.0
[Service Bus] Renaming as per API review feedback - _From API review notes in #1481_ - `getReceiver` -> `createReceiver` + throw error when an open receiver already exists - `getSender` -> `createSender` + throw error when an open sender already exists - `getSessionReceiver` -> `createSessionReceiver` - `messageCount` -> `maxMessageCount` in peek() functions - `Namespace` -> `ServiceBusClient` - `SqlExpression` need not be exported, use string instead in `RuleDescription`
non_priority
renaming as per api review feedback from api review notes in getreceiver createreceiver throw error when an open receiver already exists getsender createsender throw error when an open sender already exists getsessionreceiver createsessionreceiver messagecount maxmessagecount in peek functions namespace servicebusclient sqlexpression need not be exported use string instead in ruledescription
0
26,302
11,297,125,352
IssuesEvent
2020-01-17 04:41:39
drakeg/drakeweb.org
https://api.github.com/repos/drakeg/drakeweb.org
opened
CVE-2014-10064 (High) detected in qs-0.5.6.tgz, qs-0.6.6.tgz
security vulnerability
## CVE-2014-10064 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>qs-0.5.6.tgz</b>, <b>qs-0.6.6.tgz</b></p></summary> <p> <details><summary><b>qs-0.5.6.tgz</b></p></summary> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.5.6.tgz">https://registry.npmjs.org/qs/-/qs-0.5.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/drakeweb.org/wp-content/plugins/press-this/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/drakeweb.org/wp-content/plugins/press-this/node_modules/qs/package.json,/tmp/ws-scm/drakeweb.org/wp-content/plugins/press-this/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - grunt-contrib-watch-0.6.1.tgz (Root Library) - tiny-lr-fork-0.0.5.tgz - :x: **qs-0.5.6.tgz** (Vulnerable Library) </details> <details><summary><b>qs-0.6.6.tgz</b></p></summary> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/drakeweb.org/wp-content/themes/decode/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/drakeweb.org/wp-content/themes/decode/node_modules/request/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - grunt-modernizr-0.5.2.tgz (Root Library) - request-2.27.0.tgz - :x: **qs-0.6.6.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/drakeg/drakeweb.org/commit/3759e4bc84151f770a6f4cc54da1c6232f666a6e">3759e4bc84151f770a6f4cc54da1c6232f666a6e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-10064>CVE-2014-10064</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/28">https://nodesecurity.io/advisories/28</a></p> <p>Release Date: 2014-08-06</p> <p>Fix Resolution: Update to version 1.0.0 or later</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2014-10064 (High) detected in qs-0.5.6.tgz, qs-0.6.6.tgz - ## CVE-2014-10064 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>qs-0.5.6.tgz</b>, <b>qs-0.6.6.tgz</b></p></summary> <p> <details><summary><b>qs-0.5.6.tgz</b></p></summary> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.5.6.tgz">https://registry.npmjs.org/qs/-/qs-0.5.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/drakeweb.org/wp-content/plugins/press-this/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/drakeweb.org/wp-content/plugins/press-this/node_modules/qs/package.json,/tmp/ws-scm/drakeweb.org/wp-content/plugins/press-this/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - grunt-contrib-watch-0.6.1.tgz (Root Library) - tiny-lr-fork-0.0.5.tgz - :x: **qs-0.5.6.tgz** (Vulnerable Library) </details> <details><summary><b>qs-0.6.6.tgz</b></p></summary> <p>querystring parser</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-0.6.6.tgz">https://registry.npmjs.org/qs/-/qs-0.6.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/drakeweb.org/wp-content/themes/decode/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/drakeweb.org/wp-content/themes/decode/node_modules/request/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - grunt-modernizr-0.5.2.tgz (Root Library) - request-2.27.0.tgz - :x: **qs-0.6.6.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/drakeg/drakeweb.org/commit/3759e4bc84151f770a6f4cc54da1c6232f666a6e">3759e4bc84151f770a6f4cc54da1c6232f666a6e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The qs module before 1.0.0 does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time. An attacker could leverage this to cause a temporary denial-of-service condition, for example, in a web application, other requests would not be processed while this blocking is occurring. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-10064>CVE-2014-10064</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/28">https://nodesecurity.io/advisories/28</a></p> <p>Release Date: 2014-08-06</p> <p>Fix Resolution: Update to version 1.0.0 or later</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in qs tgz qs tgz cve high severity vulnerability vulnerable libraries qs tgz qs tgz qs tgz querystring parser library home page a href path to dependency file tmp ws scm drakeweb org wp content plugins press this package json path to vulnerable library tmp ws scm drakeweb org wp content plugins press this node modules qs package json tmp ws scm drakeweb org wp content plugins press this node modules qs package json dependency hierarchy grunt contrib watch tgz root library tiny lr fork tgz x qs tgz vulnerable library qs tgz querystring parser library home page a href path to dependency file tmp ws scm drakeweb org wp content themes decode package json path to vulnerable library tmp ws scm drakeweb org wp content themes decode node modules request node modules qs package json dependency hierarchy grunt modernizr tgz root library request tgz x qs tgz vulnerable library found in head commit a href vulnerability details the qs module before does not have an option or default for specifying object depth and when parsing a string representing a deeply nested object will block the event loop for long periods of time an attacker could leverage this to cause a temporary denial of service condition for example in a web application other requests would not be processed while this blocking is occurring publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution update to version or later step up your open source security game with whitesource
0
65,776
14,761,896,382
IssuesEvent
2021-01-09 00:53:51
olivialancaster/angular
https://api.github.com/repos/olivialancaster/angular
opened
WS-2020-0218 (High) detected in juice-shopjuice-shop-10.1.0_node13_linux_x64
security vulnerability
## WS-2020-0218 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>juice-shopjuice-shop-10.1.0_node13_linux_x64</b></p></summary> <p> <p>Probably the most modern and sophisticated insecure web application</p> <p>Library home page: <a href=https://sourceforge.net/projects/juice-shop/>https://sourceforge.net/projects/juice-shop/</a></p> <p>Found in HEAD commit: <a href="https://github.com/olivialancaster/angular/commit/3319152594d134df0af4a78d3036722911934182">3319152594d134df0af4a78d3036722911934182</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>angular/bower_components/polymer/bower_components/web-component-tester/node_modules/merge/merge.min.js</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>angular/bower_components/polymer/bower_components/web-component-tester/node_modules/merge/merge.min.js</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Prototype Pollution vulnerability was found in merge before 2.1.0 via the merge.recursive function. It can be tricked into adding or modifying properties of the Object prototype. These properties will be present on all objects. <p>Publish Date: 2020-10-09 <p>URL: <a href=https://github.com/yeikos/js.merge/pull/38>WS-2020-0218</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/yeikos/js.merge/pull/38">https://github.com/yeikos/js.merge/pull/38</a></p> <p>Release Date: 2020-10-09</p> <p>Fix Resolution: merge - 2.1.0</p> </p> </details> <p></p>
True
WS-2020-0218 (High) detected in juice-shopjuice-shop-10.1.0_node13_linux_x64 - ## WS-2020-0218 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>juice-shopjuice-shop-10.1.0_node13_linux_x64</b></p></summary> <p> <p>Probably the most modern and sophisticated insecure web application</p> <p>Library home page: <a href=https://sourceforge.net/projects/juice-shop/>https://sourceforge.net/projects/juice-shop/</a></p> <p>Found in HEAD commit: <a href="https://github.com/olivialancaster/angular/commit/3319152594d134df0af4a78d3036722911934182">3319152594d134df0af4a78d3036722911934182</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>angular/bower_components/polymer/bower_components/web-component-tester/node_modules/merge/merge.min.js</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>angular/bower_components/polymer/bower_components/web-component-tester/node_modules/merge/merge.min.js</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Prototype Pollution vulnerability was found in merge before 2.1.0 via the merge.recursive function. It can be tricked into adding or modifying properties of the Object prototype. These properties will be present on all objects. <p>Publish Date: 2020-10-09 <p>URL: <a href=https://github.com/yeikos/js.merge/pull/38>WS-2020-0218</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/yeikos/js.merge/pull/38">https://github.com/yeikos/js.merge/pull/38</a></p> <p>Release Date: 2020-10-09</p> <p>Fix Resolution: merge - 2.1.0</p> </p> </details> <p></p>
non_priority
ws high detected in juice shopjuice shop linux ws high severity vulnerability vulnerable library juice shopjuice shop linux probably the most modern and sophisticated insecure web application library home page a href found in head commit a href vulnerable source files angular bower components polymer bower components web component tester node modules merge merge min js angular bower components polymer bower components web component tester node modules merge merge min js vulnerability details a prototype pollution vulnerability was found in merge before via the merge recursive function it can be tricked into adding or modifying properties of the object prototype these properties will be present on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution merge
0
8,128
2,868,982,488
IssuesEvent
2015-06-05 22:21:52
dart-lang/pub
https://api.github.com/repos/dart-lang/pub
closed
Pub seems to get constraints of semantic versions wrong
AsDesigned bug
<a href="https://github.com/mkustermann"><img src="https://avatars.githubusercontent.com/u/5757092?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [mkustermann](https://github.com/mkustermann)** _Originally opened as dart-lang/sdk#20404_ ---- A package &quot;foobar&quot; with version &quot;0.0.3-dev&quot; satisfies the following version constraint: dependencies: &nbsp;&nbsp;foobar: '&gt;=0.0.3-dev &lt;0.0.3' according to semantic versioning, see the specification here: http://semver.org/ But pub seems to complain that there is no suitable version for &quot;foobar&quot; -- could be because the constraints are parsed incorrectly or because the ordering implementation is wrong? Error message: $ pub get Resolving dependencies... Package foobar has no versions that match &gt;=0.0.3-dev &lt;0.0.3 derived from: - mypackage 0.1.0-dev depends on version &gt;=0.0.3-dev &lt;0.0.3
1.0
Pub seems to get constraints of semantic versions wrong - <a href="https://github.com/mkustermann"><img src="https://avatars.githubusercontent.com/u/5757092?v=3" align="left" width="96" height="96"hspace="10"></img></a> **Issue by [mkustermann](https://github.com/mkustermann)** _Originally opened as dart-lang/sdk#20404_ ---- A package &quot;foobar&quot; with version &quot;0.0.3-dev&quot; satisfies the following version constraint: dependencies: &nbsp;&nbsp;foobar: '&gt;=0.0.3-dev &lt;0.0.3' according to semantic versioning, see the specification here: http://semver.org/ But pub seems to complain that there is no suitable version for &quot;foobar&quot; -- could be because the constraints are parsed incorrectly or because the ordering implementation is wrong? Error message: $ pub get Resolving dependencies... Package foobar has no versions that match &gt;=0.0.3-dev &lt;0.0.3 derived from: - mypackage 0.1.0-dev depends on version &gt;=0.0.3-dev &lt;0.0.3
non_priority
pub seems to get constraints of semantic versions wrong issue by originally opened as dart lang sdk a package quot foobar quot with version quot dev quot satisfies the following version constraint dependencies nbsp nbsp foobar gt dev lt according to semantic versioning see the specification here but pub seems to complain that there is no suitable version for quot foobar quot could be because the constraints are parsed incorrectly or because the ordering implementation is wrong error message pub get resolving dependencies package foobar has no versions that match gt dev lt derived from mypackage dev depends on version gt dev lt
0
201,943
23,046,609,686
IssuesEvent
2022-07-24 01:36:19
temporalio/graphql
https://api.github.com/repos/temporalio/graphql
opened
graphql-cli-common-2.9.0.tgz: 2 vulnerabilities (highest severity is: 8.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>graphql-cli-common-2.9.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@graphql-inspector/graphql-cli-common/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/github-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/url-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/apollo-engine-loader/node_modules/node-fetch/package.json</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-23326](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23326) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | git-loader-6.2.4.tgz | Transitive | N/A | &#10060; | | [CVE-2022-0235](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | node-fetch-2.6.1.tgz | Transitive | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23326</summary> ### Vulnerable Library - <b>git-loader-6.2.4.tgz</b></p> <p>A set of utils for faster development of GraphQL tools</p> <p>Library home page: <a href="https://registry.npmjs.org/@graphql-tools/git-loader/-/git-loader-6.2.4.tgz">https://registry.npmjs.org/@graphql-tools/git-loader/-/git-loader-6.2.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@graphql-inspector/graphql-cli-common/node_modules/@graphql-tools/git-loader/package.json</p> <p> Dependency Hierarchy: - graphql-cli-common-2.9.0.tgz (Root Library) - loaders-4.1.0.tgz - :x: **git-loader-6.2.4.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection. <p>Publish Date: 2021-01-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23326>CVE-2021-23326</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-01-20</p> <p>Fix Resolution: @graphql-tools/git-loader - 6.2.6</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-0235</summary> ### Vulnerable Library - <b>node-fetch-2.6.1.tgz</b></p> <p>A light-weight module that brings window.fetch to node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@graphql-inspector/graphql-cli-common/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/github-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/url-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/apollo-engine-loader/node_modules/node-fetch/package.json</p> <p> Dependency Hierarchy: - graphql-cli-common-2.9.0.tgz (Root Library) - loaders-4.1.0.tgz - github-loader-6.2.4.tgz - cross-fetch-3.0.6.tgz - :x: **node-fetch-2.6.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor <p>Publish Date: 2022-01-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235>CVE-2022-0235</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a></p> <p>Release Date: 2022-01-16</p> <p>Fix Resolution: node-fetch - 2.6.7,3.1.1</p> </p> <p></p> </details>
True
graphql-cli-common-2.9.0.tgz: 2 vulnerabilities (highest severity is: 8.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>graphql-cli-common-2.9.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@graphql-inspector/graphql-cli-common/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/github-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/url-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/apollo-engine-loader/node_modules/node-fetch/package.json</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-23326](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23326) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | git-loader-6.2.4.tgz | Transitive | N/A | &#10060; | | [CVE-2022-0235](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | node-fetch-2.6.1.tgz | Transitive | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23326</summary> ### Vulnerable Library - <b>git-loader-6.2.4.tgz</b></p> <p>A set of utils for faster development of GraphQL tools</p> <p>Library home page: <a href="https://registry.npmjs.org/@graphql-tools/git-loader/-/git-loader-6.2.4.tgz">https://registry.npmjs.org/@graphql-tools/git-loader/-/git-loader-6.2.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@graphql-inspector/graphql-cli-common/node_modules/@graphql-tools/git-loader/package.json</p> <p> Dependency Hierarchy: - graphql-cli-common-2.9.0.tgz (Root Library) - loaders-4.1.0.tgz - :x: **git-loader-6.2.4.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package @graphql-tools/git-loader before 6.2.6. The use of exec and execSync in packages/loaders/git/src/load-git.ts allows arbitrary command injection. <p>Publish Date: 2021-01-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23326>CVE-2021-23326</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-01-20</p> <p>Fix Resolution: @graphql-tools/git-loader - 6.2.6</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-0235</summary> ### Vulnerable Library - <b>node-fetch-2.6.1.tgz</b></p> <p>A light-weight module that brings window.fetch to node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/@graphql-inspector/graphql-cli-common/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/github-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/url-loader/node_modules/node-fetch/package.json,/node_modules/@graphql-tools/apollo-engine-loader/node_modules/node-fetch/package.json</p> <p> Dependency Hierarchy: - graphql-cli-common-2.9.0.tgz (Root Library) - loaders-4.1.0.tgz - github-loader-6.2.4.tgz - cross-fetch-3.0.6.tgz - :x: **node-fetch-2.6.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor <p>Publish Date: 2022-01-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235>CVE-2022-0235</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a></p> <p>Release Date: 2022-01-16</p> <p>Fix Resolution: node-fetch - 2.6.7,3.1.1</p> </p> <p></p> </details>
non_priority
graphql cli common tgz vulnerabilities highest severity is vulnerable library graphql cli common tgz path to dependency file package json path to vulnerable library node modules graphql inspector graphql cli common node modules node fetch package json node modules graphql tools github loader node modules node fetch package json node modules graphql tools url loader node modules node fetch package json node modules graphql tools apollo engine loader node modules node fetch package json vulnerabilities cve severity cvss dependency type fixed in remediation available high git loader tgz transitive n a medium node fetch tgz transitive n a details cve vulnerable library git loader tgz a set of utils for faster development of graphql tools library home page a href path to dependency file package json path to vulnerable library node modules graphql inspector graphql cli common node modules graphql tools git loader package json dependency hierarchy graphql cli common tgz root library loaders tgz x git loader tgz vulnerable library found in base branch main vulnerability details this affects the package graphql tools git loader before the use of exec and execsync in packages loaders git src load git ts allows arbitrary command injection publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution graphql tools git loader cve vulnerable library node fetch tgz a light weight module that brings window fetch to node js library home page a href path to dependency file package json path to vulnerable library node modules graphql inspector graphql cli common node modules node fetch package json node modules graphql tools github loader node modules node fetch package json node modules graphql tools url loader node modules node fetch package json node modules graphql tools apollo engine loader node modules node fetch package json dependency hierarchy graphql cli common tgz root library loaders tgz github loader tgz cross fetch tgz x node fetch tgz vulnerable library found in base branch main vulnerability details node fetch is vulnerable to exposure of sensitive information to an unauthorized actor publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node fetch
0
28,458
8,148,448,952
IssuesEvent
2018-08-22 05:53:58
ApolloAuto/apollo
https://api.github.com/repos/ApolloAuto/apollo
closed
Faild to build_velodyne
Module: Build Module: Driver
Hi! When I try "bash apollo.sh build_velodyne", it shows follows: ...... -- Up-to-date: /home/tmp/ros/share/velodyne/launch/start_velodyne_16.launch -- Installing: /home/tmp/ros/share/velodyne/scripts -- Up-to-date: /home/tmp/ros/share/velodyne/scripts/start_velodyne.sh CMake Error at gtest/cmake_install.cmake:42 (FILE): file INSTALL cannot find "/apollo/modules/build_isolated/velodyne/gtest/libgtest.so". Call Stack (most recent call first): cmake_install.cmake:142 (INCLUDE) make: *** [install] Error 1 <== Failed to process package 'velodyne': Command '['make', 'install']' returned non-zero exit status 2 Reproduce this error by running: ==> cd /apollo/modules/build_isolated/velodyne && make install It seems like that I don`t have the require file. I will be very appreciate if anyone help me! Thank you very much!
1.0
Faild to build_velodyne - Hi! When I try "bash apollo.sh build_velodyne", it shows follows: ...... -- Up-to-date: /home/tmp/ros/share/velodyne/launch/start_velodyne_16.launch -- Installing: /home/tmp/ros/share/velodyne/scripts -- Up-to-date: /home/tmp/ros/share/velodyne/scripts/start_velodyne.sh CMake Error at gtest/cmake_install.cmake:42 (FILE): file INSTALL cannot find "/apollo/modules/build_isolated/velodyne/gtest/libgtest.so". Call Stack (most recent call first): cmake_install.cmake:142 (INCLUDE) make: *** [install] Error 1 <== Failed to process package 'velodyne': Command '['make', 'install']' returned non-zero exit status 2 Reproduce this error by running: ==> cd /apollo/modules/build_isolated/velodyne && make install It seems like that I don`t have the require file. I will be very appreciate if anyone help me! Thank you very much!
non_priority
faild to build velodyne hi when i try bash apollo sh build velodyne it shows follows up to date home tmp ros share velodyne launch start velodyne launch installing home tmp ros share velodyne scripts up to date home tmp ros share velodyne scripts start velodyne sh cmake error at gtest cmake install cmake file file install cannot find apollo modules build isolated velodyne gtest libgtest so call stack most recent call first cmake install cmake include make error failed to process package velodyne command returned non zero exit status reproduce this error by running cd apollo modules build isolated velodyne make install it seems like that i don t have the require file i will be very appreciate if anyone help me thank you very much
0
12,794
8,109,441,785
IssuesEvent
2018-08-14 07:34:45
accordproject/ergo
https://api.github.com/repos/accordproject/ergo
closed
Add native support for DateTime operators
enhancement semantics usability
Currently DateTime operators can only be evaluated when compiling to JavaScript. We should provide a native implementation for those operators either in Coq or OCaml for the extracted code. This can then be used for the reference interpreter (See #4) or the REPL (See #25).
True
Add native support for DateTime operators - Currently DateTime operators can only be evaluated when compiling to JavaScript. We should provide a native implementation for those operators either in Coq or OCaml for the extracted code. This can then be used for the reference interpreter (See #4) or the REPL (See #25).
non_priority
add native support for datetime operators currently datetime operators can only be evaluated when compiling to javascript we should provide a native implementation for those operators either in coq or ocaml for the extracted code this can then be used for the reference interpreter see or the repl see
0
124,071
16,569,394,223
IssuesEvent
2021-05-30 04:31:51
m48483/SocializerRepo
https://api.github.com/repos/m48483/SocializerRepo
closed
2021.05.16 [이승민]
delay design manage-folder
📢 마감일 : 5월 23일 ◾ 4회차 회의 시간에 정리했던 구조도 형식으로 폴더 관리 ◾ 기획자의 기획서 세분화가 완료되면 폴더 정리 후 기획서도 함께 push
1.0
2021.05.16 [이승민] - 📢 마감일 : 5월 23일 ◾ 4회차 회의 시간에 정리했던 구조도 형식으로 폴더 관리 ◾ 기획자의 기획서 세분화가 완료되면 폴더 정리 후 기획서도 함께 push
non_priority
📢 마감일 ◾ 회의 시간에 정리했던 구조도 형식으로 폴더 관리 ◾ 기획자의 기획서 세분화가 완료되면 폴더 정리 후 기획서도 함께 push
0
4,996
2,894,378,325
IssuesEvent
2015-06-15 23:15:10
elastic/elasticsearch-py
https://api.github.com/repos/elastic/elasticsearch-py
closed
Should 'fields' be a list or a string?
Documentation
The client args for the `fields` param says `A comma-separated list of fields to return as part of a hit`. That's not super clear, but suggests to me that it expects a string (since specifying the delimiter implies a pseudo-list encoded as a string. However, this argument seems passed-through to Elasticsearch and appears to work if I send a list here (`'fields': ['first_name', 'last_name']`), but not if I send a string (`'fields': "first_name,last_name"`). Either way I think we'll have a change to make in haystack to support this feature because it's currently assuming the client wants a string containing a space-delimited list of fields [1]. I figured I'd confirm the expectations here before issuing a pull request over there. Thanks! [1] https://github.com/toastdriven/django-haystack/blob/master/haystack/backends/elasticsearch_backend.py#L275
1.0
Should 'fields' be a list or a string? - The client args for the `fields` param says `A comma-separated list of fields to return as part of a hit`. That's not super clear, but suggests to me that it expects a string (since specifying the delimiter implies a pseudo-list encoded as a string. However, this argument seems passed-through to Elasticsearch and appears to work if I send a list here (`'fields': ['first_name', 'last_name']`), but not if I send a string (`'fields': "first_name,last_name"`). Either way I think we'll have a change to make in haystack to support this feature because it's currently assuming the client wants a string containing a space-delimited list of fields [1]. I figured I'd confirm the expectations here before issuing a pull request over there. Thanks! [1] https://github.com/toastdriven/django-haystack/blob/master/haystack/backends/elasticsearch_backend.py#L275
non_priority
should fields be a list or a string the client args for the fields param says a comma separated list of fields to return as part of a hit that s not super clear but suggests to me that it expects a string since specifying the delimiter implies a pseudo list encoded as a string however this argument seems passed through to elasticsearch and appears to work if i send a list here fields but not if i send a string fields first name last name either way i think we ll have a change to make in haystack to support this feature because it s currently assuming the client wants a string containing a space delimited list of fields i figured i d confirm the expectations here before issuing a pull request over there thanks
0
209,375
16,018,386,320
IssuesEvent
2021-04-20 19:03:21
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
ccl/importccl: TestImportComputed failed
C-test-failure O-robot branch-master
ccl/importccl.TestImportComputed [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2900755&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=2900755&tab=artifacts#/) on master @ [f451dd080c95fa73f7d796e1dc8bd6dd33eba09b](https://github.com/cockroachdb/cockroach/commits/f451dd080c95fa73f7d796e1dc8bd6dd33eba09b): ``` Previous write at 0x00c0074df910 by goroutine 1025: github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr.(*nameResolver).addColumn() /go/src/github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr/expr.go:265 +0x1d4 github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr.MakeComputedExprs() /go/src/github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr/computed_column.go:285 +0x8e6 github.com/cockroachdb/cockroach/pkg/sql/row.NewDatumRowConverter() /go/src/github.com/cockroachdb/cockroach/pkg/sql/row/row_converter.go:435 +0x1550 github.com/cockroachdb/cockroach/pkg/ccl/importccl.makeDatumConverter() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:449 +0x18c github.com/cockroachdb/cockroach/pkg/ccl/importccl.(*parallelImporter).importWorker() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:653 +0x7c github.com/cockroachdb/cockroach/pkg/ccl/importccl.runParallelImport.func1.1() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:553 +0xae github.com/cockroachdb/cockroach/pkg/util/ctxgroup.GroupWorkers.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:175 +0x5d github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:166 +0x4e golang.org/x/sync/errgroup.(*Group).Go.func1() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 +0x94 Goroutine 558 (running) created at: golang.org/x/sync/errgroup.(*Group).Go() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:54 +0x73 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:165 +0xe4 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.GroupWorkers() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:175 +0xaa github.com/cockroachdb/cockroach/pkg/ccl/importccl.runParallelImport.func1() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:552 +0x2f1 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:166 +0x4e golang.org/x/sync/errgroup.(*Group).Go.func1() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 +0x94 Goroutine 1025 (finished) created at: golang.org/x/sync/errgroup.(*Group).Go() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:54 +0x73 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:165 +0xe4 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.GroupWorkers() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:175 +0xaa github.com/cockroachdb/cockroach/pkg/ccl/importccl.runParallelImport.func1() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:552 +0x2f1 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:166 +0x4e golang.org/x/sync/errgroup.(*Group).Go.func1() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 +0x94 ================== testing.go:1038: race detected during execution of test --- FAIL: TestImportComputed/import-table-avro (1.39s) ``` <details><summary>Reproduce</summary> <p> <p>To reproduce, try: ```bash make stressrace TESTS=TestImportComputed PKG=./pkg/ccl/importccl TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` </p> <p>Parameters in this failure: - GOFLAGS=-race -parallel=4 </p> </p> </details> /cc @Anzoteh96 <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestImportComputed.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
1.0
ccl/importccl: TestImportComputed failed - ccl/importccl.TestImportComputed [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2900755&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=2900755&tab=artifacts#/) on master @ [f451dd080c95fa73f7d796e1dc8bd6dd33eba09b](https://github.com/cockroachdb/cockroach/commits/f451dd080c95fa73f7d796e1dc8bd6dd33eba09b): ``` Previous write at 0x00c0074df910 by goroutine 1025: github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr.(*nameResolver).addColumn() /go/src/github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr/expr.go:265 +0x1d4 github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr.MakeComputedExprs() /go/src/github.com/cockroachdb/cockroach/pkg/sql/catalog/schemaexpr/computed_column.go:285 +0x8e6 github.com/cockroachdb/cockroach/pkg/sql/row.NewDatumRowConverter() /go/src/github.com/cockroachdb/cockroach/pkg/sql/row/row_converter.go:435 +0x1550 github.com/cockroachdb/cockroach/pkg/ccl/importccl.makeDatumConverter() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:449 +0x18c github.com/cockroachdb/cockroach/pkg/ccl/importccl.(*parallelImporter).importWorker() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:653 +0x7c github.com/cockroachdb/cockroach/pkg/ccl/importccl.runParallelImport.func1.1() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:553 +0xae github.com/cockroachdb/cockroach/pkg/util/ctxgroup.GroupWorkers.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:175 +0x5d github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:166 +0x4e golang.org/x/sync/errgroup.(*Group).Go.func1() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 +0x94 Goroutine 558 (running) created at: golang.org/x/sync/errgroup.(*Group).Go() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:54 +0x73 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:165 +0xe4 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.GroupWorkers() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:175 +0xaa github.com/cockroachdb/cockroach/pkg/ccl/importccl.runParallelImport.func1() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:552 +0x2f1 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:166 +0x4e golang.org/x/sync/errgroup.(*Group).Go.func1() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 +0x94 Goroutine 1025 (finished) created at: golang.org/x/sync/errgroup.(*Group).Go() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:54 +0x73 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:165 +0xe4 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.GroupWorkers() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:175 +0xaa github.com/cockroachdb/cockroach/pkg/ccl/importccl.runParallelImport.func1() /go/src/github.com/cockroachdb/cockroach/pkg/ccl/importccl/read_import_base.go:552 +0x2f1 github.com/cockroachdb/cockroach/pkg/util/ctxgroup.Group.GoCtx.func1() /go/src/github.com/cockroachdb/cockroach/pkg/util/ctxgroup/ctxgroup.go:166 +0x4e golang.org/x/sync/errgroup.(*Group).Go.func1() /go/src/github.com/cockroachdb/cockroach/vendor/golang.org/x/sync/errgroup/errgroup.go:57 +0x94 ================== testing.go:1038: race detected during execution of test --- FAIL: TestImportComputed/import-table-avro (1.39s) ``` <details><summary>Reproduce</summary> <p> <p>To reproduce, try: ```bash make stressrace TESTS=TestImportComputed PKG=./pkg/ccl/importccl TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` </p> <p>Parameters in this failure: - GOFLAGS=-race -parallel=4 </p> </p> </details> /cc @Anzoteh96 <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestImportComputed.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
ccl importccl testimportcomputed failed ccl importccl testimportcomputed with on master previous write at by goroutine github com cockroachdb cockroach pkg sql catalog schemaexpr nameresolver addcolumn go src github com cockroachdb cockroach pkg sql catalog schemaexpr expr go github com cockroachdb cockroach pkg sql catalog schemaexpr makecomputedexprs go src github com cockroachdb cockroach pkg sql catalog schemaexpr computed column go github com cockroachdb cockroach pkg sql row newdatumrowconverter go src github com cockroachdb cockroach pkg sql row row converter go github com cockroachdb cockroach pkg ccl importccl makedatumconverter go src github com cockroachdb cockroach pkg ccl importccl read import base go github com cockroachdb cockroach pkg ccl importccl parallelimporter importworker go src github com cockroachdb cockroach pkg ccl importccl read import base go github com cockroachdb cockroach pkg ccl importccl runparallelimport go src github com cockroachdb cockroach pkg ccl importccl read import base go github com cockroachdb cockroach pkg util ctxgroup groupworkers go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go github com cockroachdb cockroach pkg util ctxgroup group goctx go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go golang org x sync errgroup group go go src github com cockroachdb cockroach vendor golang org x sync errgroup errgroup go goroutine running created at golang org x sync errgroup group go go src github com cockroachdb cockroach vendor golang org x sync errgroup errgroup go github com cockroachdb cockroach pkg util ctxgroup group goctx go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go github com cockroachdb cockroach pkg util ctxgroup groupworkers go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go github com cockroachdb cockroach pkg ccl importccl runparallelimport go src github com cockroachdb cockroach pkg ccl importccl read import base go github com cockroachdb cockroach pkg util ctxgroup group goctx go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go golang org x sync errgroup group go go src github com cockroachdb cockroach vendor golang org x sync errgroup errgroup go goroutine finished created at golang org x sync errgroup group go go src github com cockroachdb cockroach vendor golang org x sync errgroup errgroup go github com cockroachdb cockroach pkg util ctxgroup group goctx go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go github com cockroachdb cockroach pkg util ctxgroup groupworkers go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go github com cockroachdb cockroach pkg ccl importccl runparallelimport go src github com cockroachdb cockroach pkg ccl importccl read import base go github com cockroachdb cockroach pkg util ctxgroup group goctx go src github com cockroachdb cockroach pkg util ctxgroup ctxgroup go golang org x sync errgroup group go go src github com cockroachdb cockroach vendor golang org x sync errgroup errgroup go testing go race detected during execution of test fail testimportcomputed import table avro reproduce to reproduce try bash make stressrace tests testimportcomputed pkg pkg ccl importccl testtimeout stressflags timeout parameters in this failure goflags race parallel cc
0
65,191
16,132,443,363
IssuesEvent
2021-04-29 07:29:51
spring-projects/spring-session
https://api.github.com/repos/spring-projects/spring-session
closed
docs.af.pivotal.io->docs-ip.spring.io
in: build type: bug
The host for deploying the docs has changed to docs-ip.spring.io
1.0
docs.af.pivotal.io->docs-ip.spring.io - The host for deploying the docs has changed to docs-ip.spring.io
non_priority
docs af pivotal io docs ip spring io the host for deploying the docs has changed to docs ip spring io
0
155,259
19,771,278,003
IssuesEvent
2022-01-17 10:17:25
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
opened
Vulnerability roundup 110: archivy-1.6.1: 1 advisory [4.3]
1.severity: security
[search](https://search.nix.gsc.io/?q=archivy&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=archivy+in%3Apath&type=Code) * [ ] [CVE-2021-4162](https://nvd.nist.gov/vuln/detail/CVE-2021-4162) CVSSv3=4.3 (nixos-unstable) ## CVE details ### CVE-2021-4162 archivy is vulnerable to Cross-Site Request Forgery (CSRF) ----- Scanned versions: nixos-unstable: 5aaed40d22f. Cc @siraben
True
Vulnerability roundup 110: archivy-1.6.1: 1 advisory [4.3] - [search](https://search.nix.gsc.io/?q=archivy&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=archivy+in%3Apath&type=Code) * [ ] [CVE-2021-4162](https://nvd.nist.gov/vuln/detail/CVE-2021-4162) CVSSv3=4.3 (nixos-unstable) ## CVE details ### CVE-2021-4162 archivy is vulnerable to Cross-Site Request Forgery (CSRF) ----- Scanned versions: nixos-unstable: 5aaed40d22f. Cc @siraben
non_priority
vulnerability roundup archivy advisory nixos unstable cve details cve archivy is vulnerable to cross site request forgery csrf scanned versions nixos unstable cc siraben
0
73,058
31,844,409,404
IssuesEvent
2023-09-14 18:44:46
AmplicaLabs/content-publishing-service
https://api.github.com/repos/AmplicaLabs/content-publishing-service
opened
File upload limitation
content-publishing-service
Think about how to do streaming for assets instead of storing everything in memory which allow for bigger size assets
1.0
File upload limitation - Think about how to do streaming for assets instead of storing everything in memory which allow for bigger size assets
non_priority
file upload limitation think about how to do streaming for assets instead of storing everything in memory which allow for bigger size assets
0
237,260
19,605,062,935
IssuesEvent
2022-01-06 08:23:01
IntellectualSites/PlotSquared
https://api.github.com/repos/IntellectualSites/PlotSquared
opened
Negative max-tiles value bugs world and spams log
Requires Testing
### Server Implementation Paper ### Server Version 1.17.1 ### Describe the bug Setting a negative value for `max-tiles` in the chunk processor causes a massive amount of console spam and seems to delete all tile entities in loaded chunks. ### To Reproduce 1. Place some chests in a chunk 2. Enable chunk processor and set `max-tiles` to `-1` 3. Restart server and join 4. Chests are gone and massive console spam ### Expected behaviour At the very least, not spam the console and not delete blocks. ### Screenshots / Videos _No response_ ### Error log (if applicable) https://paste.gg/p/anonymous/fe62defc051e457e95f59f5c29e9bef1 ### Plot Debugpaste https://athion.net/ISPaster/paste/view/e45b3c123ebb475c80f7f18063589926 ### PlotSquared Version 6.2.3-SNAPSHOT ### Checklist - [X] I have included a Plot debugpaste. - [X] I am using the newest build from https://www.spigotmc.org/resources/77506/ and the issue still persists. ### Anything else? Scared the crap out of me and I terminated the server as soon as I saw it so that none of the chunks would save in this state. This also happened on version 6.1.5, which I updated to the latest version (6.2.3) and tested again for this report. Results were the same. The provided error log is just the single error, as far as I can tell this is the only one but it spammed thousands of lines per second. I anticipated this would disable the check for tile entities in the chunk processor. I am using a different plugin (Insights) for block entity limits, which I disabled, so it is not interfering with PS and didn't cause this bug. If negative values simply can't be supported, it would be at least be nice if doing so anyway wouldn't delete blocks and just disable the processor. I really think that it should be supported as an "uncapped" limit though, as I want to use the `max-entities` limit but have an uncapped `max-tiles` limit. I am unsure if any value below 1 would have the same result, I just know that `-1` does.
1.0
Negative max-tiles value bugs world and spams log - ### Server Implementation Paper ### Server Version 1.17.1 ### Describe the bug Setting a negative value for `max-tiles` in the chunk processor causes a massive amount of console spam and seems to delete all tile entities in loaded chunks. ### To Reproduce 1. Place some chests in a chunk 2. Enable chunk processor and set `max-tiles` to `-1` 3. Restart server and join 4. Chests are gone and massive console spam ### Expected behaviour At the very least, not spam the console and not delete blocks. ### Screenshots / Videos _No response_ ### Error log (if applicable) https://paste.gg/p/anonymous/fe62defc051e457e95f59f5c29e9bef1 ### Plot Debugpaste https://athion.net/ISPaster/paste/view/e45b3c123ebb475c80f7f18063589926 ### PlotSquared Version 6.2.3-SNAPSHOT ### Checklist - [X] I have included a Plot debugpaste. - [X] I am using the newest build from https://www.spigotmc.org/resources/77506/ and the issue still persists. ### Anything else? Scared the crap out of me and I terminated the server as soon as I saw it so that none of the chunks would save in this state. This also happened on version 6.1.5, which I updated to the latest version (6.2.3) and tested again for this report. Results were the same. The provided error log is just the single error, as far as I can tell this is the only one but it spammed thousands of lines per second. I anticipated this would disable the check for tile entities in the chunk processor. I am using a different plugin (Insights) for block entity limits, which I disabled, so it is not interfering with PS and didn't cause this bug. If negative values simply can't be supported, it would be at least be nice if doing so anyway wouldn't delete blocks and just disable the processor. I really think that it should be supported as an "uncapped" limit though, as I want to use the `max-entities` limit but have an uncapped `max-tiles` limit. I am unsure if any value below 1 would have the same result, I just know that `-1` does.
non_priority
negative max tiles value bugs world and spams log server implementation paper server version describe the bug setting a negative value for max tiles in the chunk processor causes a massive amount of console spam and seems to delete all tile entities in loaded chunks to reproduce place some chests in a chunk enable chunk processor and set max tiles to restart server and join chests are gone and massive console spam expected behaviour at the very least not spam the console and not delete blocks screenshots videos no response error log if applicable plot debugpaste plotsquared version snapshot checklist i have included a plot debugpaste i am using the newest build from and the issue still persists anything else scared the crap out of me and i terminated the server as soon as i saw it so that none of the chunks would save in this state this also happened on version which i updated to the latest version and tested again for this report results were the same the provided error log is just the single error as far as i can tell this is the only one but it spammed thousands of lines per second i anticipated this would disable the check for tile entities in the chunk processor i am using a different plugin insights for block entity limits which i disabled so it is not interfering with ps and didn t cause this bug if negative values simply can t be supported it would be at least be nice if doing so anyway wouldn t delete blocks and just disable the processor i really think that it should be supported as an uncapped limit though as i want to use the max entities limit but have an uncapped max tiles limit i am unsure if any value below would have the same result i just know that does
0
293,176
25,275,299,834
IssuesEvent
2022-11-16 12:13:20
epiphany-platform/epiphany
https://api.github.com/repos/epiphany-platform/epiphany
closed
[FEATURE REQUEST] Add Molecule execution into test pipelines
area/testing
**Is your feature request related to a problem? Please describe.** We started to create Molecule tests that at the moment exist for PostgreSQL. The idea is to include them into existing test pipelines in Azure DevOps. **Describe the solution you'd like** Add an additional step. It runs in Docker containers, so some adjusment may be needed. **Describe alternatives you've considered** No. **Additional context** Consider [pytest-molecule](https://pypi.org/project/pytest-molecule/) to run scenarios in parallel. --- **DoD checklist** - Changelog - [ ] updated - [ ] not needed - COMPONENTS.md - [ ] updated - [ ] not needed - Schema - [ ] updated - [ ] not needed - Backport tasks - [ ] created - [ ] not needed - Documentation - [ ] added - [ ] updated - [ ] not needed - [ ] Feature has automated tests - [ ] Automated tests passed (QA pipelines) - [ ] apply - [ ] upgrade - [ ] backup/restore - [ ] Idempotency tested - [ ] All conversations in PR resolved - [ ] Solution meets requirements and is done according to design doc - [ ] Usage compliant with license
1.0
[FEATURE REQUEST] Add Molecule execution into test pipelines - **Is your feature request related to a problem? Please describe.** We started to create Molecule tests that at the moment exist for PostgreSQL. The idea is to include them into existing test pipelines in Azure DevOps. **Describe the solution you'd like** Add an additional step. It runs in Docker containers, so some adjusment may be needed. **Describe alternatives you've considered** No. **Additional context** Consider [pytest-molecule](https://pypi.org/project/pytest-molecule/) to run scenarios in parallel. --- **DoD checklist** - Changelog - [ ] updated - [ ] not needed - COMPONENTS.md - [ ] updated - [ ] not needed - Schema - [ ] updated - [ ] not needed - Backport tasks - [ ] created - [ ] not needed - Documentation - [ ] added - [ ] updated - [ ] not needed - [ ] Feature has automated tests - [ ] Automated tests passed (QA pipelines) - [ ] apply - [ ] upgrade - [ ] backup/restore - [ ] Idempotency tested - [ ] All conversations in PR resolved - [ ] Solution meets requirements and is done according to design doc - [ ] Usage compliant with license
non_priority
add molecule execution into test pipelines is your feature request related to a problem please describe we started to create molecule tests that at the moment exist for postgresql the idea is to include them into existing test pipelines in azure devops describe the solution you d like add an additional step it runs in docker containers so some adjusment may be needed describe alternatives you ve considered no additional context consider to run scenarios in parallel dod checklist changelog updated not needed components md updated not needed schema updated not needed backport tasks created not needed documentation added updated not needed feature has automated tests automated tests passed qa pipelines apply upgrade backup restore idempotency tested all conversations in pr resolved solution meets requirements and is done according to design doc usage compliant with license
0
127,567
10,475,278,860
IssuesEvent
2019-09-23 16:00:27
kcigeospatial/Fred_Co_Land-Management
https://api.github.com/repos/kcigeospatial/Fred_Co_Land-Management
closed
Building - Capacity - Permit Issued Notification
Ready for Test Env. Retest
The approved and issued Capacity notification is sending at the wrong time. The notification should be sent after the Admin Review/Pending Certificate milestone.
2.0
Building - Capacity - Permit Issued Notification - The approved and issued Capacity notification is sending at the wrong time. The notification should be sent after the Admin Review/Pending Certificate milestone.
non_priority
building capacity permit issued notification the approved and issued capacity notification is sending at the wrong time the notification should be sent after the admin review pending certificate milestone
0
136,486
12,716,749,641
IssuesEvent
2020-06-24 02:55:08
RonAsis/Wsep202
https://api.github.com/repos/RonAsis/Wsep202
closed
Make GUI requirements testable
documentation
for example: 40. Use text that is not too small for elderly / visually impaired users. What is "not too small", use % of the screen to define it.
1.0
Make GUI requirements testable - for example: 40. Use text that is not too small for elderly / visually impaired users. What is "not too small", use % of the screen to define it.
non_priority
make gui requirements testable for example use text that is not too small for elderly visually impaired users what is not too small use of the screen to define it
0
288,635
31,861,525,908
IssuesEvent
2023-09-15 11:17:07
nidhi7598/linux-v4.19.72_CVE-2022-3564
https://api.github.com/repos/nidhi7598/linux-v4.19.72_CVE-2022-3564
opened
WS-2021-0468 (High) detected in linuxlinux-4.19.294
Mend: dependency security vulnerability
## WS-2021-0468 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.294</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-v4.19.72_CVE-2022-3564/commit/9ffee08efa44c7887e2babb8f304df0fa1094efb">9ffee08efa44c7887e2babb8f304df0fa1094efb</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In Linux/Kernel is vulnerable to injected vht mcs/nss in ieee80211_parse_tx_radiotap in net/mac80211/tx.c <p>Publish Date: 2021-11-29 <p>URL: <a href=https://github.com/gregkh/linux/commit/997ee230e4f5285cd98445c102d9033c7ec4814b>WS-2021-0468</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001723">https://osv.dev/vulnerability/UVI-2021-1001723</a></p> <p>Release Date: 2021-11-29</p> <p>Fix Resolution: Linux/Kernel -v4.9.285, v4.14.249, v4.19.209, v5.4.151, v5.10.71, v5.14.10, v5.15-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2021-0468 (High) detected in linuxlinux-4.19.294 - ## WS-2021-0468 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.294</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/nidhi7598/linux-v4.19.72_CVE-2022-3564/commit/9ffee08efa44c7887e2babb8f304df0fa1094efb">9ffee08efa44c7887e2babb8f304df0fa1094efb</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In Linux/Kernel is vulnerable to injected vht mcs/nss in ieee80211_parse_tx_radiotap in net/mac80211/tx.c <p>Publish Date: 2021-11-29 <p>URL: <a href=https://github.com/gregkh/linux/commit/997ee230e4f5285cd98445c102d9033c7ec4814b>WS-2021-0468</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001723">https://osv.dev/vulnerability/UVI-2021-1001723</a></p> <p>Release Date: 2021-11-29</p> <p>Fix Resolution: Linux/Kernel -v4.9.285, v4.14.249, v4.19.209, v5.4.151, v5.10.71, v5.14.10, v5.15-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in linuxlinux ws high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch main vulnerable source files vulnerability details in linux kernel is vulnerable to injected vht mcs nss in parse tx radiotap in net tx c publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux kernel step up your open source security game with mend
0
300,521
22,684,260,766
IssuesEvent
2022-07-04 12:44:51
Justicea83/Expensify
https://api.github.com/repos/Justicea83/Expensify
reopened
[Chore] Graduate Attendees for interview on 2022-03-30 -werw059458477
bug documentation duplicate enhancement good first issue GraduateInterview
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu. In enim justo, rhoncus ut, imperdiet a, venenatis vitae, justo. Nullam dictum felis eu pede mollis pretium. Integer tincidunt. Cras dapibus. Vivamus elementum semper nisi. Aenean vulputate eleifend tellus. Aenean leo ligula, porttitor eu, consequat vitae, eleifend ac, enim. Aliquam lorem ante, dapibus in, viverra quis, feugiat a, tellus. Phasellus viverra nulla ut metus varius laoreet. Quisque rutrum. Aenean imperdiet. Etiam ultricies nisi vel augue. Curabitur ullamcorper ultricies nisi. Nam eget dui. Etiam rhoncus. Maecenas tempus, tellus eget condimentum rhoncus, sem quam semper libero, sit amet adipiscing sem neque sed ipsum. Nam quam nunc, blandit vel, luctus pulvinar, hendrerit id, lorem. Maecenas nec odio et ante tincidunt tempus. Donec vitae sapien ut libero venenatis faucibus. Nullam quis ante. Etiam sit amet orci eget eros faucibus tincidunt. Duis leo. Sed fringilla mauris sit amet nibh. Donec sodales sagittis magna. Sed consequat, leo eget bibendum sodales, augue velit cursus nunc,
1.0
[Chore] Graduate Attendees for interview on 2022-03-30 -werw059458477 - Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Aenean commodo ligula eget dolor. Aenean massa. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Donec quam felis, ultricies nec, pellentesque eu, pretium quis, sem. Nulla consequat massa quis enim. Donec pede justo, fringilla vel, aliquet nec, vulputate eget, arcu. In enim justo, rhoncus ut, imperdiet a, venenatis vitae, justo. Nullam dictum felis eu pede mollis pretium. Integer tincidunt. Cras dapibus. Vivamus elementum semper nisi. Aenean vulputate eleifend tellus. Aenean leo ligula, porttitor eu, consequat vitae, eleifend ac, enim. Aliquam lorem ante, dapibus in, viverra quis, feugiat a, tellus. Phasellus viverra nulla ut metus varius laoreet. Quisque rutrum. Aenean imperdiet. Etiam ultricies nisi vel augue. Curabitur ullamcorper ultricies nisi. Nam eget dui. Etiam rhoncus. Maecenas tempus, tellus eget condimentum rhoncus, sem quam semper libero, sit amet adipiscing sem neque sed ipsum. Nam quam nunc, blandit vel, luctus pulvinar, hendrerit id, lorem. Maecenas nec odio et ante tincidunt tempus. Donec vitae sapien ut libero venenatis faucibus. Nullam quis ante. Etiam sit amet orci eget eros faucibus tincidunt. Duis leo. Sed fringilla mauris sit amet nibh. Donec sodales sagittis magna. Sed consequat, leo eget bibendum sodales, augue velit cursus nunc,
non_priority
graduate attendees for interview on lorem ipsum dolor sit amet consectetuer adipiscing elit aenean commodo ligula eget dolor aenean massa cum sociis natoque penatibus et magnis dis parturient montes nascetur ridiculus mus donec quam felis ultricies nec pellentesque eu pretium quis sem nulla consequat massa quis enim donec pede justo fringilla vel aliquet nec vulputate eget arcu in enim justo rhoncus ut imperdiet a venenatis vitae justo nullam dictum felis eu pede mollis pretium integer tincidunt cras dapibus vivamus elementum semper nisi aenean vulputate eleifend tellus aenean leo ligula porttitor eu consequat vitae eleifend ac enim aliquam lorem ante dapibus in viverra quis feugiat a tellus phasellus viverra nulla ut metus varius laoreet quisque rutrum aenean imperdiet etiam ultricies nisi vel augue curabitur ullamcorper ultricies nisi nam eget dui etiam rhoncus maecenas tempus tellus eget condimentum rhoncus sem quam semper libero sit amet adipiscing sem neque sed ipsum nam quam nunc blandit vel luctus pulvinar hendrerit id lorem maecenas nec odio et ante tincidunt tempus donec vitae sapien ut libero venenatis faucibus nullam quis ante etiam sit amet orci eget eros faucibus tincidunt duis leo sed fringilla mauris sit amet nibh donec sodales sagittis magna sed consequat leo eget bibendum sodales augue velit cursus nunc
0
6,301
4,216,724,871
IssuesEvent
2016-06-30 10:17:18
ff36/halo-gui
https://api.github.com/repos/ff36/halo-gui
closed
Opening property modal reloads table
bug urgent usability ux
If you open a property modal with a filter applied to the table, the table clears the filter and reloads. This should not happen. I also noticed that you cannot select the filter text.
True
Opening property modal reloads table - If you open a property modal with a filter applied to the table, the table clears the filter and reloads. This should not happen. I also noticed that you cannot select the filter text.
non_priority
opening property modal reloads table if you open a property modal with a filter applied to the table the table clears the filter and reloads this should not happen i also noticed that you cannot select the filter text
0
248,418
26,785,157,169
IssuesEvent
2023-02-01 01:44:36
raindigi/site-landing
https://api.github.com/repos/raindigi/site-landing
opened
CVE-2020-7768 (High) detected in grpc-1.16.1.tgz
security vulnerability
## CVE-2020-7768 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grpc-1.16.1.tgz</b></p></summary> <p>gRPC Library for Node</p> <p>Library home page: <a href="https://registry.npmjs.org/grpc/-/grpc-1.16.1.tgz">https://registry.npmjs.org/grpc/-/grpc-1.16.1.tgz</a></p> <p>Path to dependency file: /site-landing/package.json</p> <p>Path to vulnerable library: /node_modules/@firebase/firestore/node_modules/grpc/package.json</p> <p> Dependency Hierarchy: - firestore-0.9.3.tgz (Root Library) - :x: **grpc-1.16.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. <p>Publish Date: 2020-11-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7768>CVE-2020-7768</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7768</a></p> <p>Release Date: 2020-11-11</p> <p>Fix Resolution (grpc): 1.24.4</p> <p>Direct dependency fix Resolution (@firebase/firestore): 1.3.1-canary.4771184</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7768 (High) detected in grpc-1.16.1.tgz - ## CVE-2020-7768 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grpc-1.16.1.tgz</b></p></summary> <p>gRPC Library for Node</p> <p>Library home page: <a href="https://registry.npmjs.org/grpc/-/grpc-1.16.1.tgz">https://registry.npmjs.org/grpc/-/grpc-1.16.1.tgz</a></p> <p>Path to dependency file: /site-landing/package.json</p> <p>Path to vulnerable library: /node_modules/@firebase/firestore/node_modules/grpc/package.json</p> <p> Dependency Hierarchy: - firestore-0.9.3.tgz (Root Library) - :x: **grpc-1.16.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package grpc before 1.24.4; the package @grpc/grpc-js before 1.1.8 are vulnerable to Prototype Pollution via loadPackageDefinition. <p>Publish Date: 2020-11-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7768>CVE-2020-7768</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7768</a></p> <p>Release Date: 2020-11-11</p> <p>Fix Resolution (grpc): 1.24.4</p> <p>Direct dependency fix Resolution (@firebase/firestore): 1.3.1-canary.4771184</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in grpc tgz cve high severity vulnerability vulnerable library grpc tgz grpc library for node library home page a href path to dependency file site landing package json path to vulnerable library node modules firebase firestore node modules grpc package json dependency hierarchy firestore tgz root library x grpc tgz vulnerable library found in base branch master vulnerability details the package grpc before the package grpc grpc js before are vulnerable to prototype pollution via loadpackagedefinition publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution grpc direct dependency fix resolution firebase firestore canary step up your open source security game with mend
0
63,426
12,321,868,158
IssuesEvent
2020-05-13 09:24:30
Regalis11/Barotrauma
https://api.github.com/repos/Regalis11/Barotrauma
closed
Spawnsub command not working
Bug Code
- [X] I have searched the issue tracker to check if the issue has already been reported. **Description** Im not being able to use the "spawnsub" command, i always get a kinda object not set to reference or something. At first i thought i was putting the name incorrectly but it seems to not be the problem, **Version** Stable Windows 10 (Windows/Linux/Mac).
1.0
Spawnsub command not working - - [X] I have searched the issue tracker to check if the issue has already been reported. **Description** Im not being able to use the "spawnsub" command, i always get a kinda object not set to reference or something. At first i thought i was putting the name incorrectly but it seems to not be the problem, **Version** Stable Windows 10 (Windows/Linux/Mac).
non_priority
spawnsub command not working i have searched the issue tracker to check if the issue has already been reported description im not being able to use the spawnsub command i always get a kinda object not set to reference or something at first i thought i was putting the name incorrectly but it seems to not be the problem version stable windows windows linux mac
0
49,968
10,436,734,704
IssuesEvent
2019-09-17 20:15:10
MicrosoftDocs/visualstudio-docs
https://api.github.com/repos/MicrosoftDocs/visualstudio-docs
closed
Add documentation for new Performance rule CA1825 (AvoidZeroLengthArrayAllocations) in FxCop analyzers
Pri2 doc-idea visual-studio-windows/prod vs-ide-code-analysis/tech
1. Does not exist in legacy FxCop 2. Rule Implementation: https://github.com/dotnet/roslyn-analyzers/blob/32d8f1e397439035f0ecb5f61a9e672225f0ecdb/src/Microsoft.NetCore.Analyzers/Core/Runtime/AvoidZeroLengthArrayAllocations.cs#L14 3. Rule message and description: https://github.com/dotnet/roslyn-analyzers/blob/760b9c9188cf95ec6ab8cbadb75a1d129d15442f/src/Microsoft.NetCore.Analyzers/Core/Runtime/SystemRuntimeAnalyzersResources.resx#L270-L275 ``` &lt;data name="AvoidZeroLengthArrayAllocationsTitle" xml:space="preserve"&gt; &lt;value&gt;Avoid zero-length array allocations.&lt;/value&gt; &lt;/data&gt; &lt;data name="AvoidZeroLengthArrayAllocationsMessage" xml:space="preserve"&gt; &lt;value&gt;Avoid unnecessary zero-length array allocations. Use {0} instead.&lt;/value&gt; &lt;/data&gt; ``` 4. Unit tests: https://github.com/dotnet/roslyn-analyzers/blob/9c08642f76abffb8cce34aa1971a046e69ce710d/src/Microsoft.NetCore.Analyzers/UnitTests/Runtime/AvoidZeroLengthArrayAllocationsTests.cs#L18 --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: a6821238-fc59-9229-824a-c7ddc6d6e98b * Version Independent ID: 518e70a1-9dc2-be79-76f7-13689ebacaea * Content: [Performance Warnings - Visual Studio](https://docs.microsoft.com/en-us/visualstudio/code-quality/performance-warnings?view=vs-2019) * Content Source: [docs/code-quality/performance-warnings.md](https://github.com/MicrosoftDocs/visualstudio-docs/blob/master/docs/code-quality/performance-warnings.md) * Product: **visual-studio-windows** * Technology: **vs-ide-code-analysis** * GitHub Login: @gewarren * Microsoft Alias: **gewarren**
1.0
Add documentation for new Performance rule CA1825 (AvoidZeroLengthArrayAllocations) in FxCop analyzers - 1. Does not exist in legacy FxCop 2. Rule Implementation: https://github.com/dotnet/roslyn-analyzers/blob/32d8f1e397439035f0ecb5f61a9e672225f0ecdb/src/Microsoft.NetCore.Analyzers/Core/Runtime/AvoidZeroLengthArrayAllocations.cs#L14 3. Rule message and description: https://github.com/dotnet/roslyn-analyzers/blob/760b9c9188cf95ec6ab8cbadb75a1d129d15442f/src/Microsoft.NetCore.Analyzers/Core/Runtime/SystemRuntimeAnalyzersResources.resx#L270-L275 ``` &lt;data name="AvoidZeroLengthArrayAllocationsTitle" xml:space="preserve"&gt; &lt;value&gt;Avoid zero-length array allocations.&lt;/value&gt; &lt;/data&gt; &lt;data name="AvoidZeroLengthArrayAllocationsMessage" xml:space="preserve"&gt; &lt;value&gt;Avoid unnecessary zero-length array allocations. Use {0} instead.&lt;/value&gt; &lt;/data&gt; ``` 4. Unit tests: https://github.com/dotnet/roslyn-analyzers/blob/9c08642f76abffb8cce34aa1971a046e69ce710d/src/Microsoft.NetCore.Analyzers/UnitTests/Runtime/AvoidZeroLengthArrayAllocationsTests.cs#L18 --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: a6821238-fc59-9229-824a-c7ddc6d6e98b * Version Independent ID: 518e70a1-9dc2-be79-76f7-13689ebacaea * Content: [Performance Warnings - Visual Studio](https://docs.microsoft.com/en-us/visualstudio/code-quality/performance-warnings?view=vs-2019) * Content Source: [docs/code-quality/performance-warnings.md](https://github.com/MicrosoftDocs/visualstudio-docs/blob/master/docs/code-quality/performance-warnings.md) * Product: **visual-studio-windows** * Technology: **vs-ide-code-analysis** * GitHub Login: @gewarren * Microsoft Alias: **gewarren**
non_priority
add documentation for new performance rule avoidzerolengtharrayallocations in fxcop analyzers does not exist in legacy fxcop rule implementation rule message and description lt data name avoidzerolengtharrayallocationstitle xml space preserve gt lt value gt avoid zero length array allocations lt value gt lt data gt lt data name avoidzerolengtharrayallocationsmessage xml space preserve gt lt value gt avoid unnecessary zero length array allocations use instead lt value gt lt data gt unit tests document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source product visual studio windows technology vs ide code analysis github login gewarren microsoft alias gewarren
0
61,785
12,195,649,171
IssuesEvent
2020-04-29 17:43:48
kwk/test-llvm-bz-import-5
https://api.github.com/repos/kwk/test-llvm-bz-import-5
opened
[PATCH] Fix wint_t for Solaris, fix Linux wint_t test, fix Linux wint_t stdint.h
BZ-BUG-STATUS: NEW clang/LLVM Codegen dummy import from bugzilla
This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=9772.
1.0
[PATCH] Fix wint_t for Solaris, fix Linux wint_t test, fix Linux wint_t stdint.h - This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=9772.
non_priority
fix wint t for solaris fix linux wint t test fix linux wint t stdint h this issue was imported from bugzilla
0
133,325
18,858,228,110
IssuesEvent
2021-11-12 09:31:41
Andrey-1992/quick-news-ui
https://api.github.com/repos/Andrey-1992/quick-news-ui
closed
Test accessibility with LightHouse
enhancement Design & Layout Css Styling Deployment Accessibility Accessibility Test
As a developer, I should be able to test and pass the accessibility standards with Lighthouse.
1.0
Test accessibility with LightHouse - As a developer, I should be able to test and pass the accessibility standards with Lighthouse.
non_priority
test accessibility with lighthouse as a developer i should be able to test and pass the accessibility standards with lighthouse
0
219,763
16,850,658,941
IssuesEvent
2021-06-20 12:45:29
amzn/selling-partner-api-docs
https://api.github.com/repos/amzn/selling-partner-api-docs
opened
How to generate the PHP code from java library downloaded
documentation enhancement request
I was able to generate the php code for selling-partner-api-models/models/authorization-api-model/authorization.json using command java -jar /app/swagger-codegen-cli.jar generate -i /app/selling-partner-api-models/models/authorization-api-model/authorization.json -l php -o /var/tmp/php_api_client_ani Now I want to generate the php files for - https://github.com/amzn/selling-partner-api-models/tree/main/clients/sellingpartner-api-documents-helper-java but there is no .json file in that folder, so how can we generate the php files? Any idea? if this is missing or any way to generate it without json file?
1.0
How to generate the PHP code from java library downloaded - I was able to generate the php code for selling-partner-api-models/models/authorization-api-model/authorization.json using command java -jar /app/swagger-codegen-cli.jar generate -i /app/selling-partner-api-models/models/authorization-api-model/authorization.json -l php -o /var/tmp/php_api_client_ani Now I want to generate the php files for - https://github.com/amzn/selling-partner-api-models/tree/main/clients/sellingpartner-api-documents-helper-java but there is no .json file in that folder, so how can we generate the php files? Any idea? if this is missing or any way to generate it without json file?
non_priority
how to generate the php code from java library downloaded i was able to generate the php code for selling partner api models models authorization api model authorization json using command java jar app swagger codegen cli jar generate i app selling partner api models models authorization api model authorization json l php o var tmp php api client ani now i want to generate the php files for but there is no json file in that folder so how can we generate the php files any idea if this is missing or any way to generate it without json file
0
268,240
23,352,928,353
IssuesEvent
2022-08-10 03:16:51
Tencent/bk-ci
https://api.github.com/repos/Tencent/bk-ci
closed
bug: go agent定时日志切割重试逻辑不生效
kind/bug for gray for test area/ci/backend grayed streams/tested streams/for test streams/for gray streams/done
go agent中的定时日志切割的逻辑因为 break loop 使用错误导致管道一旦关闭就无法重新切割日志 <img width="1243" alt="image" src="https://user-images.githubusercontent.com/33863729/181181561-713d0237-0e7d-46fd-a98c-25111820fa26.png">
3.0
bug: go agent定时日志切割重试逻辑不生效 - go agent中的定时日志切割的逻辑因为 break loop 使用错误导致管道一旦关闭就无法重新切割日志 <img width="1243" alt="image" src="https://user-images.githubusercontent.com/33863729/181181561-713d0237-0e7d-46fd-a98c-25111820fa26.png">
non_priority
bug go agent定时日志切割重试逻辑不生效 go agent中的定时日志切割的逻辑因为 break loop 使用错误导致管道一旦关闭就无法重新切割日志 img width alt image src
0
198,053
15,699,472,066
IssuesEvent
2021-03-26 08:32:17
proofit404/stories
https://api.github.com/repos/proofit404/stories
reopened
Document expected application exception pattern.
documentation
#### Approach Exception arguments aren't necessary. We have `state` object accessible. See https://github.com/proofit404/stories/issues/627#issuecomment-803674101 #### HTTP Status codes HTTP codes does not match to domain errors well. If we respond with 400 HTTP status code, but expect our application to have 12 variants of different behavior. For example, ``` Администратор просматривает запрос на отчёт, который запросил человек не имеющий права в конкретном данном случае работать с тем подразделением, которое присутствует в данных для отчёта. Мы не можем отдать ему 403 код, потому что у него есть право на работу с данным запросом. И самое важное, что в данном случае мы бы хотели предложить ему выдать права доступа инициатору запроса или же перевести отчёт в статус отклонённых с уведомлением инициатора. ```
1.0
Document expected application exception pattern. - #### Approach Exception arguments aren't necessary. We have `state` object accessible. See https://github.com/proofit404/stories/issues/627#issuecomment-803674101 #### HTTP Status codes HTTP codes does not match to domain errors well. If we respond with 400 HTTP status code, but expect our application to have 12 variants of different behavior. For example, ``` Администратор просматривает запрос на отчёт, который запросил человек не имеющий права в конкретном данном случае работать с тем подразделением, которое присутствует в данных для отчёта. Мы не можем отдать ему 403 код, потому что у него есть право на работу с данным запросом. И самое важное, что в данном случае мы бы хотели предложить ему выдать права доступа инициатору запроса или же перевести отчёт в статус отклонённых с уведомлением инициатора. ```
non_priority
document expected application exception pattern approach exception arguments aren t necessary we have state object accessible see http status codes http codes does not match to domain errors well if we respond with http status code but expect our application to have variants of different behavior for example администратор просматривает запрос на отчёт который запросил человек не имеющий права в конкретном данном случае работать с тем подразделением которое присутствует в данных для отчёта мы не можем отдать ему код потому что у него есть право на работу с данным запросом и самое важное что в данном случае мы бы хотели предложить ему выдать права доступа инициатору запроса или же перевести отчёт в статус отклонённых с уведомлением инициатора
0
7,664
9,921,631,778
IssuesEvent
2019-06-30 19:58:17
sisbell/tor-android-service
https://api.github.com/repos/sisbell/tor-android-service
closed
Tor Install Changes
Orbit Compatibility
- TOR_VERSION field has changed - Change preference value on new install https://github.com/guardianproject/orbot/commit/455757726d519ac56cd53eaed29c3abef25707d4
True
Tor Install Changes - - TOR_VERSION field has changed - Change preference value on new install https://github.com/guardianproject/orbot/commit/455757726d519ac56cd53eaed29c3abef25707d4
non_priority
tor install changes tor version field has changed change preference value on new install
0
258,803
19,574,069,098
IssuesEvent
2022-01-04 13:32:23
bank2ynab/bank2ynab
https://api.github.com/repos/bank2ynab/bank2ynab
closed
More helpful API error messages
enhancement documentation help wanted user support
**Is your feature request related to a problem? Please describe.** The API error messages are rather generic and I think we can improve them - in particular the error 401 `API access token missing, invalid, revoked, or expired` ([link to code line](https://github.com/bank2ynab/bank2ynab/blob/develop/bank2ynab.py#L883)) because users are very likely to encounter this error on their first try of the new API-enabled bank2ynab. **Describe the solution you'd like** The error messages should be longer. In particular, they should not only describe the problem but also describe possible solutions and/or link to our wiki and/or the YNAB (API?) help pages for details. **Describe alternatives you've considered** A first step is to provide a little guidance right in the error message. **Additional context** Relevant link for the 401 error: https://api.youneedabudget.com/#personal-access-tokens I prefer to link directly to YNAB pages because then we don't have to maintain our own wiki page and run the risk of it being outdated. OTOH a wiki page can contain anything we want!
1.0
More helpful API error messages - **Is your feature request related to a problem? Please describe.** The API error messages are rather generic and I think we can improve them - in particular the error 401 `API access token missing, invalid, revoked, or expired` ([link to code line](https://github.com/bank2ynab/bank2ynab/blob/develop/bank2ynab.py#L883)) because users are very likely to encounter this error on their first try of the new API-enabled bank2ynab. **Describe the solution you'd like** The error messages should be longer. In particular, they should not only describe the problem but also describe possible solutions and/or link to our wiki and/or the YNAB (API?) help pages for details. **Describe alternatives you've considered** A first step is to provide a little guidance right in the error message. **Additional context** Relevant link for the 401 error: https://api.youneedabudget.com/#personal-access-tokens I prefer to link directly to YNAB pages because then we don't have to maintain our own wiki page and run the risk of it being outdated. OTOH a wiki page can contain anything we want!
non_priority
more helpful api error messages is your feature request related to a problem please describe the api error messages are rather generic and i think we can improve them in particular the error api access token missing invalid revoked or expired because users are very likely to encounter this error on their first try of the new api enabled describe the solution you d like the error messages should be longer in particular they should not only describe the problem but also describe possible solutions and or link to our wiki and or the ynab api help pages for details describe alternatives you ve considered a first step is to provide a little guidance right in the error message additional context relevant link for the error i prefer to link directly to ynab pages because then we don t have to maintain our own wiki page and run the risk of it being outdated otoh a wiki page can contain anything we want
0
173,283
21,155,258,879
IssuesEvent
2022-04-07 02:02:12
Aivolt1/u-i-u-x-volt-ai
https://api.github.com/repos/Aivolt1/u-i-u-x-volt-ai
reopened
CVE-2022-0355 (High) detected in simple-get-3.1.0.tgz
security vulnerability
## CVE-2022-0355 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>simple-get-3.1.0.tgz</b></p></summary> <p>Simplest way to make http get requests. Supports HTTPS, redirects, gzip/deflate, streams in < 100 lines.</p> <p>Library home page: <a href="https://registry.npmjs.org/simple-get/-/simple-get-3.1.0.tgz">https://registry.npmjs.org/simple-get/-/simple-get-3.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/simple-get</p> <p> Dependency Hierarchy: - gatsby-plugin-manifest-3.9.0.tgz (Root Library) - sharp-0.28.3.tgz - :x: **simple-get-3.1.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Exposure of Sensitive Information to an Unauthorized Actor in NPM simple-get prior to 4.0.1. <p>Publish Date: 2022-01-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0355>CVE-2022-0355</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0355">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0355</a></p> <p>Release Date: 2022-01-26</p> <p>Fix Resolution: simple-get - 4.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-0355 (High) detected in simple-get-3.1.0.tgz - ## CVE-2022-0355 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>simple-get-3.1.0.tgz</b></p></summary> <p>Simplest way to make http get requests. Supports HTTPS, redirects, gzip/deflate, streams in < 100 lines.</p> <p>Library home page: <a href="https://registry.npmjs.org/simple-get/-/simple-get-3.1.0.tgz">https://registry.npmjs.org/simple-get/-/simple-get-3.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/simple-get</p> <p> Dependency Hierarchy: - gatsby-plugin-manifest-3.9.0.tgz (Root Library) - sharp-0.28.3.tgz - :x: **simple-get-3.1.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Exposure of Sensitive Information to an Unauthorized Actor in NPM simple-get prior to 4.0.1. <p>Publish Date: 2022-01-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0355>CVE-2022-0355</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0355">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0355</a></p> <p>Release Date: 2022-01-26</p> <p>Fix Resolution: simple-get - 4.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in simple get tgz cve high severity vulnerability vulnerable library simple get tgz simplest way to make http get requests supports https redirects gzip deflate streams in library home page a href path to dependency file package json path to vulnerable library node modules simple get dependency hierarchy gatsby plugin manifest tgz root library sharp tgz x simple get tgz vulnerable library found in base branch master vulnerability details exposure of sensitive information to an unauthorized actor in npm simple get prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution simple get step up your open source security game with whitesource
0
46,684
13,055,959,279
IssuesEvent
2020-07-30 03:14:20
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
[steamshovel] ipdf I3DOMLikelihoodArtist causes shovelart to segfault on exit (Trac #1711)
Incomplete Migration Migrated from Trac combo reconstruction defect
Migrated from https://code.icecube.wisc.edu/ticket/1711 ```json { "status": "closed", "changetime": "2019-02-13T14:14:55", "description": "Simply loading `icecube.ipdf.artists` causes `shovelart.so` to segfault on exit. It is not clear why this is happening. This code was disabled in r146010/IceCube, but the issue still needs to be fixed. \n\nThis segfault was causing the doc build to segfault and fail even though the docs build correctly. See the complete stacktrace at http://builds.icecube.wisc.edu/builders/docs/builds/59/steps/compile_2/logs/stdio", "reporter": "kjmeagher", "cc": "nega", "resolution": "fixed", "_ts": "1550067295757382", "component": "combo reconstruction", "summary": "[steamshovel] ipdf I3DOMLikelihoodArtist causes shovelart to segfault on exit", "priority": "normal", "keywords": "", "time": "2016-05-18T09:12:15", "milestone": "", "owner": "hdembinski", "type": "defect" } ```
1.0
[steamshovel] ipdf I3DOMLikelihoodArtist causes shovelart to segfault on exit (Trac #1711) - Migrated from https://code.icecube.wisc.edu/ticket/1711 ```json { "status": "closed", "changetime": "2019-02-13T14:14:55", "description": "Simply loading `icecube.ipdf.artists` causes `shovelart.so` to segfault on exit. It is not clear why this is happening. This code was disabled in r146010/IceCube, but the issue still needs to be fixed. \n\nThis segfault was causing the doc build to segfault and fail even though the docs build correctly. See the complete stacktrace at http://builds.icecube.wisc.edu/builders/docs/builds/59/steps/compile_2/logs/stdio", "reporter": "kjmeagher", "cc": "nega", "resolution": "fixed", "_ts": "1550067295757382", "component": "combo reconstruction", "summary": "[steamshovel] ipdf I3DOMLikelihoodArtist causes shovelart to segfault on exit", "priority": "normal", "keywords": "", "time": "2016-05-18T09:12:15", "milestone": "", "owner": "hdembinski", "type": "defect" } ```
non_priority
ipdf causes shovelart to segfault on exit trac migrated from json status closed changetime description simply loading icecube ipdf artists causes shovelart so to segfault on exit it is not clear why this is happening this code was disabled in icecube but the issue still needs to be fixed n nthis segfault was causing the doc build to segfault and fail even though the docs build correctly see the complete stacktrace at reporter kjmeagher cc nega resolution fixed ts component combo reconstruction summary ipdf causes shovelart to segfault on exit priority normal keywords time milestone owner hdembinski type defect
0
17,252
10,675,526,732
IssuesEvent
2019-10-21 11:54:10
dotnet/corefx
https://api.github.com/repos/dotnet/corefx
closed
[UWP6.0] Rect and Size in System.Runtime.WindowsRuntime has different exception thrown for size validation
area-System.Runtime.InteropServices bug os-windows-uwp
As suggested in #21658 - disabling tests against this issue. ``` Windows.Foundation.Tests.SizeTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(51,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(51,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(91,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass7_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(91,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass7_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(43,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(43,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(71,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass5_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(71,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass5_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(66,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(66,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(188,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass16_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(188,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass16_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(58,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(58,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(171,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass14_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(171,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass14_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() ``
1.0
[UWP6.0] Rect and Size in System.Runtime.WindowsRuntime has different exception thrown for size validation - As suggested in #21658 - disabling tests against this issue. ``` Windows.Foundation.Tests.SizeTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(51,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(51,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(91,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass7_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(91,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass7_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(43,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(43,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(71,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass5_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.SizeTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\SizeTests.cs(71,0): at Windows.Foundation.Tests.SizeTests.<>c__DisplayClass5_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(66,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(66,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass3_0.<Ctor_NegativeHeight_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(188,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass16_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Height_SetNegative_ThrowsArgumentOutOfRangeException(height: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(188,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass16_0.<Height_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(58,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(58,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass2_0.<Ctor_NegativeWidth_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -1) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(171,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass14_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() Windows.Foundation.Tests.RectTests.Width_SetNegative_ThrowsArgumentOutOfRangeException(width: -ì) [FAIL] Assert.Throws() Failure Expected: typeof(System.ArgumentOutOfRangeException) Actual: typeof(System.ArgumentException): Value does not fall within the expected range. Stack Trace: D:\repos\corefxCopy\corefx\src\System.Runtime.WindowsRuntime\tests\Windows\Foundation\RectTests.cs(171,0): at Windows.Foundation.Tests.RectTests.<>c__DisplayClass14_0.<Width_SetNegative_ThrowsArgumentOutOfRangeException>b__0() ``
non_priority
rect and size in system runtime windowsruntime has different exception thrown for size validation as suggested in disabling tests against this issue windows foundation tests sizetests ctor negativeheight throwsargumentoutofrangeexception height assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests ctor negativeheight throwsargumentoutofrangeexception height ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests height setnegative throwsargumentoutofrangeexception height assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests height setnegative throwsargumentoutofrangeexception height ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests ctor negativewidth throwsargumentoutofrangeexception width assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests ctor negativewidth throwsargumentoutofrangeexception width ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests width setnegative throwsargumentoutofrangeexception width assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests sizetests width setnegative throwsargumentoutofrangeexception width ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation sizetests cs at windows foundation tests sizetests c b windows foundation tests recttests ctor negativeheight throwsargumentoutofrangeexception height assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests ctor negativeheight throwsargumentoutofrangeexception height ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests height setnegative throwsargumentoutofrangeexception height assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests height setnegative throwsargumentoutofrangeexception height ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests ctor negativewidth throwsargumentoutofrangeexception width assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests ctor negativewidth throwsargumentoutofrangeexception width ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests width setnegative throwsargumentoutofrangeexception width assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b windows foundation tests recttests width setnegative throwsargumentoutofrangeexception width ì assert throws failure expected typeof system argumentoutofrangeexception actual typeof system argumentexception value does not fall within the expected range stack trace d repos corefxcopy corefx src system runtime windowsruntime tests windows foundation recttests cs at windows foundation tests recttests c b
0
4,467
7,332,724,583
IssuesEvent
2018-03-05 17:06:51
cedardevs/psi
https://api.github.com/repos/cedardevs/psi
closed
IsoLite parsing happens in script-wrapper
EPIC: PSI DSCOVR datastream psi-processor ready script-wrapper
Instead of a topic container IsoLite and a service to transform those messages into the OS ES json payload, we want all of that to happen in one service.
1.0
IsoLite parsing happens in script-wrapper - Instead of a topic container IsoLite and a service to transform those messages into the OS ES json payload, we want all of that to happen in one service.
non_priority
isolite parsing happens in script wrapper instead of a topic container isolite and a service to transform those messages into the os es json payload we want all of that to happen in one service
0
42,219
9,188,147,235
IssuesEvent
2019-03-06 06:17:53
electrumsv/electrumsv
https://api.github.com/repos/electrumsv/electrumsv
opened
Test running with missing hardware libs works fine
code quality
Made fixes so Trezor and Keepkey are fine. Need others to check ledger / DBB
1.0
Test running with missing hardware libs works fine - Made fixes so Trezor and Keepkey are fine. Need others to check ledger / DBB
non_priority
test running with missing hardware libs works fine made fixes so trezor and keepkey are fine need others to check ledger dbb
0
56,455
11,584,170,194
IssuesEvent
2020-02-22 15:47:35
WarEmu/WarBugs
https://api.github.com/repos/WarEmu/WarBugs
closed
[NPC] Greenskin chapter 9: Quest giver "Ugra" is missing his quest giver symbol
NPC Sourcecode
The quest giver "Ugra" in the ch 9 Greenskin camp has no quest giver symbol above his 'ead like usual. ![duzgat_015](https://user-images.githubusercontent.com/30193675/49788773-85338500-fd2a-11e8-9dc0-68264c7b4a55.jpg)
1.0
[NPC] Greenskin chapter 9: Quest giver "Ugra" is missing his quest giver symbol - The quest giver "Ugra" in the ch 9 Greenskin camp has no quest giver symbol above his 'ead like usual. ![duzgat_015](https://user-images.githubusercontent.com/30193675/49788773-85338500-fd2a-11e8-9dc0-68264c7b4a55.jpg)
non_priority
greenskin chapter quest giver ugra is missing his quest giver symbol the quest giver ugra in the ch greenskin camp has no quest giver symbol above his ead like usual
0
140,886
18,927,136,418
IssuesEvent
2021-11-17 10:43:32
sultanabubaker/Rem_Ren_Test
https://api.github.com/repos/sultanabubaker/Rem_Ren_Test
opened
CVE-2019-10744 (High) detected in lodash-4.17.4.tgz
security vulnerability
## CVE-2019-10744 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.4.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz</a></p> <p>Path to dependency file: Rem_Ren_Test/package.json</p> <p>Path to vulnerable library: /node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - :x: **lodash-4.17.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sultanabubaker/Rem_Ren_Test/commit/8bb0a94bd7adff96ab95fdccc13c0009d2c7a789">8bb0a94bd7adff96ab95fdccc13c0009d2c7a789</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload. <p>Publish Date: 2019-07-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10744>CVE-2019-10744</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jf85-cpcp-j695">https://github.com/advisories/GHSA-jf85-cpcp-j695</a></p> <p>Release Date: 2019-07-26</p> <p>Fix Resolution: lodash-4.17.12, lodash-amd-4.17.12, lodash-es-4.17.12, lodash.defaultsdeep-4.6.1, lodash.merge- 4.6.2, lodash.mergewith-4.6.2, lodash.template-4.5.0</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.4","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"lodash:4.17.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.12, lodash-amd-4.17.12, lodash-es-4.17.12, lodash.defaultsdeep-4.6.1, lodash.merge- 4.6.2, lodash.mergewith-4.6.2, lodash.template-4.5.0"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-10744","vulnerabilityDetails":"Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10744","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-10744 (High) detected in lodash-4.17.4.tgz - ## CVE-2019-10744 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.4.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz</a></p> <p>Path to dependency file: Rem_Ren_Test/package.json</p> <p>Path to vulnerable library: /node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - :x: **lodash-4.17.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sultanabubaker/Rem_Ren_Test/commit/8bb0a94bd7adff96ab95fdccc13c0009d2c7a789">8bb0a94bd7adff96ab95fdccc13c0009d2c7a789</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload. <p>Publish Date: 2019-07-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10744>CVE-2019-10744</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jf85-cpcp-j695">https://github.com/advisories/GHSA-jf85-cpcp-j695</a></p> <p>Release Date: 2019-07-26</p> <p>Fix Resolution: lodash-4.17.12, lodash-amd-4.17.12, lodash-es-4.17.12, lodash.defaultsdeep-4.6.1, lodash.merge- 4.6.2, lodash.mergewith-4.6.2, lodash.template-4.5.0</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"lodash","packageVersion":"4.17.4","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"lodash:4.17.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"lodash-4.17.12, lodash-amd-4.17.12, lodash-es-4.17.12, lodash.defaultsdeep-4.6.1, lodash.merge- 4.6.2, lodash.mergewith-4.6.2, lodash.template-4.5.0"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2019-10744","vulnerabilityDetails":"Versions of lodash lower than 4.17.12 are vulnerable to Prototype Pollution. The function defaultsDeep could be tricked into adding or modifying properties of Object.prototype using a constructor payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10744","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in lodash tgz cve high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file rem ren test package json path to vulnerable library node modules lodash package json dependency hierarchy x lodash tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of lodash lower than are vulnerable to prototype pollution the function defaultsdeep could be tricked into adding or modifying properties of object prototype using a constructor payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash lodash amd lodash es lodash defaultsdeep lodash merge lodash mergewith lodash template check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree lodash isminimumfixversionavailable true minimumfixversion lodash lodash amd lodash es lodash defaultsdeep lodash merge lodash mergewith lodash template basebranches vulnerabilityidentifier cve vulnerabilitydetails versions of lodash lower than are vulnerable to prototype pollution the function defaultsdeep could be tricked into adding or modifying properties of object prototype using a constructor payload vulnerabilityurl
0
47,325
7,315,398,891
IssuesEvent
2018-03-01 10:54:22
MarcioJales/Sperf
https://api.github.com/repos/MarcioJales/Sperf
closed
sperf_thrnum?
documentation question
@VitorRamos Vi que a documentção ainda refere-se a `sperf_thrnum`, mas não vejo mais essa função como opção em `sperfops.h`
1.0
sperf_thrnum? - @VitorRamos Vi que a documentção ainda refere-se a `sperf_thrnum`, mas não vejo mais essa função como opção em `sperfops.h`
non_priority
sperf thrnum vitorramos vi que a documentção ainda refere se a sperf thrnum mas não vejo mais essa função como opção em sperfops h
0
38,118
15,527,978,258
IssuesEvent
2021-03-13 08:47:48
aws-controllers-k8s/community
https://api.github.com/repos/aws-controllers-k8s/community
opened
AWS Organisations service controller
Service Controller
## New ACK Service Controller Support for AWS Organisations API ### List of API resources List the API resources in order of importance to you: 1) CreateAccount 1) DescribeAccountStatus 1) ListAccountsForParent 1) DescribeAccount 1) InviteAccountToOrganisation 1) [the rest]
1.0
AWS Organisations service controller - ## New ACK Service Controller Support for AWS Organisations API ### List of API resources List the API resources in order of importance to you: 1) CreateAccount 1) DescribeAccountStatus 1) ListAccountsForParent 1) DescribeAccount 1) InviteAccountToOrganisation 1) [the rest]
non_priority
aws organisations service controller new ack service controller support for aws organisations api list of api resources list the api resources in order of importance to you createaccount describeaccountstatus listaccountsforparent describeaccount inviteaccounttoorganisation
0
12,812
8,717,744,671
IssuesEvent
2018-12-07 18:08:07
jowein/forever
https://api.github.com/repos/jowein/forever
closed
CVE-2008-6218 High Severity Vulnerability detected by WhiteSource
security vulnerability
## CVE-2008-6218 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>libpngv1.2.2</b></p></summary> <p> <p>LIBPNG: Portable Network Graphics support, official libpng repository</p> <p>Library home page: <a href=https://github.com/hunter-packages/libpng.git>https://github.com/hunter-packages/libpng.git</a></p> <p>Found in commit: <a href="https://github.com/jowein/forever/commit/3f2a6b067e42d7858dce5bf690808a2abdb20d6d">3f2a6b067e42d7858dce5bf690808a2abdb20d6d</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (4)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /forever/pngset.c - /forever/pngrio.c - /forever/pngrtran.c - /forever/pngrutil.c </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file. <p>Publish Date: 2009-02-20 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218>CVE-2008-6218</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://security.gentoo.org/glsa/glsa-200903-28.xml">http://security.gentoo.org/glsa/glsa-200903-28.xml</a></p> <p>Release Date: 2009-03-14</p> <p>Fix Resolution: All libpng users should upgrade to the latest version >= libpng-1.2.35 </p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2008-6218 High Severity Vulnerability detected by WhiteSource - ## CVE-2008-6218 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>libpngv1.2.2</b></p></summary> <p> <p>LIBPNG: Portable Network Graphics support, official libpng repository</p> <p>Library home page: <a href=https://github.com/hunter-packages/libpng.git>https://github.com/hunter-packages/libpng.git</a></p> <p>Found in commit: <a href="https://github.com/jowein/forever/commit/3f2a6b067e42d7858dce5bf690808a2abdb20d6d">3f2a6b067e42d7858dce5bf690808a2abdb20d6d</a></p> </p> </details> </p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Library Source Files (4)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /forever/pngset.c - /forever/pngrio.c - /forever/pngrtran.c - /forever/pngrutil.c </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Memory leak in the png_handle_tEXt function in pngrutil.c in libpng before 1.2.33 rc02 and 1.4.0 beta36 allows context-dependent attackers to cause a denial of service (memory exhaustion) via a crafted PNG file. <p>Publish Date: 2009-02-20 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-6218>CVE-2008-6218</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://security.gentoo.org/glsa/glsa-200903-28.xml">http://security.gentoo.org/glsa/glsa-200903-28.xml</a></p> <p>Release Date: 2009-03-14</p> <p>Fix Resolution: All libpng users should upgrade to the latest version >= libpng-1.2.35 </p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high severity vulnerability detected by whitesource cve high severity vulnerability vulnerable library libpng portable network graphics support official libpng repository library home page a href found in commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries forever pngset c forever pngrio c forever pngrtran c forever pngrutil c vulnerability details memory leak in the png handle text function in pngrutil c in libpng before and allows context dependent attackers to cause a denial of service memory exhaustion via a crafted png file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution all libpng users should upgrade to the latest version libpng step up your open source security game with whitesource
0
10,524
7,203,444,419
IssuesEvent
2018-02-06 09:14:27
gnocchixyz/gnocchi
https://api.github.com/repos/gnocchixyz/gnocchi
closed
keepalive won't work with our uwsgi config
performance
It's not clear why yet, but with uwsgi http keepalive doesn't work with Gnocchi. even if we use http11-socket or, http-keepalive and add-header="Connection: Keep-Alive". The current workaround is to set `--add-header "Connection: close"`.
True
keepalive won't work with our uwsgi config - It's not clear why yet, but with uwsgi http keepalive doesn't work with Gnocchi. even if we use http11-socket or, http-keepalive and add-header="Connection: Keep-Alive". The current workaround is to set `--add-header "Connection: close"`.
non_priority
keepalive won t work with our uwsgi config it s not clear why yet but with uwsgi http keepalive doesn t work with gnocchi even if we use socket or http keepalive and add header connection keep alive the current workaround is to set add header connection close
0
115,968
24,834,939,944
IssuesEvent
2022-10-26 08:05:56
microsoft/vsmarketplace
https://api.github.com/repos/microsoft/vsmarketplace
closed
failed to install python extension in Jetson agx orin
vscode
Type: <b>Bug</b> I tried to install **python extension** in **Jetson agx orin**, but always failed, bug report below: ``` error 10:20:22.42: Failed to install Python Extension via Kernel Picker command warn 10:20:22.45: DataScience Error [Error: Failed to install the Python Extension. at _.installPythonExtensionViaKernelPicker (/home/orin/.vscode-server-insiders/extensions/ms-toolsai.jupyter-2022.8.1002431052/out/extension.node.js:2:2407793) at async a._executeContributedCommand (/home/orin/.vscode-server-insiders/bin/da76f93349a72022ca4670c1b84860304616aaa2/out/vs/workbench/api/node/extensionHostProcess.js:85:63914)] ``` VS Code version: Code - Insiders 1.70.0-insider (da76f93349a72022ca4670c1b84860304616aaa2, 2022-08-03T05:53:23.899Z) OS version: Windows_NT x64 10.0.19044 Modes: Remote OS version: Linux arm64 5.10.65-tegra Remote OS version: Linux x64 4.15.0-176-generic <!-- generated by issue reporter -->
1.0
failed to install python extension in Jetson agx orin - Type: <b>Bug</b> I tried to install **python extension** in **Jetson agx orin**, but always failed, bug report below: ``` error 10:20:22.42: Failed to install Python Extension via Kernel Picker command warn 10:20:22.45: DataScience Error [Error: Failed to install the Python Extension. at _.installPythonExtensionViaKernelPicker (/home/orin/.vscode-server-insiders/extensions/ms-toolsai.jupyter-2022.8.1002431052/out/extension.node.js:2:2407793) at async a._executeContributedCommand (/home/orin/.vscode-server-insiders/bin/da76f93349a72022ca4670c1b84860304616aaa2/out/vs/workbench/api/node/extensionHostProcess.js:85:63914)] ``` VS Code version: Code - Insiders 1.70.0-insider (da76f93349a72022ca4670c1b84860304616aaa2, 2022-08-03T05:53:23.899Z) OS version: Windows_NT x64 10.0.19044 Modes: Remote OS version: Linux arm64 5.10.65-tegra Remote OS version: Linux x64 4.15.0-176-generic <!-- generated by issue reporter -->
non_priority
failed to install python extension in jetson agx orin type bug i tried to install python extension in jetson agx orin but always failed bug report below error failed to install python extension via kernel picker command warn datascience error error failed to install the python extension at installpythonextensionviakernelpicker home orin vscode server insiders extensions ms toolsai jupyter out extension node js at async a executecontributedcommand home orin vscode server insiders bin out vs workbench api node extensionhostprocess js vs code version code insiders insider os version windows nt modes remote os version linux tegra remote os version linux generic
0
282,223
30,889,230,097
IssuesEvent
2023-08-04 02:25:39
madhans23/linux-4.1.15
https://api.github.com/repos/madhans23/linux-4.1.15
reopened
CVE-2019-19037 (Medium) detected in linux-stable-rtv4.1.33
Mend: dependency security vulnerability
## CVE-2019-19037 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/ext4/namei.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/ext4/namei.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero. Mend Note: After conducting further research, Mend has determined that versions v2.6.30-rc1-v4.9.207, v4.10-rc1-v4.14.160, v4.15-rc1--v4.19.91, v5.0-rc1--v5.4.6 and v5.5-rc1--v5.5-rc2 of Linux Kernel are vulnerable to CVE-2019-19037. <p>Publish Date: 2019-11-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19037>CVE-2019-19037</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2019-19037">https://www.linuxkernelcves.com/cves/CVE-2019-19037</a></p> <p>Release Date: 2019-11-21</p> <p>Fix Resolution: v4.9.208, v4.14.161, v4.19.92, v5.4.7, v5.5-rc3,</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-19037 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2019-19037 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/ext4/namei.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/ext4/namei.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero. Mend Note: After conducting further research, Mend has determined that versions v2.6.30-rc1-v4.9.207, v4.10-rc1-v4.14.160, v4.15-rc1--v4.19.91, v5.0-rc1--v5.4.6 and v5.5-rc1--v5.5-rc2 of Linux Kernel are vulnerable to CVE-2019-19037. <p>Publish Date: 2019-11-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-19037>CVE-2019-19037</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2019-19037">https://www.linuxkernelcves.com/cves/CVE-2019-19037</a></p> <p>Release Date: 2019-11-21</p> <p>Fix Resolution: v4.9.208, v4.14.161, v4.19.92, v5.4.7, v5.5-rc3,</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in base branch master vulnerable source files fs namei c fs namei c vulnerability details empty dir in fs namei c in the linux kernel through allows a null pointer dereference because read dirblock inode dirent htree can be zero mend note after conducting further research mend has determined that versions and of linux kernel are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
146,173
23,018,145,382
IssuesEvent
2022-07-22 00:18:57
opensearch-project/geospatial
https://api.github.com/repos/opensearch-project/geospatial
closed
[Proposal]: Low Level Implementation Details for Geo Shape Aggregation and future Geo related Features
enhancement Design
## Introduction This proposal talks about the low level implementation details for the Geo Shape aggregations. We will be covering what are the components/classes/interfaces required for the Geo Shape aggregations and *what should be the right place to put those components.* In whole proposal we will be using components, classes, interfaces terms interchangeably. As we will be focusing on the low level implementation details it is expected that reader is already aware that how indexing and query works on GeoShape in OpenSearch, what is a doc value and how it is used in the aggregation framework. ## Goal Goal of proposal is to answer the following questions. _Note: Module here refer to the different [libs](https://github.com/opensearch-project/OpenSearch/tree/main/libs), [modules](https://github.com/opensearch-project/OpenSearch/tree/main/modules) folders provided in the OpenSearch core repo._ ### P0 1. Which module we should use to write the Geo Shape Aggregation level interfaces? or should we directly go with the Geo-Spatial repo? 2. Which module we should use to write the Value Source boiler plate code for converting Doc Values back to specific classes for GeoShape, as they have some dependency between classes already present like [CoreValueSourceType](https://github.com/opensearch-project/OpenSearch/blob/main/server/src/main/java/org/opensearch/search/aggregations/support/CoreValuesSourceType.java) etc? ### P1 1. What should be the long term vision of Geo team around what is the right place to put the code related to Geo space? The code involves Geo FieldMapper(Geo Point and Geo Shape) used for indexing and querying, Geo Aggregations(both older and newer geo aggregations both on Point and Shape) and Value Source boiler plate code for converting Doc Values back to specific classes. 2. How we should do the migration of the code mentioned in `#1` to the module we decide to move? ### Assumptions 1. The XYPoint and XY shape related features will be added in the [Geo-Spatial](https://github.com/opensearch-project/geospatial) repo and it will be keep on happening. ### Why we need to answer the questions above? The answer to these questions will help us do the following: 1. As there will be a lot of common code between the aggregations and we will be abstracting that logic out, hence we need to make sure that we are abstracting them in the right place so that this is not a throw away work. 2. With the release of XY Point and XY shape in the Geo-Spatial plugin, we need to deicide in long term where we want to put all our Geo related features(in a backward compatible fashion), how we want to provide them to customers. 3. It will help us provide better estimate on the timelines, efforts for the launch of Geo Shape aggregations and the other features in the future like(GeoLineAggregation, GeoHexAggregations, Aggregations on XY Point and XY Shape). ## Current Architecture As of version 2.1 of OpenSearch the Geo related aggregations(which contains only GeoPoint aggregations) are present in the OpenSearch core repo. There are no aggregations present on the Geo Shape. The Field mapper which init the GeoShape mapper is initialized via the [Geo module](https://github.com/opensearch-project/OpenSearch/blob/main/modules/geo/src/main/java/org/opensearch/geo/GeoPlugin.java) present in the OpenSearch repo. We have created a new repo named [Geo-Spatial](https://github.com/opensearch-project/geospatial) which host GeoJson related features. The XY Point and XY shape indexing and querying functionalities are getting developed and will be released as part of 2.3 release(tentative). The intent of that repo was to provide and encapsulate all the geo-related features via that ## New Aggregations which we are building In the current roadmap we have [4 different aggregations](https://github.com/opensearch-project/geospatial/issues/84) that we will be implementing on the Geo Shape. Below are those aggregations. 1. GeoBounds 2. GeoCentroid 3. GeoTile 4. GeoHashGrid To provide more context these aggregations are already implemented for the GeoPoint field. We are also working on planning on implementing the Geo Line Aggregation, GeoHex Gird(customer has already reached out for this) which are already supported in Elastic Search. ## Proposed Solution The solution is to move the Aggregations, Indexing and Query for both Geo Point and GeoShape to the Geo-Spatial plugin provided via [Geo-Spatial Repo](https://github.com/opensearch-project/geospatial). As this is breaking changes, hence we are proposing a phased approach, which make sure that we are incrementally progressing to the final goal. ### Phase 1 **Step1: One by one move aggregation(4 different classes for aggregations + Tests) to the Geo modules folder in the OpenSearch core. The aggregation that we will move will be the one which we are developing over the GeoShape.** **Why we need this? Or what is the Pros about it?** The code between the aggregations for GeoPoint and GeoShape is same and we can abstract common logic between GeoPoint and GeoShape rather than duplicating them. **Will there be customer Impact?** No, there will be no customer impact, as these classes are directly build with the OpenSearch core min distribution. **What will happen if we don’t do this?** We either need to copy the same code/logic from GeoPoint Aggregations to GeoShape aggregations or we will be creating more interfaces in the server folder of OpenSearch which will needs to be migrated later on. **Step2: Abstract out the common logic for the GeoShape and GeoPoint aggregation. Allow both the aggregation to depend on this logic.** **Why we need this? Or what is the Pros about it?** This will abstract out the common logic and we can reuse the logic across aggregations **Will there be customer Impact?** No, as the aggregations will still be built in min distribution of OpenSearch. Repeat the above 2 steps for each Aggregation that we are launching for GeoShape. This will make sure that we are moving towards right abstraction. **Step3: Move the FieldMappers, Queries and ValueSource related code(Both GeoShape and GeoPoint), Integration Tests etc. to the Geo module once all the Aggregations have moved to the Geo Module.** **Why we need this? Or what is the Pros about it?** This will abstract out the common logic and we can reuse the logic across aggregations **Will there be customer Impact?** No, as the aggregations will still be built in min distribution of OpenSearch. ### Phase 2 **Step1: Build the proposal to move the Geo Module to Geo-Spatial Repo as a separate plugin or under a GeoSpatial Plugin. Analyze the impact and community feedback around what is the best way to provide the backward compatibly and seamless migration.** **Why we need this? or what we want to achieve on this?** This will provide us the insights around what community wants and what extra support will be required from our side for the seamless upgrade. **Step2: Move the actual code from the Geo Module to Geo-Spatial Repo and release it via OpenSearch major version(exact version depends on various factors) release cycle as a breaking change.** On a high level this will be a simple movement of code from Geo Module to Geo-Spatial plugin. The complexity will arise around how customer will migrate. Given that this will be done in major release of OpenSearch(given that it is breaking change), we will use the feedbacks provided in step-1 to give customer all the tools for doing backward compatibility. Example: 1. We can release a distribution of open search with Geo-spatial plugin already installed. 2. We can build on top of the Extensions framework which is currently being worked upon OpenSearch.[Issue](https://github.com/opensearch-project/OpenSearch/issues/2447) Below are the pros and cons of the above solution: **Pros:** 1. No change for customers till we go the phase-2 of the solution. 2. No confusion in customer around from which version they need the GeoSpatial plugin for the geo based aggregations and when they will get the aggregations out of the box from OpenSearch min distribution. 3. Code remains in 1 single repo always which provides easier debugging, development experience and release experience. **Cons:** 1. Till we have moved the aggregations to the Geo-Spatial repo we need to depend on the OpenSearch Core infrastructure, PR reviewers etc, which can increase the development time, as it is a fast moving repo. Seeing that we have many new aggregations to build this can have large overall impact on development timeline. 2. Difficulties in back-port as the main and 2.x version of repo has breaking changes as compared to Geo-Spatial repo which has less or no breaking changes. ## Alternatives ### Alternative 1 Provide Aggregations on GeoShape as a part of Open search min distribution by directly implementing the GeoShape aggregations in the OpenSearch core itself.(Don’t move aggregations to even geo module in the core repo). **Pros:** 1. Code remains in 1 single repo always which provides easier debugging and development experience. 2. No upgrade required for customers till phase-1. 3. Customers will start to get out of box aggregations support on geo-shape. Plus they will have proper upgrade paths and SOP when we move the code to plugin. **Cons:** 1. Difficulties in back-port as the main and 2.x version of repo has breaking changes as compared to Geo-Spatial repo which has less or no breaking changes. 2. We need to depend on the OpenSearch Core infrastructure, PR reviewers etc, which can increase the development time, as it is a fast moving repo. Seeing that we have many new aggregations to build this can have larger impact on development timeline. 3. There can be potential changes required when we start implementing the aggregations over XY shape and Point. The cons provided here can be removed working with the OpenSearch team to discuss on the dedicated reviewers and bandwidth for PRs. Also, as we move towards moving the code to geo-module we will have zero to no conflicts as apart from geo-spatial team no one will be working on that in best case. On con #3 as of now we don’t have any plan and customer use-case. Even if we do have that we can still use the common interfaces that we have created in the Geo module. Overall the solution do have some cons which can create some delays and delayed launches but this is the most customer obsessed way. ### Alternative 2 Create the new aggregations for GeoShape directly in the Geo Spatial repo, do all the refactoring required in core OpenSearch repo to avoid code duplication. As a backlog task move the Aggregations(Geo Point) to new repo and keep adding new features on Geo to the Geo-Spatial repo only. **Pros:** 1. **Easy Upgrade:** As fewer customers will be there who won’t have installed the Geo-Spatial plugin when we move all our aggregations to Geo-Spatial plugin. 2. Easy to back-port and release the patch versions. 3. Faster release cycles, reduction in PR review time, merges and lesser merge conflicts etc. **Cons:** 1. **Customer Confusion:** It can cause confusion to the customer to understand as the aggregations are divided in the plugins and core repo. 2. We can end up modifying the code in core repo more often than not to support the new features and interfaces that we want to build in Geo-Spatial repo. Even small changes can end up touching more than 1 repo, which will create problems of backward compatibility, testing, developer frustration. 3. As of now, we have no input from community whether we should move the aggregations to Geo-Spatial repo or keep them in the OpenSearch core. ### Alternative 3 Create the new aggregations for GeoShape directly in the Geo Spatial repo, do all the refactoring required in core OpenSearch repo to avoid code duplication. Keep adding new features on the Geo Spatial repo only. **Pros:** 1. No upgrade required and no confusion as customer who wants to use new aggregations just need to install the right plugin. 2. Easy to back-port and release for the patch versions. 3. Faster release cycles, reduction in PR review time, merges and lesser merge conflicts etc. **Cons:** 1. We can end up modifying the code in core repo more often to support the new features and interfaces that we want to build in Geo-Spatial repo. Even small changes can end up touching more than 1 repo, which will increase the developer frustration for release. ## Feedback Required The above sections provide Phased Approach as the proposed solution, but we really want to focus on the Alternative-2 as well. It would be great to know community thinks about the Alternative-2 and should we do that instead of phased approach which is long and time consuming. ## Appendix ### Frequently Asked Question *Q: If after step 1 of phase 2 we found out that community doesn’t want yet another plugin for Geo related indexing and querying then will phase 1 effort be in vain?* No it won’t be in vain as we would have developed the interfaces that can be used in the XY aggregations, we would have carved out the geo related code to module which can evolve of its own, even when it is with the Core repo. ### Useful Links: 1. https://github.com/opensearch-project/OpenSearch/ 2. https://github.com/opensearch-project/geospatial/ 3. https://github.com/opensearch-project/geospatial/issues/84
1.0
[Proposal]: Low Level Implementation Details for Geo Shape Aggregation and future Geo related Features - ## Introduction This proposal talks about the low level implementation details for the Geo Shape aggregations. We will be covering what are the components/classes/interfaces required for the Geo Shape aggregations and *what should be the right place to put those components.* In whole proposal we will be using components, classes, interfaces terms interchangeably. As we will be focusing on the low level implementation details it is expected that reader is already aware that how indexing and query works on GeoShape in OpenSearch, what is a doc value and how it is used in the aggregation framework. ## Goal Goal of proposal is to answer the following questions. _Note: Module here refer to the different [libs](https://github.com/opensearch-project/OpenSearch/tree/main/libs), [modules](https://github.com/opensearch-project/OpenSearch/tree/main/modules) folders provided in the OpenSearch core repo._ ### P0 1. Which module we should use to write the Geo Shape Aggregation level interfaces? or should we directly go with the Geo-Spatial repo? 2. Which module we should use to write the Value Source boiler plate code for converting Doc Values back to specific classes for GeoShape, as they have some dependency between classes already present like [CoreValueSourceType](https://github.com/opensearch-project/OpenSearch/blob/main/server/src/main/java/org/opensearch/search/aggregations/support/CoreValuesSourceType.java) etc? ### P1 1. What should be the long term vision of Geo team around what is the right place to put the code related to Geo space? The code involves Geo FieldMapper(Geo Point and Geo Shape) used for indexing and querying, Geo Aggregations(both older and newer geo aggregations both on Point and Shape) and Value Source boiler plate code for converting Doc Values back to specific classes. 2. How we should do the migration of the code mentioned in `#1` to the module we decide to move? ### Assumptions 1. The XYPoint and XY shape related features will be added in the [Geo-Spatial](https://github.com/opensearch-project/geospatial) repo and it will be keep on happening. ### Why we need to answer the questions above? The answer to these questions will help us do the following: 1. As there will be a lot of common code between the aggregations and we will be abstracting that logic out, hence we need to make sure that we are abstracting them in the right place so that this is not a throw away work. 2. With the release of XY Point and XY shape in the Geo-Spatial plugin, we need to deicide in long term where we want to put all our Geo related features(in a backward compatible fashion), how we want to provide them to customers. 3. It will help us provide better estimate on the timelines, efforts for the launch of Geo Shape aggregations and the other features in the future like(GeoLineAggregation, GeoHexAggregations, Aggregations on XY Point and XY Shape). ## Current Architecture As of version 2.1 of OpenSearch the Geo related aggregations(which contains only GeoPoint aggregations) are present in the OpenSearch core repo. There are no aggregations present on the Geo Shape. The Field mapper which init the GeoShape mapper is initialized via the [Geo module](https://github.com/opensearch-project/OpenSearch/blob/main/modules/geo/src/main/java/org/opensearch/geo/GeoPlugin.java) present in the OpenSearch repo. We have created a new repo named [Geo-Spatial](https://github.com/opensearch-project/geospatial) which host GeoJson related features. The XY Point and XY shape indexing and querying functionalities are getting developed and will be released as part of 2.3 release(tentative). The intent of that repo was to provide and encapsulate all the geo-related features via that ## New Aggregations which we are building In the current roadmap we have [4 different aggregations](https://github.com/opensearch-project/geospatial/issues/84) that we will be implementing on the Geo Shape. Below are those aggregations. 1. GeoBounds 2. GeoCentroid 3. GeoTile 4. GeoHashGrid To provide more context these aggregations are already implemented for the GeoPoint field. We are also working on planning on implementing the Geo Line Aggregation, GeoHex Gird(customer has already reached out for this) which are already supported in Elastic Search. ## Proposed Solution The solution is to move the Aggregations, Indexing and Query for both Geo Point and GeoShape to the Geo-Spatial plugin provided via [Geo-Spatial Repo](https://github.com/opensearch-project/geospatial). As this is breaking changes, hence we are proposing a phased approach, which make sure that we are incrementally progressing to the final goal. ### Phase 1 **Step1: One by one move aggregation(4 different classes for aggregations + Tests) to the Geo modules folder in the OpenSearch core. The aggregation that we will move will be the one which we are developing over the GeoShape.** **Why we need this? Or what is the Pros about it?** The code between the aggregations for GeoPoint and GeoShape is same and we can abstract common logic between GeoPoint and GeoShape rather than duplicating them. **Will there be customer Impact?** No, there will be no customer impact, as these classes are directly build with the OpenSearch core min distribution. **What will happen if we don’t do this?** We either need to copy the same code/logic from GeoPoint Aggregations to GeoShape aggregations or we will be creating more interfaces in the server folder of OpenSearch which will needs to be migrated later on. **Step2: Abstract out the common logic for the GeoShape and GeoPoint aggregation. Allow both the aggregation to depend on this logic.** **Why we need this? Or what is the Pros about it?** This will abstract out the common logic and we can reuse the logic across aggregations **Will there be customer Impact?** No, as the aggregations will still be built in min distribution of OpenSearch. Repeat the above 2 steps for each Aggregation that we are launching for GeoShape. This will make sure that we are moving towards right abstraction. **Step3: Move the FieldMappers, Queries and ValueSource related code(Both GeoShape and GeoPoint), Integration Tests etc. to the Geo module once all the Aggregations have moved to the Geo Module.** **Why we need this? Or what is the Pros about it?** This will abstract out the common logic and we can reuse the logic across aggregations **Will there be customer Impact?** No, as the aggregations will still be built in min distribution of OpenSearch. ### Phase 2 **Step1: Build the proposal to move the Geo Module to Geo-Spatial Repo as a separate plugin or under a GeoSpatial Plugin. Analyze the impact and community feedback around what is the best way to provide the backward compatibly and seamless migration.** **Why we need this? or what we want to achieve on this?** This will provide us the insights around what community wants and what extra support will be required from our side for the seamless upgrade. **Step2: Move the actual code from the Geo Module to Geo-Spatial Repo and release it via OpenSearch major version(exact version depends on various factors) release cycle as a breaking change.** On a high level this will be a simple movement of code from Geo Module to Geo-Spatial plugin. The complexity will arise around how customer will migrate. Given that this will be done in major release of OpenSearch(given that it is breaking change), we will use the feedbacks provided in step-1 to give customer all the tools for doing backward compatibility. Example: 1. We can release a distribution of open search with Geo-spatial plugin already installed. 2. We can build on top of the Extensions framework which is currently being worked upon OpenSearch.[Issue](https://github.com/opensearch-project/OpenSearch/issues/2447) Below are the pros and cons of the above solution: **Pros:** 1. No change for customers till we go the phase-2 of the solution. 2. No confusion in customer around from which version they need the GeoSpatial plugin for the geo based aggregations and when they will get the aggregations out of the box from OpenSearch min distribution. 3. Code remains in 1 single repo always which provides easier debugging, development experience and release experience. **Cons:** 1. Till we have moved the aggregations to the Geo-Spatial repo we need to depend on the OpenSearch Core infrastructure, PR reviewers etc, which can increase the development time, as it is a fast moving repo. Seeing that we have many new aggregations to build this can have large overall impact on development timeline. 2. Difficulties in back-port as the main and 2.x version of repo has breaking changes as compared to Geo-Spatial repo which has less or no breaking changes. ## Alternatives ### Alternative 1 Provide Aggregations on GeoShape as a part of Open search min distribution by directly implementing the GeoShape aggregations in the OpenSearch core itself.(Don’t move aggregations to even geo module in the core repo). **Pros:** 1. Code remains in 1 single repo always which provides easier debugging and development experience. 2. No upgrade required for customers till phase-1. 3. Customers will start to get out of box aggregations support on geo-shape. Plus they will have proper upgrade paths and SOP when we move the code to plugin. **Cons:** 1. Difficulties in back-port as the main and 2.x version of repo has breaking changes as compared to Geo-Spatial repo which has less or no breaking changes. 2. We need to depend on the OpenSearch Core infrastructure, PR reviewers etc, which can increase the development time, as it is a fast moving repo. Seeing that we have many new aggregations to build this can have larger impact on development timeline. 3. There can be potential changes required when we start implementing the aggregations over XY shape and Point. The cons provided here can be removed working with the OpenSearch team to discuss on the dedicated reviewers and bandwidth for PRs. Also, as we move towards moving the code to geo-module we will have zero to no conflicts as apart from geo-spatial team no one will be working on that in best case. On con #3 as of now we don’t have any plan and customer use-case. Even if we do have that we can still use the common interfaces that we have created in the Geo module. Overall the solution do have some cons which can create some delays and delayed launches but this is the most customer obsessed way. ### Alternative 2 Create the new aggregations for GeoShape directly in the Geo Spatial repo, do all the refactoring required in core OpenSearch repo to avoid code duplication. As a backlog task move the Aggregations(Geo Point) to new repo and keep adding new features on Geo to the Geo-Spatial repo only. **Pros:** 1. **Easy Upgrade:** As fewer customers will be there who won’t have installed the Geo-Spatial plugin when we move all our aggregations to Geo-Spatial plugin. 2. Easy to back-port and release the patch versions. 3. Faster release cycles, reduction in PR review time, merges and lesser merge conflicts etc. **Cons:** 1. **Customer Confusion:** It can cause confusion to the customer to understand as the aggregations are divided in the plugins and core repo. 2. We can end up modifying the code in core repo more often than not to support the new features and interfaces that we want to build in Geo-Spatial repo. Even small changes can end up touching more than 1 repo, which will create problems of backward compatibility, testing, developer frustration. 3. As of now, we have no input from community whether we should move the aggregations to Geo-Spatial repo or keep them in the OpenSearch core. ### Alternative 3 Create the new aggregations for GeoShape directly in the Geo Spatial repo, do all the refactoring required in core OpenSearch repo to avoid code duplication. Keep adding new features on the Geo Spatial repo only. **Pros:** 1. No upgrade required and no confusion as customer who wants to use new aggregations just need to install the right plugin. 2. Easy to back-port and release for the patch versions. 3. Faster release cycles, reduction in PR review time, merges and lesser merge conflicts etc. **Cons:** 1. We can end up modifying the code in core repo more often to support the new features and interfaces that we want to build in Geo-Spatial repo. Even small changes can end up touching more than 1 repo, which will increase the developer frustration for release. ## Feedback Required The above sections provide Phased Approach as the proposed solution, but we really want to focus on the Alternative-2 as well. It would be great to know community thinks about the Alternative-2 and should we do that instead of phased approach which is long and time consuming. ## Appendix ### Frequently Asked Question *Q: If after step 1 of phase 2 we found out that community doesn’t want yet another plugin for Geo related indexing and querying then will phase 1 effort be in vain?* No it won’t be in vain as we would have developed the interfaces that can be used in the XY aggregations, we would have carved out the geo related code to module which can evolve of its own, even when it is with the Core repo. ### Useful Links: 1. https://github.com/opensearch-project/OpenSearch/ 2. https://github.com/opensearch-project/geospatial/ 3. https://github.com/opensearch-project/geospatial/issues/84
non_priority
low level implementation details for geo shape aggregation and future geo related features introduction this proposal talks about the low level implementation details for the geo shape aggregations we will be covering what are the components classes interfaces required for the geo shape aggregations and what should be the right place to put those components in whole proposal we will be using components classes interfaces terms interchangeably as we will be focusing on the low level implementation details it is expected that reader is already aware that how indexing and query works on geoshape in opensearch what is a doc value and how it is used in the aggregation framework goal goal of proposal is to answer the following questions note module here refer to the different folders provided in the opensearch core repo which module we should use to write the geo shape aggregation level interfaces or should we directly go with the geo spatial repo which module we should use to write the value source boiler plate code for converting doc values back to specific classes for geoshape as they have some dependency between classes already present like etc what should be the long term vision of geo team around what is the right place to put the code related to geo space the code involves geo fieldmapper geo point and geo shape used for indexing and querying geo aggregations both older and newer geo aggregations both on point and shape and value source boiler plate code for converting doc values back to specific classes how we should do the migration of the code mentioned in to the module we decide to move assumptions the xypoint and xy shape related features will be added in the repo and it will be keep on happening why we need to answer the questions above the answer to these questions will help us do the following as there will be a lot of common code between the aggregations and we will be abstracting that logic out hence we need to make sure that we are abstracting them in the right place so that this is not a throw away work with the release of xy point and xy shape in the geo spatial plugin we need to deicide in long term where we want to put all our geo related features in a backward compatible fashion how we want to provide them to customers it will help us provide better estimate on the timelines efforts for the launch of geo shape aggregations and the other features in the future like geolineaggregation geohexaggregations aggregations on xy point and xy shape current architecture as of version of opensearch the geo related aggregations which contains only geopoint aggregations are present in the opensearch core repo there are no aggregations present on the geo shape the field mapper which init the geoshape mapper is initialized via the present in the opensearch repo we have created a new repo named which host geojson related features the xy point and xy shape indexing and querying functionalities are getting developed and will be released as part of release tentative the intent of that repo was to provide and encapsulate all the geo related features via that new aggregations which we are building in the current roadmap we have that we will be implementing on the geo shape below are those aggregations geobounds geocentroid geotile geohashgrid to provide more context these aggregations are already implemented for the geopoint field we are also working on planning on implementing the geo line aggregation geohex gird customer has already reached out for this which are already supported in elastic search proposed solution the solution is to move the aggregations indexing and query for both geo point and geoshape to the geo spatial plugin provided via as this is breaking changes hence we are proposing a phased approach which make sure that we are incrementally progressing to the final goal phase one by one move aggregation different classes for aggregations tests to the geo modules folder in the opensearch core the aggregation that we will move will be the one which we are developing over the geoshape why we need this or what is the pros about it the code between the aggregations for geopoint and geoshape is same and we can abstract common logic between geopoint and geoshape rather than duplicating them will there be customer impact no there will be no customer impact as these classes are directly build with the opensearch core min distribution what will happen if we don’t do this we either need to copy the same code logic from geopoint aggregations to geoshape aggregations or we will be creating more interfaces in the server folder of opensearch which will needs to be migrated later on abstract out the common logic for the geoshape and geopoint aggregation allow both the aggregation to depend on this logic why we need this or what is the pros about it this will abstract out the common logic and we can reuse the logic across aggregations will there be customer impact no as the aggregations will still be built in min distribution of opensearch repeat the above steps for each aggregation that we are launching for geoshape this will make sure that we are moving towards right abstraction move the fieldmappers queries and valuesource related code both geoshape and geopoint integration tests etc to the geo module once all the aggregations have moved to the geo module why we need this or what is the pros about it this will abstract out the common logic and we can reuse the logic across aggregations will there be customer impact no as the aggregations will still be built in min distribution of opensearch phase build the proposal to move the geo module to geo spatial repo as a separate plugin or under a geospatial plugin analyze the impact and community feedback around what is the best way to provide the backward compatibly and seamless migration why we need this or what we want to achieve on this this will provide us the insights around what community wants and what extra support will be required from our side for the seamless upgrade move the actual code from the geo module to geo spatial repo and release it via opensearch major version exact version depends on various factors release cycle as a breaking change on a high level this will be a simple movement of code from geo module to geo spatial plugin the complexity will arise around how customer will migrate given that this will be done in major release of opensearch given that it is breaking change we will use the feedbacks provided in step to give customer all the tools for doing backward compatibility example we can release a distribution of open search with geo spatial plugin already installed we can build on top of the extensions framework which is currently being worked upon opensearch below are the pros and cons of the above solution pros no change for customers till we go the phase of the solution no confusion in customer around from which version they need the geospatial plugin for the geo based aggregations and when they will get the aggregations out of the box from opensearch min distribution code remains in single repo always which provides easier debugging development experience and release experience cons till we have moved the aggregations to the geo spatial repo we need to depend on the opensearch core infrastructure pr reviewers etc which can increase the development time as it is a fast moving repo seeing that we have many new aggregations to build this can have large overall impact on development timeline difficulties in back port as the main and x version of repo has breaking changes as compared to geo spatial repo which has less or no breaking changes alternatives alternative provide aggregations on geoshape as a part of open search min distribution by directly implementing the geoshape aggregations in the opensearch core itself don’t move aggregations to even geo module in the core repo pros code remains in single repo always which provides easier debugging and development experience no upgrade required for customers till phase customers will start to get out of box aggregations support on geo shape plus they will have proper upgrade paths and sop when we move the code to plugin cons difficulties in back port as the main and x version of repo has breaking changes as compared to geo spatial repo which has less or no breaking changes we need to depend on the opensearch core infrastructure pr reviewers etc which can increase the development time as it is a fast moving repo seeing that we have many new aggregations to build this can have larger impact on development timeline there can be potential changes required when we start implementing the aggregations over xy shape and point the cons provided here can be removed working with the opensearch team to discuss on the dedicated reviewers and bandwidth for prs also as we move towards moving the code to geo module we will have zero to no conflicts as apart from geo spatial team no one will be working on that in best case on con as of now we don’t have any plan and customer use case even if we do have that we can still use the common interfaces that we have created in the geo module overall the solution do have some cons which can create some delays and delayed launches but this is the most customer obsessed way alternative create the new aggregations for geoshape directly in the geo spatial repo do all the refactoring required in core opensearch repo to avoid code duplication as a backlog task move the aggregations geo point to new repo and keep adding new features on geo to the geo spatial repo only pros easy upgrade as fewer customers will be there who won’t have installed the geo spatial plugin when we move all our aggregations to geo spatial plugin easy to back port and release the patch versions faster release cycles reduction in pr review time merges and lesser merge conflicts etc cons customer confusion it can cause confusion to the customer to understand as the aggregations are divided in the plugins and core repo we can end up modifying the code in core repo more often than not to support the new features and interfaces that we want to build in geo spatial repo even small changes can end up touching more than repo which will create problems of backward compatibility testing developer frustration as of now we have no input from community whether we should move the aggregations to geo spatial repo or keep them in the opensearch core alternative create the new aggregations for geoshape directly in the geo spatial repo do all the refactoring required in core opensearch repo to avoid code duplication keep adding new features on the geo spatial repo only pros no upgrade required and no confusion as customer who wants to use new aggregations just need to install the right plugin easy to back port and release for the patch versions faster release cycles reduction in pr review time merges and lesser merge conflicts etc cons we can end up modifying the code in core repo more often to support the new features and interfaces that we want to build in geo spatial repo even small changes can end up touching more than repo which will increase the developer frustration for release feedback required the above sections provide phased approach as the proposed solution but we really want to focus on the alternative as well it would be great to know community thinks about the alternative and should we do that instead of phased approach which is long and time consuming appendix frequently asked question q if after step of phase we found out that community doesn’t want yet another plugin for geo related indexing and querying then will phase effort be in vain no it won’t be in vain as we would have developed the interfaces that can be used in the xy aggregations we would have carved out the geo related code to module which can evolve of its own even when it is with the core repo useful links
0
405,433
27,518,977,994
IssuesEvent
2023-03-06 13:55:02
devvsakib/power-the-web
https://api.github.com/repos/devvsakib/power-the-web
closed
Fix Typo mistake
documentation good first issue EddieHub:good-first-issue
**Describe the bug** There are a project folder typo mistake in PROJECTS folder ![image](https://user-images.githubusercontent.com/88339569/223116101-9db24337-14a1-4c19-9533-ea8bea8bdb1e.png) **To Reproduce** Steps to reproduce the behavior: tribute -> tribute **Screenshots** added
1.0
Fix Typo mistake - **Describe the bug** There are a project folder typo mistake in PROJECTS folder ![image](https://user-images.githubusercontent.com/88339569/223116101-9db24337-14a1-4c19-9533-ea8bea8bdb1e.png) **To Reproduce** Steps to reproduce the behavior: tribute -> tribute **Screenshots** added
non_priority
fix typo mistake describe the bug there are a project folder typo mistake in projects folder to reproduce steps to reproduce the behavior tribute tribute screenshots added
0
199,911
22,715,381,120
IssuesEvent
2022-07-06 01:10:11
RG4421/openedr
https://api.github.com/repos/RG4421/openedr
reopened
CVE-2020-8286 (High) detected in curlcurl-7_63_0
security vulnerability
## CVE-2020-8286 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>curlcurl-7_63_0</b></p></summary> <p> <p>A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features</p> <p>Library home page: <a href=https://github.com/curl/curl.git>https://github.com/curl/curl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/RG4421/openedr/commit/f991dbd97bf34917a1d61c43ef4b41832708779c">f991dbd97bf34917a1d61c43ef4b41832708779c</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/edrav2/eprj/curl/lib/vtls/openssl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/edrav2/eprj/curl/lib/vtls/openssl.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. <p>Publish Date: 2020-12-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8286>CVE-2020-8286</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286</a></p> <p>Release Date: 2020-12-14</p> <p>Fix Resolution: 7.74.0</p> </p> </details> <p></p>
True
CVE-2020-8286 (High) detected in curlcurl-7_63_0 - ## CVE-2020-8286 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>curlcurl-7_63_0</b></p></summary> <p> <p>A command line tool and library for transferring data with URL syntax, supporting HTTP, HTTPS, FTP, FTPS, GOPHER, TFTP, SCP, SFTP, SMB, TELNET, DICT, LDAP, LDAPS, FILE, IMAP, SMTP, POP3, RTSP and RTMP. libcurl offers a myriad of powerful features</p> <p>Library home page: <a href=https://github.com/curl/curl.git>https://github.com/curl/curl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/RG4421/openedr/commit/f991dbd97bf34917a1d61c43ef4b41832708779c">f991dbd97bf34917a1d61c43ef4b41832708779c</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/edrav2/eprj/curl/lib/vtls/openssl.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/edrav2/eprj/curl/lib/vtls/openssl.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response. <p>Publish Date: 2020-12-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8286>CVE-2020-8286</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8286</a></p> <p>Release Date: 2020-12-14</p> <p>Fix Resolution: 7.74.0</p> </p> </details> <p></p>
non_priority
cve high detected in curlcurl cve high severity vulnerability vulnerable library curlcurl a command line tool and library for transferring data with url syntax supporting http https ftp ftps gopher tftp scp sftp smb telnet dict ldap ldaps file imap smtp rtsp and rtmp libcurl offers a myriad of powerful features library home page a href found in head commit a href found in base branch main vulnerable source files eprj curl lib vtls openssl c eprj curl lib vtls openssl c vulnerability details curl through is vulnerable to an improper check for certificate revocation due to insufficient verification of the ocsp response publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution
0
77,273
21,718,102,084
IssuesEvent
2022-05-10 20:08:18
bazelbuild/bazel-buildfarm
https://api.github.com/repos/bazelbuild/bazel-buildfarm
closed
Remote build stuck on caching empty file
Build Failure
We start buildfarm and it looks like working (we use it to build our production builds and test execution). But if rule generates empty output file (zero bytes size) then action is stuck in build queue forever. I don't see anything strange in the logs. For reproducing this issue: - I simply create empty `WORKSPACE` and `BUILD`-file with content: ``` genrule( name = "foo", srcs = [], outs = ["foo.txt"], cmd = "echo -n > \"$@\"", ) ``` After that I call: ``` bazel --bazelrc=/dev/null clean && bazel --bazelrc=/dev/null build --remote_executor=grpcs://buildfarm.example.net :foo ``` This rule stuck with bazel output like: ``` INFO: Invocation ID: 6fbe2fc2-3486-4235-8f55-b0fe7a15260c INFO: Starting clean (this may take a while). Consider using --async if the clean takes more than several minutes. INFO: Invocation ID: e823a16f-bb10-4872-a9e0-3a7b4cb94c47 INFO: Analyzed target //:foo (5 packages loaded, 7 targets configured). INFO: Found 1 target... [1 / 2] Executing genrule //:foo; 40s remote ``` If I rewrite rule to write non-empty output - it's works correctly... Bazel version: 5.1.1 Buildfarm version: 0.13.0
1.0
Remote build stuck on caching empty file - We start buildfarm and it looks like working (we use it to build our production builds and test execution). But if rule generates empty output file (zero bytes size) then action is stuck in build queue forever. I don't see anything strange in the logs. For reproducing this issue: - I simply create empty `WORKSPACE` and `BUILD`-file with content: ``` genrule( name = "foo", srcs = [], outs = ["foo.txt"], cmd = "echo -n > \"$@\"", ) ``` After that I call: ``` bazel --bazelrc=/dev/null clean && bazel --bazelrc=/dev/null build --remote_executor=grpcs://buildfarm.example.net :foo ``` This rule stuck with bazel output like: ``` INFO: Invocation ID: 6fbe2fc2-3486-4235-8f55-b0fe7a15260c INFO: Starting clean (this may take a while). Consider using --async if the clean takes more than several minutes. INFO: Invocation ID: e823a16f-bb10-4872-a9e0-3a7b4cb94c47 INFO: Analyzed target //:foo (5 packages loaded, 7 targets configured). INFO: Found 1 target... [1 / 2] Executing genrule //:foo; 40s remote ``` If I rewrite rule to write non-empty output - it's works correctly... Bazel version: 5.1.1 Buildfarm version: 0.13.0
non_priority
remote build stuck on caching empty file we start buildfarm and it looks like working we use it to build our production builds and test execution but if rule generates empty output file zero bytes size then action is stuck in build queue forever i don t see anything strange in the logs for reproducing this issue i simply create empty workspace and build file with content genrule name foo srcs outs cmd echo n after that i call bazel bazelrc dev null clean bazel bazelrc dev null build remote executor grpcs buildfarm example net foo this rule stuck with bazel output like info invocation id info starting clean this may take a while consider using async if the clean takes more than several minutes info invocation id info analyzed target foo packages loaded targets configured info found target executing genrule foo remote if i rewrite rule to write non empty output it s works correctly bazel version buildfarm version
0
308,757
23,265,734,288
IssuesEvent
2022-08-04 17:11:01
blendthink/value_class.dart
https://api.github.com/repos/blendthink/value_class.dart
closed
Add to Usage how to use it in combination with freezed and json_seriarizable
documentation enhancement value_class
## Overview This package can be used in combination with freezed and json_seriarizable.
1.0
Add to Usage how to use it in combination with freezed and json_seriarizable - ## Overview This package can be used in combination with freezed and json_seriarizable.
non_priority
add to usage how to use it in combination with freezed and json seriarizable overview this package can be used in combination with freezed and json seriarizable
0
235,484
19,348,892,749
IssuesEvent
2021-12-15 13:48:50
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
kv/kvserver: TestStoreRecoverFromEngine failed
C-test-failure O-robot branch-master
kv/kvserver.TestStoreRecoverFromEngine [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3288590&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3288590&tab=artifacts#/) on master @ [26ebecb9b9d3631a3c7c5dde21e1e1d39b05285d](https://github.com/cockroachdb/cockroach/commits/26ebecb9b9d3631a3c7c5dde21e1e1d39b05285d): ``` === RUN TestStoreRecoverFromEngine test_log_scope.go:73: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestStoreRecoverFromEngine261765857 test_log_scope.go:74: use -show-logs to present logs inline client_raft_test.go:167: Error Trace: client_raft_test.go:167 Error: Received unexpected error: listen tcp 127.0.0.1:44157: bind: address already in use Test: TestStoreRecoverFromEngine panic.go:613: -- test log scope end -- test logs left over in: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestStoreRecoverFromEngine261765857 --- FAIL: TestStoreRecoverFromEngine (0.77s) ``` <details><summary>Reproduce</summary> <p> To reproduce, try: ```bash make stressrace TESTS=TestStoreRecoverFromEngine PKG=./pkg/kv/kvserver TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` Parameters in this failure: - GOFLAGS=-json </p> </details> /cc @cockroachdb/kv bdarnell <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestStoreRecoverFromEngine.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
1.0
kv/kvserver: TestStoreRecoverFromEngine failed - kv/kvserver.TestStoreRecoverFromEngine [failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=3288590&tab=buildLog) with [artifacts](https://teamcity.cockroachdb.com/viewLog.html?buildId=3288590&tab=artifacts#/) on master @ [26ebecb9b9d3631a3c7c5dde21e1e1d39b05285d](https://github.com/cockroachdb/cockroach/commits/26ebecb9b9d3631a3c7c5dde21e1e1d39b05285d): ``` === RUN TestStoreRecoverFromEngine test_log_scope.go:73: test logs captured to: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestStoreRecoverFromEngine261765857 test_log_scope.go:74: use -show-logs to present logs inline client_raft_test.go:167: Error Trace: client_raft_test.go:167 Error: Received unexpected error: listen tcp 127.0.0.1:44157: bind: address already in use Test: TestStoreRecoverFromEngine panic.go:613: -- test log scope end -- test logs left over in: /go/src/github.com/cockroachdb/cockroach/artifacts/logTestStoreRecoverFromEngine261765857 --- FAIL: TestStoreRecoverFromEngine (0.77s) ``` <details><summary>Reproduce</summary> <p> To reproduce, try: ```bash make stressrace TESTS=TestStoreRecoverFromEngine PKG=./pkg/kv/kvserver TESTTIMEOUT=5m STRESSFLAGS='-timeout 5m' 2>&1 ``` Parameters in this failure: - GOFLAGS=-json </p> </details> /cc @cockroachdb/kv bdarnell <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestStoreRecoverFromEngine.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
kv kvserver teststorerecoverfromengine failed kv kvserver teststorerecoverfromengine with on master run teststorerecoverfromengine test log scope go test logs captured to go src github com cockroachdb cockroach artifacts test log scope go use show logs to present logs inline client raft test go error trace client raft test go error received unexpected error listen tcp bind address already in use test teststorerecoverfromengine panic go test log scope end test logs left over in go src github com cockroachdb cockroach artifacts fail teststorerecoverfromengine reproduce to reproduce try bash make stressrace tests teststorerecoverfromengine pkg pkg kv kvserver testtimeout stressflags timeout parameters in this failure goflags json cc cockroachdb kv bdarnell
0
116,665
17,384,162,184
IssuesEvent
2021-08-01 09:34:52
TEAMMATES/teammates
https://api.github.com/repos/TEAMMATES/teammates
closed
Remove HTML sanitization in EntityAttributes classes
a-Security committers only p.Medium
Since we are using JDO to store and retrieve data from the database, by right, SQL injection should never happen and there is no need to sanitize before saving data. So we can safely remove sanitizeForSaving() function from all classes extended from `EntityAttributes`. Those classes are: AccountAttributes AdminEmailAttributes CommentAttributes CourseAttributes FeedbackQuestionAttributes FeedbackResponseAttributes FeedbackResponseCommentAttributes FeedbackSessionAttributes InstructorAttributes **(Ongoing)** :white_check_mark: StudentAttributes StudentProfileAttributes While removing sanitizeForSaving(), we also have to apply sanitization in the frontend (JSP/JSTL), where the attribute is used, as well. From now, I will create small issues to work on those classes one by one.
True
Remove HTML sanitization in EntityAttributes classes - Since we are using JDO to store and retrieve data from the database, by right, SQL injection should never happen and there is no need to sanitize before saving data. So we can safely remove sanitizeForSaving() function from all classes extended from `EntityAttributes`. Those classes are: AccountAttributes AdminEmailAttributes CommentAttributes CourseAttributes FeedbackQuestionAttributes FeedbackResponseAttributes FeedbackResponseCommentAttributes FeedbackSessionAttributes InstructorAttributes **(Ongoing)** :white_check_mark: StudentAttributes StudentProfileAttributes While removing sanitizeForSaving(), we also have to apply sanitization in the frontend (JSP/JSTL), where the attribute is used, as well. From now, I will create small issues to work on those classes one by one.
non_priority
remove html sanitization in entityattributes classes since we are using jdo to store and retrieve data from the database by right sql injection should never happen and there is no need to sanitize before saving data so we can safely remove sanitizeforsaving function from all classes extended from entityattributes those classes are accountattributes adminemailattributes commentattributes courseattributes feedbackquestionattributes feedbackresponseattributes feedbackresponsecommentattributes feedbacksessionattributes instructorattributes ongoing white check mark studentattributes studentprofileattributes while removing sanitizeforsaving we also have to apply sanitization in the frontend jsp jstl where the attribute is used as well from now i will create small issues to work on those classes one by one
0
172,205
21,041,571,243
IssuesEvent
2022-03-31 12:48:24
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
Respond to TLS certificate/key changes without requiring a restart
Team:Security enhancement loe:hours impact:low EnableJiraSync
Kibana maintains a number of different TLS configuration settings: - Kibana's own HTTP server - Kibana's connection to Elasticsearch - Kibana's connection to the monitoring cluster (when Stack Monitoring is in use) - Kibana's connection to the Enterprise Search service - Kibana Alerting (TODO) TLS certificates and keys are generally stored on disk, read once on startup, and used for the lifetime of the process. Changes to these files will not be picked up until Kibana is restarted. Elasticsearch has long supported reloading this configuration from disk -- we should explore the feasibility of similar support within Kibana, so that we can accept updated certificates/keys without a restart. Support for this would greatly simplify certificate rotation in managed environments such as ESS and ECE
True
Respond to TLS certificate/key changes without requiring a restart - Kibana maintains a number of different TLS configuration settings: - Kibana's own HTTP server - Kibana's connection to Elasticsearch - Kibana's connection to the monitoring cluster (when Stack Monitoring is in use) - Kibana's connection to the Enterprise Search service - Kibana Alerting (TODO) TLS certificates and keys are generally stored on disk, read once on startup, and used for the lifetime of the process. Changes to these files will not be picked up until Kibana is restarted. Elasticsearch has long supported reloading this configuration from disk -- we should explore the feasibility of similar support within Kibana, so that we can accept updated certificates/keys without a restart. Support for this would greatly simplify certificate rotation in managed environments such as ESS and ECE
non_priority
respond to tls certificate key changes without requiring a restart kibana maintains a number of different tls configuration settings kibana s own http server kibana s connection to elasticsearch kibana s connection to the monitoring cluster when stack monitoring is in use kibana s connection to the enterprise search service kibana alerting todo tls certificates and keys are generally stored on disk read once on startup and used for the lifetime of the process changes to these files will not be picked up until kibana is restarted elasticsearch has long supported reloading this configuration from disk we should explore the feasibility of similar support within kibana so that we can accept updated certificates keys without a restart support for this would greatly simplify certificate rotation in managed environments such as ess and ece
0
92,687
18,922,848,103
IssuesEvent
2021-11-17 05:20:33
okjuan/music-lib-bot
https://api.github.com/repos/okjuan/music-lib-bot
opened
Encapsulate UI formatting in `ui` module
code-style
Calls to `ui.tell_user` shouldn't contain "\n", "\t" characters because that's a low-level detail about the UI. Instead, the `ConsoleUI` class should handle that. Maybe it needs to expose functions like `ui.show_menu` for more complicated formatting scenarios.
1.0
Encapsulate UI formatting in `ui` module - Calls to `ui.tell_user` shouldn't contain "\n", "\t" characters because that's a low-level detail about the UI. Instead, the `ConsoleUI` class should handle that. Maybe it needs to expose functions like `ui.show_menu` for more complicated formatting scenarios.
non_priority
encapsulate ui formatting in ui module calls to ui tell user shouldn t contain n t characters because that s a low level detail about the ui instead the consoleui class should handle that maybe it needs to expose functions like ui show menu for more complicated formatting scenarios
0
36,333
17,615,583,330
IssuesEvent
2021-08-18 09:17:56
turms-im/turms
https://api.github.com/repos/turms-im/turms
opened
Remove Spring-WebFlux and only uses reactor-netty
enhancement performance
Remove Spring-WebFlux and only uses reactor-netty
True
Remove Spring-WebFlux and only uses reactor-netty - Remove Spring-WebFlux and only uses reactor-netty
non_priority
remove spring webflux and only uses reactor netty remove spring webflux and only uses reactor netty
0
437,559
30,603,711,074
IssuesEvent
2023-07-22 18:20:04
BenWestgate/Bails
https://api.github.com/repos/BenWestgate/Bails
closed
in bails-wallet entering a share with spaces is rejected
bug documentation enhancement
If the user enters the spaces exactly like it was displayed by `display_confirm` then the share should be accepted. Spaces anywhere else including a trailing space will throw the non-alphanumeric character error. in order to prevent copy and paste from the display dialog to the entry dialog, a different whitespace character than space will be used and perhaps other invisible characters that throw a warning when detected to not copy and paste and to write the share down.
1.0
in bails-wallet entering a share with spaces is rejected - If the user enters the spaces exactly like it was displayed by `display_confirm` then the share should be accepted. Spaces anywhere else including a trailing space will throw the non-alphanumeric character error. in order to prevent copy and paste from the display dialog to the entry dialog, a different whitespace character than space will be used and perhaps other invisible characters that throw a warning when detected to not copy and paste and to write the share down.
non_priority
in bails wallet entering a share with spaces is rejected if the user enters the spaces exactly like it was displayed by display confirm then the share should be accepted spaces anywhere else including a trailing space will throw the non alphanumeric character error in order to prevent copy and paste from the display dialog to the entry dialog a different whitespace character than space will be used and perhaps other invisible characters that throw a warning when detected to not copy and paste and to write the share down
0
16,968
23,377,188,194
IssuesEvent
2022-08-11 05:19:48
WPChill/modula-lite
https://api.github.com/repos/WPChill/modula-lite
opened
test all modulas with new version of elementor and elementor pro (3.7.3)
compatibility
Hi, Since I have updated Elementor 3.7 & Elementor Pro 3.7.3, there is a conflict with all of the Modula Pro plugins I have setup. It is causing the Elementor page builder to be constantly on a grey loading screen, but when I deactivate your plugins it works again.
True
test all modulas with new version of elementor and elementor pro (3.7.3) - Hi, Since I have updated Elementor 3.7 & Elementor Pro 3.7.3, there is a conflict with all of the Modula Pro plugins I have setup. It is causing the Elementor page builder to be constantly on a grey loading screen, but when I deactivate your plugins it works again.
non_priority
test all modulas with new version of elementor and elementor pro hi since i have updated elementor elementor pro there is a conflict with all of the modula pro plugins i have setup it is causing the elementor page builder to be constantly on a grey loading screen but when i deactivate your plugins it works again
0
303,896
23,043,745,343
IssuesEvent
2022-07-23 15:09:26
adam-rms/website
https://api.github.com/repos/adam-rms/website
opened
[DOCS] Update public site documentation
documentation
### What would you like the training to cover? Update public site documentation ### Is this already partially covered elsewhere? _No response_ ### Anything else? _No response_
1.0
[DOCS] Update public site documentation - ### What would you like the training to cover? Update public site documentation ### Is this already partially covered elsewhere? _No response_ ### Anything else? _No response_
non_priority
update public site documentation what would you like the training to cover update public site documentation is this already partially covered elsewhere no response anything else no response
0
107,913
16,762,607,163
IssuesEvent
2021-06-14 02:36:15
gms-ws-demo/nibrs-pr-test
https://api.github.com/repos/gms-ws-demo/nibrs-pr-test
opened
CVE-2019-10212 (High) detected in undertow-core-1.4.20.Final.jar, undertow-core-1.4.25.Final.jar
security vulnerability
## CVE-2019-10212 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>undertow-core-1.4.20.Final.jar</b>, <b>undertow-core-1.4.25.Final.jar</b></p></summary> <p> <details><summary><b>undertow-core-1.4.20.Final.jar</b></p></summary> <p>Undertow</p> <p>Library home page: <a href="http://www.jboss.org/">http://www.jboss.org/</a></p> <p>Path to dependency file: nibrs-pr-test/tools/nibrs-fbi-service/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/undertow/undertow-core/1.4.20.Final/undertow-core-1.4.20.Final.jar,nibrs-pr-test/tools/nibrs-fbi-service/target/nibrs-fbi-service-1.0.0/WEB-INF/lib/undertow-core-1.4.20.Final.jar</p> <p> Dependency Hierarchy: - :x: **undertow-core-1.4.20.Final.jar** (Vulnerable Library) </details> <details><summary><b>undertow-core-1.4.25.Final.jar</b></p></summary> <p>Undertow</p> <p>Library home page: <a href="http://www.jboss.org/">http://www.jboss.org/</a></p> <p>Path to dependency file: nibrs-pr-test/tools/nibrs-route/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/undertow/undertow-core/1.4.25.Final/undertow-core-1.4.25.Final.jar,nibrs-pr-test/tools/nibrs-route/target/nibrs-route-1.0.0/WEB-INF/lib/undertow-core-1.4.25.Final.jar</p> <p> Dependency Hierarchy: - :x: **undertow-core-1.4.25.Final.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/gms-ws-demo/nibrs-pr-test/commit/860cc22f54e17594e32e303f0716fb065202fff5">860cc22f54e17594e32e303f0716fb065202fff5</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files. <p>Publish Date: 2019-10-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10212>CVE-2019-10212</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212</a></p> <p>Release Date: 2019-10-02</p> <p>Fix Resolution: 2.0.27.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.undertow","packageName":"undertow-core","packageVersion":"1.4.20.Final","packageFilePaths":["/tools/nibrs-fbi-service/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"io.undertow:undertow-core:1.4.20.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0.27.Final"},{"packageType":"Java","groupId":"io.undertow","packageName":"undertow-core","packageVersion":"1.4.25.Final","packageFilePaths":["/tools/nibrs-route/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"io.undertow:undertow-core:1.4.25.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0.27.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-10212","vulnerabilityDetails":"A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u0027s credentials from the log files.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10212","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-10212 (High) detected in undertow-core-1.4.20.Final.jar, undertow-core-1.4.25.Final.jar - ## CVE-2019-10212 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>undertow-core-1.4.20.Final.jar</b>, <b>undertow-core-1.4.25.Final.jar</b></p></summary> <p> <details><summary><b>undertow-core-1.4.20.Final.jar</b></p></summary> <p>Undertow</p> <p>Library home page: <a href="http://www.jboss.org/">http://www.jboss.org/</a></p> <p>Path to dependency file: nibrs-pr-test/tools/nibrs-fbi-service/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/undertow/undertow-core/1.4.20.Final/undertow-core-1.4.20.Final.jar,nibrs-pr-test/tools/nibrs-fbi-service/target/nibrs-fbi-service-1.0.0/WEB-INF/lib/undertow-core-1.4.20.Final.jar</p> <p> Dependency Hierarchy: - :x: **undertow-core-1.4.20.Final.jar** (Vulnerable Library) </details> <details><summary><b>undertow-core-1.4.25.Final.jar</b></p></summary> <p>Undertow</p> <p>Library home page: <a href="http://www.jboss.org/">http://www.jboss.org/</a></p> <p>Path to dependency file: nibrs-pr-test/tools/nibrs-route/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/io/undertow/undertow-core/1.4.25.Final/undertow-core-1.4.25.Final.jar,nibrs-pr-test/tools/nibrs-route/target/nibrs-route-1.0.0/WEB-INF/lib/undertow-core-1.4.25.Final.jar</p> <p> Dependency Hierarchy: - :x: **undertow-core-1.4.25.Final.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/gms-ws-demo/nibrs-pr-test/commit/860cc22f54e17594e32e303f0716fb065202fff5">860cc22f54e17594e32e303f0716fb065202fff5</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user's credentials from the log files. <p>Publish Date: 2019-10-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10212>CVE-2019-10212</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10212</a></p> <p>Release Date: 2019-10-02</p> <p>Fix Resolution: 2.0.27.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.undertow","packageName":"undertow-core","packageVersion":"1.4.20.Final","packageFilePaths":["/tools/nibrs-fbi-service/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"io.undertow:undertow-core:1.4.20.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0.27.Final"},{"packageType":"Java","groupId":"io.undertow","packageName":"undertow-core","packageVersion":"1.4.25.Final","packageFilePaths":["/tools/nibrs-route/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"io.undertow:undertow-core:1.4.25.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0.27.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-10212","vulnerabilityDetails":"A flaw was found in, all under 2.0.20, in the Undertow DEBUG log for io.undertow.request.security. If enabled, an attacker could abuse this flaw to obtain the user\u0027s credentials from the log files.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10212","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in undertow core final jar undertow core final jar cve high severity vulnerability vulnerable libraries undertow core final jar undertow core final jar undertow core final jar undertow library home page a href path to dependency file nibrs pr test tools nibrs fbi service pom xml path to vulnerable library home wss scanner repository io undertow undertow core final undertow core final jar nibrs pr test tools nibrs fbi service target nibrs fbi service web inf lib undertow core final jar dependency hierarchy x undertow core final jar vulnerable library undertow core final jar undertow library home page a href path to dependency file nibrs pr test tools nibrs route pom xml path to vulnerable library home wss scanner repository io undertow undertow core final undertow core final jar nibrs pr test tools nibrs route target nibrs route web inf lib undertow core final jar dependency hierarchy x undertow core final jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was found in all under in the undertow debug log for io undertow request security if enabled an attacker could abuse this flaw to obtain the user s credentials from the log files publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution final isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree io undertow undertow core final isminimumfixversionavailable true minimumfixversion final packagetype java groupid io undertow packagename undertow core packageversion final packagefilepaths istransitivedependency false dependencytree io undertow undertow core final isminimumfixversionavailable true minimumfixversion final basebranches vulnerabilityidentifier cve vulnerabilitydetails a flaw was found in all under in the undertow debug log for io undertow request security if enabled an attacker could abuse this flaw to obtain the user credentials from the log files vulnerabilityurl
0
193,326
22,216,131,418
IssuesEvent
2022-06-08 01:59:11
maddyCode23/linux-4.1.15
https://api.github.com/repos/maddyCode23/linux-4.1.15
reopened
CVE-2016-10044 (High) detected in linux-stable-rtv4.1.33
security vulnerability
## CVE-2016-10044 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/aio.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. <p>Publish Date: 2017-02-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10044>CVE-2016-10044</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10044">https://nvd.nist.gov/vuln/detail/CVE-2016-10044</a></p> <p>Release Date: 2017-02-07</p> <p>Fix Resolution: 4.7.7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-10044 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2016-10044 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/aio.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The aio_mount function in fs/aio.c in the Linux kernel before 4.7.7 does not properly restrict execute access, which makes it easier for local users to bypass intended SELinux W^X policy restrictions, and consequently gain privileges, via an io_setup system call. <p>Publish Date: 2017-02-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10044>CVE-2016-10044</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10044">https://nvd.nist.gov/vuln/detail/CVE-2016-10044</a></p> <p>Release Date: 2017-02-07</p> <p>Fix Resolution: 4.7.7</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files fs aio c vulnerability details the aio mount function in fs aio c in the linux kernel before does not properly restrict execute access which makes it easier for local users to bypass intended selinux w x policy restrictions and consequently gain privileges via an io setup system call publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
117,411
9,934,631,175
IssuesEvent
2019-07-02 14:51:03
packit-service/sandcastle
https://api.github.com/repos/packit-service/sandcastle
opened
Some tests freeze quite often
bug testing
Tests quite often freeze on this: ``` /usr/lib/python3.7/site-packages/kubernetes/stream/ws_client.py:256: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = <kubernetes.stream.ws_client.WSClient object at 0x7f00787005f8>, timeout = None def run_forever(self, timeout=None): """Wait till connection is closed or timeout reached. Buffer any input received during this time.""" if timeout: start = time.time() while self.is_open() and time.time() - start < timeout: self.update(timeout=(timeout - time.time() + start)) else: while self.is_open(): > self.update(timeout=None) /usr/lib/python3.7/site-packages/kubernetes/stream/ws_client.py:206: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = <kubernetes.stream.ws_client.WSClient object at 0x7f00787005f8>, timeout = None def update(self, timeout=0): """Update channel buffers with at most one complete frame of input.""" if not self.is_open(): return if not self.sock.connected: self._connected = False return r, _, _ = select.select( > (self.sock.sock, ), (), (), timeout) E KeyboardInterrupt ``` Stack trace: ``` sandcastle/api.py:502: in exec self._copy_path_to_pod(self.mapped_dir.local_dir, unique_dir) sandcastle/api.py:579: in _copy_path_to_pod self._do_exec(["rm", "-rf", remote_tmp_dir]) sandcastle/api.py:439: in _do_exec _preload_content=preload_content, # <<< we need a client object /usr/lib/python3.7/site-packages/kubernetes/stream/stream.py:36: in stream return func(*args, **kwargs) /usr/lib/python3.7/site-packages/kubernetes/client/apis/core_v1_api.py:835: in connect_get_namespaced_pod_exec (data) = self.connect_get_namespaced_pod_exec_with_http_info(name, namespace, **kwargs) /usr/lib/python3.7/site-packages/kubernetes/client/apis/core_v1_api.py:935: in connect_get_namespaced_pod_exec_with_http_info collection_formats=collection_formats) /usr/lib/python3.7/site-packages/kubernetes/client/api_client.py:321: in call_api _return_http_data_only, collection_formats, _preload_content, _request_timeout) /usr/lib/python3.7/site-packages/kubernetes/client/api_client.py:155: in __call_api _request_timeout=_request_timeout) /usr/lib/python3.7/site-packages/kubernetes/stream/stream.py:31: in _intercept_request_call return ws_client.websocket_call(config, *args, **kwargs) ``` No idea if this is a client or server problem.
1.0
Some tests freeze quite often - Tests quite often freeze on this: ``` /usr/lib/python3.7/site-packages/kubernetes/stream/ws_client.py:256: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = <kubernetes.stream.ws_client.WSClient object at 0x7f00787005f8>, timeout = None def run_forever(self, timeout=None): """Wait till connection is closed or timeout reached. Buffer any input received during this time.""" if timeout: start = time.time() while self.is_open() and time.time() - start < timeout: self.update(timeout=(timeout - time.time() + start)) else: while self.is_open(): > self.update(timeout=None) /usr/lib/python3.7/site-packages/kubernetes/stream/ws_client.py:206: _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ self = <kubernetes.stream.ws_client.WSClient object at 0x7f00787005f8>, timeout = None def update(self, timeout=0): """Update channel buffers with at most one complete frame of input.""" if not self.is_open(): return if not self.sock.connected: self._connected = False return r, _, _ = select.select( > (self.sock.sock, ), (), (), timeout) E KeyboardInterrupt ``` Stack trace: ``` sandcastle/api.py:502: in exec self._copy_path_to_pod(self.mapped_dir.local_dir, unique_dir) sandcastle/api.py:579: in _copy_path_to_pod self._do_exec(["rm", "-rf", remote_tmp_dir]) sandcastle/api.py:439: in _do_exec _preload_content=preload_content, # <<< we need a client object /usr/lib/python3.7/site-packages/kubernetes/stream/stream.py:36: in stream return func(*args, **kwargs) /usr/lib/python3.7/site-packages/kubernetes/client/apis/core_v1_api.py:835: in connect_get_namespaced_pod_exec (data) = self.connect_get_namespaced_pod_exec_with_http_info(name, namespace, **kwargs) /usr/lib/python3.7/site-packages/kubernetes/client/apis/core_v1_api.py:935: in connect_get_namespaced_pod_exec_with_http_info collection_formats=collection_formats) /usr/lib/python3.7/site-packages/kubernetes/client/api_client.py:321: in call_api _return_http_data_only, collection_formats, _preload_content, _request_timeout) /usr/lib/python3.7/site-packages/kubernetes/client/api_client.py:155: in __call_api _request_timeout=_request_timeout) /usr/lib/python3.7/site-packages/kubernetes/stream/stream.py:31: in _intercept_request_call return ws_client.websocket_call(config, *args, **kwargs) ``` No idea if this is a client or server problem.
non_priority
some tests freeze quite often tests quite often freeze on this usr lib site packages kubernetes stream ws client py self timeout none def run forever self timeout none wait till connection is closed or timeout reached buffer any input received during this time if timeout start time time while self is open and time time start timeout self update timeout timeout time time start else while self is open self update timeout none usr lib site packages kubernetes stream ws client py self timeout none def update self timeout update channel buffers with at most one complete frame of input if not self is open return if not self sock connected self connected false return r select select self sock sock timeout e keyboardinterrupt stack trace sandcastle api py in exec self copy path to pod self mapped dir local dir unique dir sandcastle api py in copy path to pod self do exec sandcastle api py in do exec preload content preload content we need a client object usr lib site packages kubernetes stream stream py in stream return func args kwargs usr lib site packages kubernetes client apis core api py in connect get namespaced pod exec data self connect get namespaced pod exec with http info name namespace kwargs usr lib site packages kubernetes client apis core api py in connect get namespaced pod exec with http info collection formats collection formats usr lib site packages kubernetes client api client py in call api return http data only collection formats preload content request timeout usr lib site packages kubernetes client api client py in call api request timeout request timeout usr lib site packages kubernetes stream stream py in intercept request call return ws client websocket call config args kwargs no idea if this is a client or server problem
0
144
2,551,571,467
IssuesEvent
2015-02-02 10:47:56
LinDA-tools/LindaWorkbench
https://api.github.com/repos/LinDA-tools/LindaWorkbench
closed
Support and provide deployment options for the Transformation Engine on a local platform. Provide interfaces for management of the tools and execution options.
Requirement from D1.2 Deliverable Transformation tool
Support and provide deployment options for the Transformation Engine on a local platform. Provide interfaces for management of the tools and execution options.
1.0
Support and provide deployment options for the Transformation Engine on a local platform. Provide interfaces for management of the tools and execution options. - Support and provide deployment options for the Transformation Engine on a local platform. Provide interfaces for management of the tools and execution options.
non_priority
support and provide deployment options for the transformation engine on a local platform provide interfaces for management of the tools and execution options support and provide deployment options for the transformation engine on a local platform provide interfaces for management of the tools and execution options
0
244,585
26,434,906,898
IssuesEvent
2023-01-15 09:02:54
aayant-mend/onboardtraining
https://api.github.com/repos/aayant-mend/onboardtraining
opened
slack-spring-boot-starter-2.0.0.jar: 60 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>slack-spring-boot-starter-2.0.0.jar</b></p></summary> <p></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.6/815893df5f31da2ece4040fe0a12fd44b577afaf/commons-io-2.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.6/815893df5f31da2ece4040fe0a12fd44b577afaf/commons-io-2.6.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (slack-spring-boot-starter version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-14540](https://www.mend.io/vulnerability-database/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-17531](https://www.mend.io/vulnerability-database/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-16335](https://www.mend.io/vulnerability-database/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-17267](https://www.mend.io/vulnerability-database/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-16942](https://www.mend.io/vulnerability-database/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-8840](https://www.mend.io/vulnerability-database/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-16943](https://www.mend.io/vulnerability-database/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | N/A* | &#10060; | | [CVE-2019-14893](https://www.mend.io/vulnerability-database/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-14892](https://www.mend.io/vulnerability-database/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-9546](https://www.mend.io/vulnerability-database/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-14379](https://www.mend.io/vulnerability-database/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-9547](https://www.mend.io/vulnerability-database/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-9548](https://www.mend.io/vulnerability-database/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-20330](https://www.mend.io/vulnerability-database/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10968](https://www.mend.io/vulnerability-database/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10969](https://www.mend.io/vulnerability-database/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11111](https://www.mend.io/vulnerability-database/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11113](https://www.mend.io/vulnerability-database/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11112](https://www.mend.io/vulnerability-database/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10672](https://www.mend.io/vulnerability-database/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10673](https://www.mend.io/vulnerability-database/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11619](https://www.mend.io/vulnerability-database/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-35728](https://www.mend.io/vulnerability-database/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36189](https://www.mend.io/vulnerability-database/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36188](https://www.mend.io/vulnerability-database/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11620](https://www.mend.io/vulnerability-database/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10650](https://www.mend.io/vulnerability-database/CVE-2020-10650) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36181](https://www.mend.io/vulnerability-database/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36180](https://www.mend.io/vulnerability-database/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36183](https://www.mend.io/vulnerability-database/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-35490](https://www.mend.io/vulnerability-database/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36182](https://www.mend.io/vulnerability-database/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36185](https://www.mend.io/vulnerability-database/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-35491](https://www.mend.io/vulnerability-database/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36184](https://www.mend.io/vulnerability-database/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36187](https://www.mend.io/vulnerability-database/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36186](https://www.mend.io/vulnerability-database/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2021-20190](https://www.mend.io/vulnerability-database/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36179](https://www.mend.io/vulnerability-database/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-24616](https://www.mend.io/vulnerability-database/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14060](https://www.mend.io/vulnerability-database/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14061](https://www.mend.io/vulnerability-database/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14062](https://www.mend.io/vulnerability-database/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-24750](https://www.mend.io/vulnerability-database/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14195](https://www.mend.io/vulnerability-database/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-27772](https://www.mend.io/vulnerability-database/CVE-2022-27772) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | spring-boot-2.1.3.RELEASE.jar | Transitive | N/A* | &#10060; | | [CVE-2019-12086](https://www.mend.io/vulnerability-database/CVE-2019-12086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | N/A* | &#10060; | | [CVE-2020-25649](https://www.mend.io/vulnerability-database/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-14439](https://www.mend.io/vulnerability-database/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-42004](https://www.mend.io/vulnerability-database/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-42003](https://www.mend.io/vulnerability-database/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36518](https://www.mend.io/vulnerability-database/CVE-2020-36518) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.12.jar | Transitive | N/A* | &#10060; | | [CVE-2019-12814](https://www.mend.io/vulnerability-database/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-12384](https://www.mend.io/vulnerability-database/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-22970](https://www.mend.io/vulnerability-database/CVE-2022-22970) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | spring-core-5.1.5.RELEASE.jar | Transitive | N/A* | &#10060; | | [CVE-2020-13956](https://www.mend.io/vulnerability-database/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.5.9.jar | Transitive | N/A* | &#10060; | | [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.6.jar | Transitive | N/A* | &#10060; | | [CVE-2021-22096](https://www.mend.io/vulnerability-database/CVE-2021-22096) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | spring-core-5.1.5.RELEASE.jar | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details > Partial details (15 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10,2.10.0.pr3,2.11.0.rc1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10202</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://access.redhat.com/errata/RHSA-2019:2938">https://access.redhat.com/errata/RHSA-2019:2938</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: org.codehaus.jackson:jackson-mapper-asl-7.2.4;com.fasterxml.jackson.core:jackson-databind-2.9.9</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-09-04</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14379>CVE-2019-14379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.5,2.9.10.2</p> </p> <p></p> </details>
True
slack-spring-boot-starter-2.0.0.jar: 60 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>slack-spring-boot-starter-2.0.0.jar</b></p></summary> <p></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.6/815893df5f31da2ece4040fe0a12fd44b577afaf/commons-io-2.6.jar,/home/wss-scanner/.gradle/caches/modules-2/files-2.1/commons-io/commons-io/2.6/815893df5f31da2ece4040fe0a12fd44b577afaf/commons-io-2.6.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (slack-spring-boot-starter version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-14540](https://www.mend.io/vulnerability-database/CVE-2019-14540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-17531](https://www.mend.io/vulnerability-database/CVE-2019-17531) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-16335](https://www.mend.io/vulnerability-database/CVE-2019-16335) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-17267](https://www.mend.io/vulnerability-database/CVE-2019-17267) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-16942](https://www.mend.io/vulnerability-database/CVE-2019-16942) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-8840](https://www.mend.io/vulnerability-database/CVE-2020-8840) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-16943](https://www.mend.io/vulnerability-database/CVE-2019-16943) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-10202](https://www.mend.io/vulnerability-database/CVE-2019-10202) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jackson-databind-2.9.8.jar | Transitive | N/A* | &#10060; | | [CVE-2019-14893](https://www.mend.io/vulnerability-database/CVE-2019-14893) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-14892](https://www.mend.io/vulnerability-database/CVE-2019-14892) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-9546](https://www.mend.io/vulnerability-database/CVE-2020-9546) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-14379](https://www.mend.io/vulnerability-database/CVE-2019-14379) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-9547](https://www.mend.io/vulnerability-database/CVE-2020-9547) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-9548](https://www.mend.io/vulnerability-database/CVE-2020-9548) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-20330](https://www.mend.io/vulnerability-database/CVE-2019-20330) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10968](https://www.mend.io/vulnerability-database/CVE-2020-10968) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10969](https://www.mend.io/vulnerability-database/CVE-2020-10969) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11111](https://www.mend.io/vulnerability-database/CVE-2020-11111) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11113](https://www.mend.io/vulnerability-database/CVE-2020-11113) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11112](https://www.mend.io/vulnerability-database/CVE-2020-11112) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10672](https://www.mend.io/vulnerability-database/CVE-2020-10672) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10673](https://www.mend.io/vulnerability-database/CVE-2020-10673) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11619](https://www.mend.io/vulnerability-database/CVE-2020-11619) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-35728](https://www.mend.io/vulnerability-database/CVE-2020-35728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36189](https://www.mend.io/vulnerability-database/CVE-2020-36189) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36188](https://www.mend.io/vulnerability-database/CVE-2020-36188) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-11620](https://www.mend.io/vulnerability-database/CVE-2020-11620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-10650](https://www.mend.io/vulnerability-database/CVE-2020-10650) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36181](https://www.mend.io/vulnerability-database/CVE-2020-36181) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36180](https://www.mend.io/vulnerability-database/CVE-2020-36180) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36183](https://www.mend.io/vulnerability-database/CVE-2020-36183) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-35490](https://www.mend.io/vulnerability-database/CVE-2020-35490) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36182](https://www.mend.io/vulnerability-database/CVE-2020-36182) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36185](https://www.mend.io/vulnerability-database/CVE-2020-36185) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-35491](https://www.mend.io/vulnerability-database/CVE-2020-35491) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36184](https://www.mend.io/vulnerability-database/CVE-2020-36184) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36187](https://www.mend.io/vulnerability-database/CVE-2020-36187) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36186](https://www.mend.io/vulnerability-database/CVE-2020-36186) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2021-20190](https://www.mend.io/vulnerability-database/CVE-2021-20190) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36179](https://www.mend.io/vulnerability-database/CVE-2020-36179) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-24616](https://www.mend.io/vulnerability-database/CVE-2020-24616) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14060](https://www.mend.io/vulnerability-database/CVE-2020-14060) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14061](https://www.mend.io/vulnerability-database/CVE-2020-14061) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14062](https://www.mend.io/vulnerability-database/CVE-2020-14062) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-24750](https://www.mend.io/vulnerability-database/CVE-2020-24750) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-14195](https://www.mend.io/vulnerability-database/CVE-2020-14195) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-27772](https://www.mend.io/vulnerability-database/CVE-2022-27772) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.8 | spring-boot-2.1.3.RELEASE.jar | Transitive | N/A* | &#10060; | | [CVE-2019-12086](https://www.mend.io/vulnerability-database/CVE-2019-12086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | jackson-databind-2.9.8.jar | Transitive | N/A* | &#10060; | | [CVE-2020-25649](https://www.mend.io/vulnerability-database/CVE-2020-25649) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-14439](https://www.mend.io/vulnerability-database/CVE-2019-14439) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-42004](https://www.mend.io/vulnerability-database/CVE-2022-42004) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-42003](https://www.mend.io/vulnerability-database/CVE-2022-42003) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-36518](https://www.mend.io/vulnerability-database/CVE-2020-36518) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [WS-2019-0379](https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | commons-codec-1.12.jar | Transitive | N/A* | &#10060; | | [CVE-2019-12814](https://www.mend.io/vulnerability-database/CVE-2019-12814) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2019-12384](https://www.mend.io/vulnerability-database/CVE-2019-12384) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-22970](https://www.mend.io/vulnerability-database/CVE-2022-22970) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | spring-core-5.1.5.RELEASE.jar | Transitive | N/A* | &#10060; | | [CVE-2020-13956](https://www.mend.io/vulnerability-database/CVE-2020-13956) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | httpclient-4.5.9.jar | Transitive | N/A* | &#10060; | | [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.6.jar | Transitive | N/A* | &#10060; | | [CVE-2021-22096](https://www.mend.io/vulnerability-database/CVE-2021-22096) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.3 | spring-core-5.1.5.RELEASE.jar | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details > Partial details (15 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14540</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14540>CVE-2019-14540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14540</a></p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10,2.10.0.pr3,2.11.0.rc1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17531</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the apache-log4j-extra (version 1.2.x) jar in the classpath, and an attacker can provide a JNDI service to access, it is possible to make the service execute a malicious payload. <p>Publish Date: 2019-10-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17531>CVE-2019-17531</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17531</a></p> <p>Release Date: 2019-10-12</p> <p>Fix Resolution: 2.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16335</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540. <p>Publish Date: 2019-09-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16335>CVE-2019-16335</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-09-15</p> <p>Fix Resolution: 2.9.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-17267</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to net.sf.ehcache.hibernate.EhcacheJtaTransactionManagerLookup. <p>Publish Date: 2019-10-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-17267>CVE-2019-17267</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-07</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.8.11.5,2.9.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16942</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the commons-dbcp (1.4) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of org.apache.commons.dbcp.datasources.SharedPoolDataSource and org.apache.commons.dbcp.datasources.PerUserPoolDataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16942>CVE-2019-16942</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16942</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-8840</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.0.0 through 2.9.10.2 lacks certain xbean-reflect/JNDI blocking, as demonstrated by org.apache.xbean.propertyeditor.JndiConverter. <p>Publish Date: 2020-02-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-8840>CVE-2020-8840</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-02-10</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-16943</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.0.0 through 2.9.10. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the p6spy (3.8.6) jar in the classpath, and an attacker can find an RMI service endpoint to access, it is possible to make the service execute a malicious payload. This issue exists because of com.p6spy.engine.spy.P6DataSource mishandling. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-16943>CVE-2019-16943</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16943</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10202</summary> ### Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10202>CVE-2019-10202</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://access.redhat.com/errata/RHSA-2019:2938">https://access.redhat.com/errata/RHSA-2019:2938</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: org.codehaus.jackson:jackson-mapper-asl-7.2.4;com.fasterxml.jackson.core:jackson-databind-2.9.9</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14893</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14893>CVE-2019-14893</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14892</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14892>CVE-2019-14892</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-09-04</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9546</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9546>CVE-2020-9546</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-14379</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> SubTypeValidator.java in FasterXML jackson-databind before 2.9.9.2 mishandles default typing when ehcache is used (because of net.sf.ehcache.transaction.manager.DefaultTransactionManagerLookup), leading to remote code execution. <p>Publish Date: 2019-07-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-14379>CVE-2019-14379</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14379</a></p> <p>Release Date: 2019-07-29</p> <p>Fix Resolution: 2.9.9.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9547</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.ibatis.sqlmap.engine.transaction.jta.JtaTransactionConfig (aka ibatis-sqlmap). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9547>CVE-2020-9547</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9547</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-9548</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.9.jar</b></p> <p> ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to br.com.anteros.dbcp.AnterosDBCPConfig (aka anteros-core). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-9548>CVE-2020-9548</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9548</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.6,2.9.10.4</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20330</summary> ### Vulnerable Libraries - <b>jackson-databind-2.9.9.jar</b>, <b>jackson-databind-2.9.8.jar</b></p> <p> ### <b>jackson-databind-2.9.9.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.9/d6eb9817d9c7289a91f043ac5ee02a6b3cc86238/jackson-databind-2.9.9.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.9.jar - :x: **jackson-databind-2.9.9.jar** (Vulnerable Library) ### <b>jackson-databind-2.9.8.jar</b></p> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /Java/Gradle/kotlin-build-1/build.gradle.kts</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - slack-spring-boot-starter-2.0.0.jar (Root Library) - jackson-module-kotlin-2.9.8.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/aayant-mend/onboardtraining/commit/4839f6588961e746880b27503fdce27cafb1e42e">4839f6588961e746880b27503fdce27cafb1e42e</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> FasterXML jackson-databind 2.x before 2.9.10.2 lacks certain net.sf.ehcache blocking. <p>Publish Date: 2020-01-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20330>CVE-2019-20330</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-01-03</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.7.9.7,2.8.11.5,2.9.10.2</p> </p> <p></p> </details>
non_priority
slack spring boot starter jar vulnerabilities highest severity is vulnerable library slack spring boot starter jar path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files commons io commons io commons io jar home wss scanner gradle caches modules files commons io commons io commons io jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in slack spring boot starter version remediation available high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high jackson databind jar transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high spring boot release jar transitive n a high jackson databind jar transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a high detected in multiple dependencies transitive n a medium commons codec jar transitive n a medium detected in multiple dependencies transitive n a medium detected in multiple dependencies transitive n a medium spring core release jar transitive n a medium httpclient jar transitive n a medium commons io jar transitive n a medium spring core release jar transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikariconfig publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the apache extra version x jar in the classpath and an attacker can provide a jndi service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to com zaxxer hikari hikaridatasource this is a different vulnerability than cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind before it is related to net sf ehcache hibernate ehcachejtatransactionmanagerlookup publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the commons dbcp jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of org apache commons dbcp datasources sharedpooldatasource and org apache commons dbcp datasources peruserpooldatasource mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind through lacks certain xbean reflect jndi blocking as demonstrated by org apache xbean propertyeditor jndiconverter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has the jar in the classpath and an attacker can find an rmi service endpoint to access it is possible to make the service execute a malicious payload this issue exists because of com engine spy mishandling publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org codehaus jackson jackson mapper asl com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache hadoop shaded com zaxxer hikari hikariconfig aka shaded hikari config publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details subtypevalidator java in fasterxml jackson databind before mishandles default typing when ehcache is used because of net sf ehcache transaction manager defaulttransactionmanagerlookup leading to remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com ibatis sqlmap engine transaction jta jtatransactionconfig aka ibatis sqlmap publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to br com anteros dbcp anterosdbcpconfig aka anteros core publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind cve vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file java gradle kotlin build build gradle kts path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy slack spring boot starter jar root library jackson module kotlin jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before lacks certain net sf ehcache blocking publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind
0
17,057
11,612,089,191
IssuesEvent
2020-02-26 08:14:42
stancl/tenancy
https://api.github.com/repos/stancl/tenancy
closed
Make asset() tenancy optional
feature usability
Hi, I am having somewhat issues including Horizon and the documentation is not quite clear. What I have done is installed Horizon and added the "universal" middleware on config/horizon.php. But when I try to load /horizon the js and css assets are referenced to the tenant instead of globally. `http://hostaname/tenancy/assets/vendor/horizon/app.js?id=f41217b645f8cd9ffacc` The [Horizon blade layout is using asset() helper](https://github.com/laravel/horizon/blob/3.0/resources/views/layout.blade.php#L14) so shouldn't it call it from the /vendor/horizon instead of the tenancy assets?
True
Make asset() tenancy optional - Hi, I am having somewhat issues including Horizon and the documentation is not quite clear. What I have done is installed Horizon and added the "universal" middleware on config/horizon.php. But when I try to load /horizon the js and css assets are referenced to the tenant instead of globally. `http://hostaname/tenancy/assets/vendor/horizon/app.js?id=f41217b645f8cd9ffacc` The [Horizon blade layout is using asset() helper](https://github.com/laravel/horizon/blob/3.0/resources/views/layout.blade.php#L14) so shouldn't it call it from the /vendor/horizon instead of the tenancy assets?
non_priority
make asset tenancy optional hi i am having somewhat issues including horizon and the documentation is not quite clear what i have done is installed horizon and added the universal middleware on config horizon php but when i try to load horizon the js and css assets are referenced to the tenant instead of globally the so shouldn t it call it from the vendor horizon instead of the tenancy assets
0
93,828
15,946,420,176
IssuesEvent
2021-04-15 01:01:37
jgeraigery/core
https://api.github.com/repos/jgeraigery/core
opened
CVE-2018-14721 (High) detected in jackson-databind-2.9.6.jar
security vulnerability
## CVE-2018-14721 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.6.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: core/nimbus-entity-dsl/pom.xml</p> <p>Path to vulnerable library: core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar</p> <p> Dependency Hierarchy: - spring-cloud-starter-config-2.0.0.RELEASE.jar (Root Library) - :x: **jackson-databind-2.9.6.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721>CVE-2018-14721</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.6","packageFilePaths":["/nimbus-entity-dsl/pom.xml","/nimbus-core/pom.xml","/nimbus-test/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.cloud:spring-cloud-starter-config:2.0.0.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.9.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-14721","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721","cvss3Severity":"high","cvss3Score":"10.0","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2018-14721 (High) detected in jackson-databind-2.9.6.jar - ## CVE-2018-14721 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.6.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: core/nimbus-entity-dsl/pom.xml</p> <p>Path to vulnerable library: core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar</p> <p> Dependency Hierarchy: - spring-cloud-starter-config-2.0.0.RELEASE.jar (Root Library) - :x: **jackson-databind-2.9.6.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization. <p>Publish Date: 2019-01-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721>CVE-2018-14721</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721</a></p> <p>Release Date: 2019-01-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.6","packageFilePaths":["/nimbus-entity-dsl/pom.xml","/nimbus-core/pom.xml","/nimbus-test/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.cloud:spring-cloud-starter-config:2.0.0.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.9.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-14721","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721","cvss3Severity":"high","cvss3Score":"10.0","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file core nimbus entity dsl pom xml path to vulnerable library core jackson databind jackson databind jar core jackson databind jackson databind jar core jackson databind jackson databind jar dependency hierarchy spring cloud starter config release jar root library x jackson databind jar vulnerable library found in base branch master vulnerability details fasterxml jackson databind x before might allow remote attackers to conduct server side request forgery ssrf attacks by leveraging failure to block the jaxws class from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org springframework cloud spring cloud starter config release com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before might allow remote attackers to conduct server side request forgery ssrf attacks by leveraging failure to block the jaxws class from polymorphic deserialization vulnerabilityurl
0
217,755
16,887,341,227
IssuesEvent
2021-06-23 03:15:29
crypto-org-chain/chain-main
https://api.github.com/repos/crypto-org-chain/chain-main
closed
Problem: nix function called with an unexpected argument
test
https://github.com/crypto-org-chain/chain-main/runs/2881839518#step:8:1 ``` error: anonymous function at /home/runner/work/chain-main/chain-main/pystarport/default.nix:1:1 called with unexpected argument 'chaind', at /home/runner/work/chain-main/chain-main/default.nix:72:16 19 (use '--show-trace' to show detailed location information) ```
1.0
Problem: nix function called with an unexpected argument - https://github.com/crypto-org-chain/chain-main/runs/2881839518#step:8:1 ``` error: anonymous function at /home/runner/work/chain-main/chain-main/pystarport/default.nix:1:1 called with unexpected argument 'chaind', at /home/runner/work/chain-main/chain-main/default.nix:72:16 19 (use '--show-trace' to show detailed location information) ```
non_priority
problem nix function called with an unexpected argument error anonymous function at home runner work chain main chain main pystarport default nix called with unexpected argument chaind at home runner work chain main chain main default nix use show trace to show detailed location information
0
44,298
13,051,312,691
IssuesEvent
2020-07-29 16:53:00
kenferrara/hadoop-crypto
https://api.github.com/repos/kenferrara/hadoop-crypto
opened
CVE-2014-3488 (Medium) detected in netty-3.7.0.Final.jar
security vulnerability
## CVE-2014-3488 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-3.7.0.Final.jar</b></p></summary> <p>The Netty project is an effort to provide an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: /tmp/ws-scm/hadoop-crypto/hadoop-crypto/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty/3.7.0.Final/7a8c35599c68c0bf383df74469aa3e03d9aca87/netty-3.7.0.Final.jar,canner/.gradle/caches/modules-2/files-2.1/io.netty/netty/3.7.0.Final/7a8c35599c68c0bf383df74469aa3e03d9aca87/netty-3.7.0.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-3.7.0.Final.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kenferrara/hadoop-crypto/commit/c87ffc6b57551c0ce1c2ffa481dbff77be9b0e38">c87ffc6b57551c0ce1c2ffa481dbff77be9b0e38</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message. <p>Publish Date: 2014-07-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3488>CVE-2014-3488</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3488">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3488</a></p> <p>Release Date: 2014-07-31</p> <p>Fix Resolution: 3.9.2.Final</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty","packageVersion":"3.7.0.Final","isTransitiveDependency":false,"dependencyTree":"io.netty:netty:3.7.0.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.9.2.Final"}],"vulnerabilityIdentifier":"CVE-2014-3488","vulnerabilityDetails":"The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3488","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> -->
True
CVE-2014-3488 (Medium) detected in netty-3.7.0.Final.jar - ## CVE-2014-3488 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-3.7.0.Final.jar</b></p></summary> <p>The Netty project is an effort to provide an asynchronous event-driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients. In other words, Netty is a NIO client server framework which enables quick and easy development of network applications such as protocol servers and clients. It greatly simplifies and streamlines network programming such as TCP and UDP socket server.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: /tmp/ws-scm/hadoop-crypto/hadoop-crypto/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty/3.7.0.Final/7a8c35599c68c0bf383df74469aa3e03d9aca87/netty-3.7.0.Final.jar,canner/.gradle/caches/modules-2/files-2.1/io.netty/netty/3.7.0.Final/7a8c35599c68c0bf383df74469aa3e03d9aca87/netty-3.7.0.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-3.7.0.Final.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/kenferrara/hadoop-crypto/commit/c87ffc6b57551c0ce1c2ffa481dbff77be9b0e38">c87ffc6b57551c0ce1c2ffa481dbff77be9b0e38</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message. <p>Publish Date: 2014-07-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3488>CVE-2014-3488</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3488">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3488</a></p> <p>Release Date: 2014-07-31</p> <p>Fix Resolution: 3.9.2.Final</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty","packageVersion":"3.7.0.Final","isTransitiveDependency":false,"dependencyTree":"io.netty:netty:3.7.0.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"3.9.2.Final"}],"vulnerabilityIdentifier":"CVE-2014-3488","vulnerabilityDetails":"The SslHandler in Netty before 3.9.2 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted SSLv2Hello message.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-3488","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in netty final jar cve medium severity vulnerability vulnerable library netty final jar the netty project is an effort to provide an asynchronous event driven network application framework and tools for rapid development of maintainable high performance and high scalability protocol servers and clients in other words netty is a nio client server framework which enables quick and easy development of network applications such as protocol servers and clients it greatly simplifies and streamlines network programming such as tcp and udp socket server library home page a href path to dependency file tmp ws scm hadoop crypto hadoop crypto build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty final netty final jar canner gradle caches modules files io netty netty final netty final jar dependency hierarchy x netty final jar vulnerable library found in head commit a href vulnerability details the sslhandler in netty before allows remote attackers to cause a denial of service infinite loop and cpu consumption via a crafted message publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution final check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the sslhandler in netty before allows remote attackers to cause a denial of service infinite loop and cpu consumption via a crafted message vulnerabilityurl
0
44,382
12,124,470,731
IssuesEvent
2020-04-22 14:13:48
jOOQ/jOOQ
https://api.github.com/repos/jOOQ/jOOQ
opened
the mistake that No database selected appears when dslContext.resultQuery(sql)
T: Defect
String sql = String.format("select * from workorder where workorder.id in "); sql=sql+idString; resultQuery = dslContext.resultQuery(sql).fetchInto(Workorder.class); mistake : "jOOQ; uncategorized SQLException for SQL [select * from workorder where workorder.id in ('1')]; SQL state [3D000]; error code [1046]; No database selected; nested exception is java.sql.SQLException: No database selected",
1.0
the mistake that No database selected appears when dslContext.resultQuery(sql) - String sql = String.format("select * from workorder where workorder.id in "); sql=sql+idString; resultQuery = dslContext.resultQuery(sql).fetchInto(Workorder.class); mistake : "jOOQ; uncategorized SQLException for SQL [select * from workorder where workorder.id in ('1')]; SQL state [3D000]; error code [1046]; No database selected; nested exception is java.sql.SQLException: No database selected",
non_priority
the mistake that no database selected appears when dslcontext resultquery sql string sql string format select from workorder where workorder id in sql sql idstring resultquery dslcontext resultquery sql fetchinto workorder class mistake jooq uncategorized sqlexception for sql sql state error code no database selected nested exception is java sql sqlexception no database selected
0
384,998
26,611,030,625
IssuesEvent
2023-01-24 00:14:51
foundryvtt/foundryvtt
https://api.github.com/repos/foundryvtt/foundryvtt
opened
createScrollingText incorrectly(?) references text originating from ObjectHUD container
documentation api
From `@Mana#4176 The text originates from a Point on the canvas, not whatever weird the documentation says. Ref: https://foundryvtt.com/api/classes/client.InterfaceCanvasGroup.html#createScrollingText
1.0
createScrollingText incorrectly(?) references text originating from ObjectHUD container - From `@Mana#4176 The text originates from a Point on the canvas, not whatever weird the documentation says. Ref: https://foundryvtt.com/api/classes/client.InterfaceCanvasGroup.html#createScrollingText
non_priority
createscrollingtext incorrectly references text originating from objecthud container from mana the text originates from a point on the canvas not whatever weird the documentation says ref
0
268,022
20,255,119,171
IssuesEvent
2022-02-14 22:10:55
nf-core/rnaseq
https://api.github.com/repos/nf-core/rnaseq
closed
Set STAR align option 'limitSjdbInsertNsj'
documentation
With certain RNA datasets I have an error from STAR align telling me to increase the value of option 'limitSjdbInsertNsj': `Fatal LIMIT error: the number of junctions to be inserted on the fly =1043854 is larger than the limitSjdbInsertNsj=1000000 SOLUTION: re-run with at least --limitSjdbInsertNsj 1043854` I've tried looking for a way to set this STAR align option in config. I saw this commit 6f3d33059966d52947bde86f81ee0571ba851ae7 allowed parsing of STAR options in the config file, but do not see it implemented in the release versions. Is there a current way to change this option in the pipeline?
1.0
Set STAR align option 'limitSjdbInsertNsj' - With certain RNA datasets I have an error from STAR align telling me to increase the value of option 'limitSjdbInsertNsj': `Fatal LIMIT error: the number of junctions to be inserted on the fly =1043854 is larger than the limitSjdbInsertNsj=1000000 SOLUTION: re-run with at least --limitSjdbInsertNsj 1043854` I've tried looking for a way to set this STAR align option in config. I saw this commit 6f3d33059966d52947bde86f81ee0571ba851ae7 allowed parsing of STAR options in the config file, but do not see it implemented in the release versions. Is there a current way to change this option in the pipeline?
non_priority
set star align option limitsjdbinsertnsj with certain rna datasets i have an error from star align telling me to increase the value of option limitsjdbinsertnsj fatal limit error the number of junctions to be inserted on the fly is larger than the limitsjdbinsertnsj solution re run with at least limitsjdbinsertnsj i ve tried looking for a way to set this star align option in config i saw this commit allowed parsing of star options in the config file but do not see it implemented in the release versions is there a current way to change this option in the pipeline
0
260,252
27,781,257,465
IssuesEvent
2023-03-16 21:17:01
TIBCOSoftware/lmi-azure-ec
https://api.github.com/repos/TIBCOSoftware/lmi-azure-ec
opened
CVE-2023-28155 (Medium) detected in request-2.88.0.tgz
Mend: dependency security vulnerability
## CVE-2023-28155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>request-2.88.0.tgz</b></p></summary> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.88.0.tgz">https://registry.npmjs.org/request/-/request-2.88.0.tgz</a></p> <p>Path to dependency file: /lmi-azure-ec/azure-windows-forwarder/package.json</p> <p>Path to vulnerable library: /azure-windows-forwarder/node_modules/request/package.json</p> <p> Dependency Hierarchy: - azure-storage-2.10.3.tgz (Root Library) - :x: **request-2.88.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. <p>Publish Date: 2023-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-28155>CVE-2023-28155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p>
True
CVE-2023-28155 (Medium) detected in request-2.88.0.tgz - ## CVE-2023-28155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>request-2.88.0.tgz</b></p></summary> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.88.0.tgz">https://registry.npmjs.org/request/-/request-2.88.0.tgz</a></p> <p>Path to dependency file: /lmi-azure-ec/azure-windows-forwarder/package.json</p> <p>Path to vulnerable library: /azure-windows-forwarder/node_modules/request/package.json</p> <p> Dependency Hierarchy: - azure-storage-2.10.3.tgz (Root Library) - :x: **request-2.88.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> ** UNSUPPORTED WHEN ASSIGNED ** The Request package through 2.88.1 for Node.js allows a bypass of SSRF mitigations via an attacker-controller server that does a cross-protocol redirect (HTTP to HTTPS, or HTTPS to HTTP). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. <p>Publish Date: 2023-03-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-28155>CVE-2023-28155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p>
non_priority
cve medium detected in request tgz cve medium severity vulnerability vulnerable library request tgz simplified http request client library home page a href path to dependency file lmi azure ec azure windows forwarder package json path to vulnerable library azure windows forwarder node modules request package json dependency hierarchy azure storage tgz root library x request tgz vulnerable library found in base branch master vulnerability details unsupported when assigned the request package through for node js allows a bypass of ssrf mitigations via an attacker controller server that does a cross protocol redirect http to https or https to http note this vulnerability only affects products that are no longer supported by the maintainer publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href
0
309,036
23,280,867,465
IssuesEvent
2022-08-05 11:57:17
vegaprotocol/vega
https://api.github.com/repos/vegaprotocol/vega
closed
Fix JSON generation
documentation
Generating the JSON bundle required for documentation has been removed from all pipelines, but still exists in `generate_json.sh`. However it fails to create the file [we need](https://github.com/vegaprotocol/documentation/blob/main/scripts/build.sh): ``` INFO[0000] Generating JSON-schema for MESSAGE jsonschema_filename=GetRiskFactorsRequest.json msg_name=GetRiskFactorsRequest proto_filename=trading_data.proto INFO[0000] Generating JSON-schema for MESSAGE jsonschema_filename=GetRiskFactorsResponse.json msg_name=GetRiskFactorsResponse proto_filename=trading_data.proto data-node/api/v2/trading_data.proto: This file contains proto3 optional fields, but --experimental_allow_proto3_optional was not set. ``` Helpfully. it includes a suggested fix.
1.0
Fix JSON generation - Generating the JSON bundle required for documentation has been removed from all pipelines, but still exists in `generate_json.sh`. However it fails to create the file [we need](https://github.com/vegaprotocol/documentation/blob/main/scripts/build.sh): ``` INFO[0000] Generating JSON-schema for MESSAGE jsonschema_filename=GetRiskFactorsRequest.json msg_name=GetRiskFactorsRequest proto_filename=trading_data.proto INFO[0000] Generating JSON-schema for MESSAGE jsonschema_filename=GetRiskFactorsResponse.json msg_name=GetRiskFactorsResponse proto_filename=trading_data.proto data-node/api/v2/trading_data.proto: This file contains proto3 optional fields, but --experimental_allow_proto3_optional was not set. ``` Helpfully. it includes a suggested fix.
non_priority
fix json generation generating the json bundle required for documentation has been removed from all pipelines but still exists in generate json sh however it fails to create the file info generating json schema for message jsonschema filename getriskfactorsrequest json msg name getriskfactorsrequest proto filename trading data proto info generating json schema for message jsonschema filename getriskfactorsresponse json msg name getriskfactorsresponse proto filename trading data proto data node api trading data proto this file contains optional fields but experimental allow optional was not set helpfully it includes a suggested fix
0
15,469
3,961,942,485
IssuesEvent
2016-05-02 15:01:17
cloudant/python-cloudant
https://api.github.com/repos/cloudant/python-cloudant
opened
Update readthedocs link in README.rst
bug documentation
The current link to the library documentation in the README.rst is set to `http://python-cloudant.readthedocs.org`. This resolves to `http://python-cloudant.readthedocs.org/index.html` which is actually our index module documentation. When a user clicks this link we want it to go to the documentation home page which is currently `default.html`. We may want to consider either changing the link to specifically point to `http://python-cloudant.readthedocs.org/default.html` or renaming index.html to something different and renaming default.html to index.html.
1.0
Update readthedocs link in README.rst - The current link to the library documentation in the README.rst is set to `http://python-cloudant.readthedocs.org`. This resolves to `http://python-cloudant.readthedocs.org/index.html` which is actually our index module documentation. When a user clicks this link we want it to go to the documentation home page which is currently `default.html`. We may want to consider either changing the link to specifically point to `http://python-cloudant.readthedocs.org/default.html` or renaming index.html to something different and renaming default.html to index.html.
non_priority
update readthedocs link in readme rst the current link to the library documentation in the readme rst is set to this resolves to which is actually our index module documentation when a user clicks this link we want it to go to the documentation home page which is currently default html we may want to consider either changing the link to specifically point to or renaming index html to something different and renaming default html to index html
0
122,023
10,210,311,826
IssuesEvent
2019-08-14 14:33:20
kettanaito/react-advanced-form
https://api.github.com/repos/kettanaito/react-advanced-form
closed
Each Field triggers the render method of the Form Component on load
needs:testing question
# Environment * **react-advanaced-form:** 1.6.7 # What ## Current behavior On the initial page load of a form with fields, the render method of the form is triggered once for each field registration. ## Expected behavior Collect field registrations somehow and update the state in one go. # Why I realize this is probably by design, because the field registration needs to update the state of the form to add the field to the state. However, the side effect of this is the render method being called for every single field in the form. # How Steps to reproduce the issue (ideally, link to the repository/sandbox). 1. Add a Form element with multiple fields. 2. Add a sub component to the form that returns a list of fields. 3. Add a console.log("sub component") inside the render method of the sub component. 4. Note the number of times the console.log() line will be called will be a factor of the number of fields in your form.
1.0
Each Field triggers the render method of the Form Component on load - # Environment * **react-advanaced-form:** 1.6.7 # What ## Current behavior On the initial page load of a form with fields, the render method of the form is triggered once for each field registration. ## Expected behavior Collect field registrations somehow and update the state in one go. # Why I realize this is probably by design, because the field registration needs to update the state of the form to add the field to the state. However, the side effect of this is the render method being called for every single field in the form. # How Steps to reproduce the issue (ideally, link to the repository/sandbox). 1. Add a Form element with multiple fields. 2. Add a sub component to the form that returns a list of fields. 3. Add a console.log("sub component") inside the render method of the sub component. 4. Note the number of times the console.log() line will be called will be a factor of the number of fields in your form.
non_priority
each field triggers the render method of the form component on load environment react advanaced form what current behavior on the initial page load of a form with fields the render method of the form is triggered once for each field registration expected behavior collect field registrations somehow and update the state in one go why i realize this is probably by design because the field registration needs to update the state of the form to add the field to the state however the side effect of this is the render method being called for every single field in the form how steps to reproduce the issue ideally link to the repository sandbox add a form element with multiple fields add a sub component to the form that returns a list of fields add a console log sub component inside the render method of the sub component note the number of times the console log line will be called will be a factor of the number of fields in your form
0
161,228
20,122,344,087
IssuesEvent
2022-02-08 04:40:35
samq-ghdemo/JS-Demo
https://api.github.com/repos/samq-ghdemo/JS-Demo
closed
grunt-retire-0.3.12.tgz: 13 vulnerabilities (highest severity is: 9.8) - autoclosed
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grunt-retire-0.3.12.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cryptiles/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-23807](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jsonpointer-4.0.1.tgz | Transitive | 1.0.0 | ✅ | | [WS-2020-0344](https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | is-my-json-valid-2.19.0.tgz | Transitive | 1.0.0 | ✅ | | [CVE-2018-1000620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | cryptiles-2.0.5.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2018-3728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hoek-2.16.3.tgz | Transitive | 1.0.7 | ✅ | | [WS-2020-0345](https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.2 | jsonpointer-4.0.1.tgz | Transitive | 1.0.0 | ✅ | | [CVE-2017-15010](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tough-cookie-2.2.2.tgz | Transitive | 1.0.7 | ✅ | | [WS-2020-0342](https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | is-my-json-valid-2.19.0.tgz | Transitive | 1.0.0 | ✅ | | [CVE-2017-1000048](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-5.2.1.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2021-23358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.2 | underscore-1.8.3.tgz | Transitive | 1.0.2 | ✅ | | [CVE-2020-8244](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | bl-1.0.3.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2017-16026](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16026) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | request-2.67.0.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2016-1000232](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000232) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | tough-cookie-2.2.2.tgz | Transitive | 1.0.7 | ✅ | | [WS-2018-0076](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.1 | tunnel-agent-0.4.3.tgz | Transitive | 1.0.7 | ✅ | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23807</summary> ### Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.19.0.tgz - :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. <p>Publish Date: 2021-11-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807>CVE-2021-23807</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807</a></p> <p>Release Date: 2021-11-03</p> <p>Fix Resolution (jsonpointer): 5.0.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0344</summary> ### Vulnerable Library - <b>is-my-json-valid-2.19.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.19.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function. <p>Publish Date: 2020-06-09 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d>WS-2020-0344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-09</p> <p>Fix Resolution (is-my-json-valid): 2.20.3</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1000620</summary> ### Vulnerable Library - <b>cryptiles-2.0.5.tgz</b></p> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cryptiles/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution (cryptiles): 4.1.2</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-3728</summary> ### Vulnerable Library - <b>hoek-2.16.3.tgz</b></p> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hoek/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - hawk-3.1.3.tgz - :x: **hoek-2.16.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. <p>Publish Date: 2018-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2018-03-30</p> <p>Fix Resolution (hoek): 4.2.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0345</summary> ### Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.19.0.tgz - :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function. <p>Publish Date: 2020-07-03 <p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0">https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0</a></p> <p>Release Date: 2020-07-03</p> <p>Fix Resolution (jsonpointer): 4.1.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-15010</summary> ### Vulnerable Library - <b>tough-cookie-2.2.2.tgz</b></p> <p>RFC6265 Cookies and Cookie Jar for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz">https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/tough-cookie/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **tough-cookie-2.2.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU. <p>Publish Date: 2017-10-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010>CVE-2017-15010</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15010">https://nvd.nist.gov/vuln/detail/CVE-2017-15010</a></p> <p>Release Date: 2017-10-04</p> <p>Fix Resolution (tough-cookie): 2.3.3</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0342</summary> ### Vulnerable Library - <b>is-my-json-valid-2.19.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.19.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in is-my-json-valid before 2.20.2 via the style format. <p>Publish Date: 2020-06-27 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb>WS-2020-0342</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-27</p> <p>Fix Resolution (is-my-json-valid): 2.20.2</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-1000048</summary> ### Vulnerable Library - <b>qs-5.2.1.tgz</b></p> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-5.2.1.tgz">https://registry.npmjs.org/qs/-/qs-5.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **qs-5.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash. <p>Publish Date: 2017-07-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048>CVE-2017-1000048</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048</a></p> <p>Release Date: 2017-07-17</p> <p>Fix Resolution (qs): 6.0.4</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23358</summary> ### Vulnerable Library - <b>underscore-1.8.3.tgz</b></p> <p>JavaScript's functional programming helper library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.8.3.tgz">https://registry.npmjs.org/underscore/-/underscore-1.8.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/retire/node_modules/underscore/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - retire-1.1.6.tgz - :x: **underscore-1.8.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized. <p>Publish Date: 2021-03-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p> <p>Release Date: 2021-03-29</p> <p>Fix Resolution (underscore): 1.12.1</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.2</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-8244</summary> ### Vulnerable Library - <b>bl-1.0.3.tgz</b></p> <p>Buffer List: collect buffers and access with a standard readable Buffer interface, streamable too!</p> <p>Library home page: <a href="https://registry.npmjs.org/bl/-/bl-1.0.3.tgz">https://registry.npmjs.org/bl/-/bl-1.0.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/bl/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **bl-1.0.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls. <p>Publish Date: 2020-08-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244>CVE-2020-8244</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-pp7h-53gx-mx7r">https://github.com/advisories/GHSA-pp7h-53gx-mx7r</a></p> <p>Release Date: 2020-08-30</p> <p>Fix Resolution (bl): 1.2.3</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16026</summary> ### Vulnerable Library - <b>request-2.67.0.tgz</b></p> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.67.0.tgz">https://registry.npmjs.org/request/-/request-2.67.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/request/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - :x: **request-2.67.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16026>CVE-2017-16026</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16026">https://nvd.nist.gov/vuln/detail/CVE-2017-16026</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution (request): 2.68.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-1000232</summary> ### Vulnerable Library - <b>tough-cookie-2.2.2.tgz</b></p> <p>RFC6265 Cookies and Cookie Jar for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz">https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/tough-cookie/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **tough-cookie-2.2.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0. <p>Publish Date: 2018-09-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000232>CVE-2016-1000232</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/130">https://www.npmjs.com/advisories/130</a></p> <p>Release Date: 2018-09-05</p> <p>Fix Resolution (tough-cookie): 2.3.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2018-0076</summary> ### Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p> <p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p> <p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/tunnel-agent/package.json,/node_modules/tunnel-agent/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. <p>Publish Date: 2017-03-05 <p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p> <p>Release Date: 2017-03-05</p> <p>Fix Resolution (tunnel-agent): 0.6.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details> *** <p>In order to enable automatic remediation for this issue, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-23807","vulnerabilityDetails":"This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2020-0344","vulnerabilityDetails":"Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-1000620","vulnerabilityDetails":"Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2020-0345","vulnerabilityDetails":"Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.","vulnerabilityUrl":"https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34","cvss3Severity":"high","cvss3Score":"8.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2017-15010","vulnerabilityDetails":"A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2020-0342","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in is-my-json-valid before 2.20.2 via the style format.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2017-1000048","vulnerabilityDetails":"the web framework using ljharb\u0027s qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.2","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-23358","vulnerabilityDetails":"The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358","cvss3Severity":"high","cvss3Score":"7.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2020-8244","vulnerabilityDetails":"A buffer over-read vulnerability exists in bl \u003c4.0.3, \u003c3.0.1, \u003c2.2.1, and \u003c1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2017-16026","vulnerabilityDetails":"Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request \u003e\u003d2.2.6 \u003c2.47.0 || \u003e2.51.0 \u003c\u003d2.67.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16026","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2016-1000232","vulnerabilityDetails":"NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000232","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2018-0076","vulnerabilityDetails":"Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number.","vulnerabilityUrl":"https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0","cvss3Severity":"medium","cvss3Score":"5.1","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}]</REMEDIATE> -->
True
grunt-retire-0.3.12.tgz: 13 vulnerabilities (highest severity is: 9.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>grunt-retire-0.3.12.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cryptiles/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-23807](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | jsonpointer-4.0.1.tgz | Transitive | 1.0.0 | ✅ | | [WS-2020-0344](https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | is-my-json-valid-2.19.0.tgz | Transitive | 1.0.0 | ✅ | | [CVE-2018-1000620](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | cryptiles-2.0.5.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2018-3728](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | hoek-2.16.3.tgz | Transitive | 1.0.7 | ✅ | | [WS-2020-0345](https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.2 | jsonpointer-4.0.1.tgz | Transitive | 1.0.0 | ✅ | | [CVE-2017-15010](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | tough-cookie-2.2.2.tgz | Transitive | 1.0.7 | ✅ | | [WS-2020-0342](https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | is-my-json-valid-2.19.0.tgz | Transitive | 1.0.0 | ✅ | | [CVE-2017-1000048](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-5.2.1.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2021-23358](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.2 | underscore-1.8.3.tgz | Transitive | 1.0.2 | ✅ | | [CVE-2020-8244](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | bl-1.0.3.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2017-16026](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16026) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | request-2.67.0.tgz | Transitive | 1.0.7 | ✅ | | [CVE-2016-1000232](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000232) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | tough-cookie-2.2.2.tgz | Transitive | 1.0.7 | ✅ | | [WS-2018-0076](https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.1 | tunnel-agent-0.4.3.tgz | Transitive | 1.0.7 | ✅ | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23807</summary> ### Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.19.0.tgz - :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays. <p>Publish Date: 2021-11-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807>CVE-2021-23807</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23807</a></p> <p>Release Date: 2021-11-03</p> <p>Fix Resolution (jsonpointer): 5.0.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0344</summary> ### Vulnerable Library - <b>is-my-json-valid-2.19.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.19.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function. <p>Publish Date: 2020-06-09 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d>WS-2020-0344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-09</p> <p>Fix Resolution (is-my-json-valid): 2.20.3</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1000620</summary> ### Vulnerable Library - <b>cryptiles-2.0.5.tgz</b></p> <p>General purpose crypto utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz">https://registry.npmjs.org/cryptiles/-/cryptiles-2.0.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cryptiles/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/cryptiles/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - hawk-3.1.3.tgz - :x: **cryptiles-2.0.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2. <p>Publish Date: 2018-07-09 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620>CVE-2018-1000620</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000620</a></p> <p>Release Date: 2018-07-09</p> <p>Fix Resolution (cryptiles): 4.1.2</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-3728</summary> ### Vulnerable Library - <b>hoek-2.16.3.tgz</b></p> <p>General purpose node utilities</p> <p>Library home page: <a href="https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz">https://registry.npmjs.org/hoek/-/hoek-2.16.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/hoek/package.json,/node_modules/npm/node_modules/request/node_modules/hawk/node_modules/hoek/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - hawk-3.1.3.tgz - :x: **hoek-2.16.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via 'merge' and 'applyToDefaults' functions, which allows a malicious user to modify the prototype of "Object" via __proto__, causing the addition or modification of an existing property that will exist on all objects. <p>Publish Date: 2018-03-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728>CVE-2018-3728</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2018-03-30</p> <p>Fix Resolution (hoek): 4.2.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0345</summary> ### Vulnerable Library - <b>jsonpointer-4.0.1.tgz</b></p> <p>Simple JSON Addressing.</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz">https://registry.npmjs.org/jsonpointer/-/jsonpointer-4.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jsonpointer/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - is-my-json-valid-2.19.0.tgz - :x: **jsonpointer-4.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function. <p>Publish Date: 2020-07-03 <p>URL: <a href=https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34>WS-2020-0345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0">https://github.com/janl/node-jsonpointer/releases/tag/v4.1.0</a></p> <p>Release Date: 2020-07-03</p> <p>Fix Resolution (jsonpointer): 4.1.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-15010</summary> ### Vulnerable Library - <b>tough-cookie-2.2.2.tgz</b></p> <p>RFC6265 Cookies and Cookie Jar for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz">https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/tough-cookie/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **tough-cookie-2.2.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU. <p>Publish Date: 2017-10-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010>CVE-2017-15010</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-15010">https://nvd.nist.gov/vuln/detail/CVE-2017-15010</a></p> <p>Release Date: 2017-10-04</p> <p>Fix Resolution (tough-cookie): 2.3.3</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2020-0342</summary> ### Vulnerable Library - <b>is-my-json-valid-2.19.0.tgz</b></p> <p>A JSONSchema validator that uses code generation to be extremely fast</p> <p>Library home page: <a href="https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz">https://registry.npmjs.org/is-my-json-valid/-/is-my-json-valid-2.19.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/is-my-json-valid/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - har-validator-2.0.6.tgz - :x: **is-my-json-valid-2.19.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in is-my-json-valid before 2.20.2 via the style format. <p>Publish Date: 2020-06-27 <p>URL: <a href=https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb>WS-2020-0342</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb">https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb</a></p> <p>Release Date: 2020-06-27</p> <p>Fix Resolution (is-my-json-valid): 2.20.2</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-1000048</summary> ### Vulnerable Library - <b>qs-5.2.1.tgz</b></p> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-5.2.1.tgz">https://registry.npmjs.org/qs/-/qs-5.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/qs/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **qs-5.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> the web framework using ljharb's qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash. <p>Publish Date: 2017-07-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048>CVE-2017-1000048</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-1000048</a></p> <p>Release Date: 2017-07-17</p> <p>Fix Resolution (qs): 6.0.4</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23358</summary> ### Vulnerable Library - <b>underscore-1.8.3.tgz</b></p> <p>JavaScript's functional programming helper library.</p> <p>Library home page: <a href="https://registry.npmjs.org/underscore/-/underscore-1.8.3.tgz">https://registry.npmjs.org/underscore/-/underscore-1.8.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/retire/node_modules/underscore/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - retire-1.1.6.tgz - :x: **underscore-1.8.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized. <p>Publish Date: 2021-03-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358>CVE-2021-23358</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.2</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23358</a></p> <p>Release Date: 2021-03-29</p> <p>Fix Resolution (underscore): 1.12.1</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.2</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-8244</summary> ### Vulnerable Library - <b>bl-1.0.3.tgz</b></p> <p>Buffer List: collect buffers and access with a standard readable Buffer interface, streamable too!</p> <p>Library home page: <a href="https://registry.npmjs.org/bl/-/bl-1.0.3.tgz">https://registry.npmjs.org/bl/-/bl-1.0.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/bl/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **bl-1.0.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A buffer over-read vulnerability exists in bl <4.0.3, <3.0.1, <2.2.1, and <1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls. <p>Publish Date: 2020-08-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244>CVE-2020-8244</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-pp7h-53gx-mx7r">https://github.com/advisories/GHSA-pp7h-53gx-mx7r</a></p> <p>Release Date: 2020-08-30</p> <p>Fix Resolution (bl): 1.2.3</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-16026</summary> ### Vulnerable Library - <b>request-2.67.0.tgz</b></p> <p>Simplified HTTP request client.</p> <p>Library home page: <a href="https://registry.npmjs.org/request/-/request-2.67.0.tgz">https://registry.npmjs.org/request/-/request-2.67.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/request/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - :x: **request-2.67.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request >=2.2.6 <2.47.0 || >2.51.0 <=2.67.0. <p>Publish Date: 2018-06-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16026>CVE-2017-16026</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-16026">https://nvd.nist.gov/vuln/detail/CVE-2017-16026</a></p> <p>Release Date: 2018-06-04</p> <p>Fix Resolution (request): 2.68.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-1000232</summary> ### Vulnerable Library - <b>tough-cookie-2.2.2.tgz</b></p> <p>RFC6265 Cookies and Cookie Jar for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz">https://registry.npmjs.org/tough-cookie/-/tough-cookie-2.2.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/grunt-retire/node_modules/tough-cookie/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **tough-cookie-2.2.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0. <p>Publish Date: 2018-09-05 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000232>CVE-2016-1000232</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/130">https://www.npmjs.com/advisories/130</a></p> <p>Release Date: 2018-09-05</p> <p>Fix Resolution (tough-cookie): 2.3.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> WS-2018-0076</summary> ### Vulnerable Library - <b>tunnel-agent-0.4.3.tgz</b></p> <p>HTTP proxy tunneling agent. Formerly part of mikeal/request, now a standalone module.</p> <p>Library home page: <a href="https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz">https://registry.npmjs.org/tunnel-agent/-/tunnel-agent-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/npm/node_modules/request/node_modules/tunnel-agent/package.json,/node_modules/tunnel-agent/package.json</p> <p> Dependency Hierarchy: - grunt-retire-0.3.12.tgz (Root Library) - request-2.67.0.tgz - :x: **tunnel-agent-0.4.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/JS-Demo/commit/33cd7775cefbf105dc51f3d5f5d136e529948d6f">33cd7775cefbf105dc51f3d5f5d136e529948d6f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number. <p>Publish Date: 2017-03-05 <p>URL: <a href=https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0>WS-2018-0076</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nodesecurity.io/advisories/598">https://nodesecurity.io/advisories/598</a></p> <p>Release Date: 2017-03-05</p> <p>Fix Resolution (tunnel-agent): 0.6.0</p> <p>Direct dependency fix Resolution (grunt-retire): 1.0.7</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> </details> *** <p>In order to enable automatic remediation for this issue, please create <a target="_blank" href="https://whitesource.atlassian.net/wiki/spaces/WD/pages/697696422/WhiteSource+for+GitHub.com#Remediate-Settings-(remediateSettings)">workflow rules</a></p> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-23807","vulnerabilityDetails":"This affects the package jsonpointer before 5.0.0. A type confusion vulnerability can lead to a bypass of a previous Prototype Pollution fix when the pointer components are arrays.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23807","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2020-0344","vulnerabilityDetails":"Arbitrary Code Execution vulnerability was found in is-my-json-valid before 2.20.3 via the fromatName function.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/3419563687df463b4ca709a2b46be8e15d6a2b3d","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-1000620","vulnerabilityDetails":"Eran Hammer cryptiles version 4.1.1 earlier contains a CWE-331: Insufficient Entropy vulnerability in randomDigits() method that can result in An attacker is more likely to be able to brute force something that was supposed to be random.. This attack appear to be exploitable via Depends upon the calling application.. This vulnerability appears to have been fixed in 4.1.2.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000620","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-3728","vulnerabilityDetails":"hoek node module before 4.2.0 and 5.0.x before 5.0.3 suffers from a Modification of Assumed-Immutable Data (MAID) vulnerability via \u0027merge\u0027 and \u0027applyToDefaults\u0027 functions, which allows a malicious user to modify the prototype of \"Object\" via __proto__, causing the addition or modification of an existing property that will exist on all objects.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-3728","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2020-0345","vulnerabilityDetails":"Prototype Pollution vulnerability was found in jsonpointer before 4.1.0 via the set function.","vulnerabilityUrl":"https://github.com/janl/node-jsonpointer/commit/234e3437019c6c07537ed2ad1e03b3e132b85e34","cvss3Severity":"high","cvss3Score":"8.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2017-15010","vulnerabilityDetails":"A ReDoS (regular expression denial of service) flaw was found in the tough-cookie module before 2.3.3 for Node.js. An attacker that is able to make an HTTP request using a specially crafted cookie may cause the application to consume an excessive amount of CPU.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-15010","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.0","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2020-0342","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in is-my-json-valid before 2.20.2 via the style format.","vulnerabilityUrl":"https://github.com/mafintosh/is-my-json-valid/commit/c3fc04fc455d40e9b29537f8e2c73a28ce106edb","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2017-1000048","vulnerabilityDetails":"the web framework using ljharb\u0027s qs module older than v6.3.2, v6.2.3, v6.1.2, and v6.0.4 is vulnerable to a DoS. A malicious user can send a evil request to cause the web framework crash.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-1000048","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.2","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-23358","vulnerabilityDetails":"The package underscore from 1.13.0-0 and before 1.13.0-2, from 1.3.2 and before 1.12.1 are vulnerable to Arbitrary Code Injection via the template function, particularly when a variable property is passed as an argument as it is not sanitized.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23358","cvss3Severity":"high","cvss3Score":"7.2","cvss3Metrics":{"A":"High","AC":"Low","PR":"High","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2020-8244","vulnerabilityDetails":"A buffer over-read vulnerability exists in bl \u003c4.0.3, \u003c3.0.1, \u003c2.2.1, and \u003c1.2.3 which could allow an attacker to supply user input (even typed) that if it ends up in consume() argument and can become negative, the BufferList state can be corrupted, tricking it into exposing uninitialized memory via regular .slice() calls.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8244","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2017-16026","vulnerabilityDetails":"Request is an http client. If a request is made using ```multipart```, and the body type is a ```number```, then the specified number of non-zero memory is passed in the body. This affects Request \u003e\u003d2.2.6 \u003c2.47.0 || \u003e2.51.0 \u003c\u003d2.67.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16026","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2016-1000232","vulnerabilityDetails":"NodeJS Tough-Cookie version 2.2.2 contains a Regular Expression Parsing vulnerability in HTTP request Cookie Header parsing that can result in Denial of Service. This attack appear to be exploitable via Custom HTTP header passed by client. This vulnerability appears to have been fixed in 2.3.0.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000232","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}},{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"grunt-retire","packageVersion":"0.3.12","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"grunt-retire:0.3.12","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.7","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2018-0076","vulnerabilityDetails":"Versions of tunnel-agent before 0.6.0 are vulnerable to memory exposure. This is exploitable if user supplied input is provided to the auth value and is a number.","vulnerabilityUrl":"https://github.com/request/tunnel-agent/commit/9ca95ec7219daface8a6fc2674000653de0922c0","cvss3Severity":"medium","cvss3Score":"5.1","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}]</REMEDIATE> -->
non_priority
grunt retire tgz vulnerabilities highest severity is autoclosed vulnerable library grunt retire tgz path to dependency file package json path to vulnerable library node modules cryptiles package json node modules npm node modules request node modules hawk node modules cryptiles package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high jsonpointer tgz transitive ✅ high is my json valid tgz transitive ✅ high cryptiles tgz transitive ✅ high hoek tgz transitive ✅ high jsonpointer tgz transitive ✅ high tough cookie tgz transitive ✅ high is my json valid tgz transitive ✅ high qs tgz transitive ✅ high underscore tgz transitive ✅ medium bl tgz transitive ✅ medium request tgz transitive ✅ medium tough cookie tgz transitive ✅ medium tunnel agent tgz transitive ✅ details cve vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file package json path to vulnerable library node modules jsonpointer package json dependency hierarchy grunt retire tgz root library request tgz har validator tgz is my json valid tgz x jsonpointer tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects the package jsonpointer before a type confusion vulnerability can lead to a bypass of a previous prototype pollution fix when the pointer components are arrays publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonpointer direct dependency fix resolution grunt retire in order to enable automatic remediation please create ws vulnerable library is my json valid tgz a jsonschema validator that uses code generation to be extremely fast library home page a href path to dependency file package json path to vulnerable library node modules is my json valid package json dependency hierarchy grunt retire tgz root library request tgz har validator tgz x is my json valid tgz vulnerable library found in head commit a href found in base branch main vulnerability details arbitrary code execution vulnerability was found in is my json valid before via the fromatname function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution is my json valid direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library cryptiles tgz general purpose crypto utilities library home page a href path to dependency file package json path to vulnerable library node modules cryptiles package json node modules npm node modules request node modules hawk node modules cryptiles package json dependency hierarchy grunt retire tgz root library request tgz hawk tgz x cryptiles tgz vulnerable library found in head commit a href found in base branch main vulnerability details eran hammer cryptiles version earlier contains a cwe insufficient entropy vulnerability in randomdigits method that can result in an attacker is more likely to be able to brute force something that was supposed to be random this attack appear to be exploitable via depends upon the calling application this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cryptiles direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library hoek tgz general purpose node utilities library home page a href path to dependency file package json path to vulnerable library node modules hoek package json node modules npm node modules request node modules hawk node modules hoek package json dependency hierarchy grunt retire tgz root library request tgz hawk tgz x hoek tgz vulnerable library found in head commit a href found in base branch main vulnerability details hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via merge and applytodefaults functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution hoek direct dependency fix resolution grunt retire in order to enable automatic remediation please create ws vulnerable library jsonpointer tgz simple json addressing library home page a href path to dependency file package json path to vulnerable library node modules jsonpointer package json dependency hierarchy grunt retire tgz root library request tgz har validator tgz is my json valid tgz x jsonpointer tgz vulnerable library found in head commit a href found in base branch main vulnerability details prototype pollution vulnerability was found in jsonpointer before via the set function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonpointer direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library tough cookie tgz cookies and cookie jar for node js library home page a href path to dependency file package json path to vulnerable library node modules grunt retire node modules tough cookie package json dependency hierarchy grunt retire tgz root library request tgz x tough cookie tgz vulnerable library found in head commit a href found in base branch main vulnerability details a redos regular expression denial of service flaw was found in the tough cookie module before for node js an attacker that is able to make an http request using a specially crafted cookie may cause the application to consume an excessive amount of cpu publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tough cookie direct dependency fix resolution grunt retire in order to enable automatic remediation please create ws vulnerable library is my json valid tgz a jsonschema validator that uses code generation to be extremely fast library home page a href path to dependency file package json path to vulnerable library node modules is my json valid package json dependency hierarchy grunt retire tgz root library request tgz har validator tgz x is my json valid tgz vulnerable library found in head commit a href found in base branch main vulnerability details regular expression denial of service redos vulnerability was found in is my json valid before via the style format publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution is my json valid direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file package json path to vulnerable library node modules grunt retire node modules qs package json dependency hierarchy grunt retire tgz root library request tgz x qs tgz vulnerable library found in head commit a href found in base branch main vulnerability details the web framework using ljharb s qs module older than and is vulnerable to a dos a malicious user can send a evil request to cause the web framework crash publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library underscore tgz javascript s functional programming helper library library home page a href path to dependency file package json path to vulnerable library node modules retire node modules underscore package json dependency hierarchy grunt retire tgz root library retire tgz x underscore tgz vulnerable library found in head commit a href found in base branch main vulnerability details the package underscore from and before from and before are vulnerable to arbitrary code injection via the template function particularly when a variable property is passed as an argument as it is not sanitized publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution underscore direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library bl tgz buffer list collect buffers and access with a standard readable buffer interface streamable too library home page a href path to dependency file package json path to vulnerable library node modules bl package json dependency hierarchy grunt retire tgz root library request tgz x bl tgz vulnerable library found in head commit a href found in base branch main vulnerability details a buffer over read vulnerability exists in bl and which could allow an attacker to supply user input even typed that if it ends up in consume argument and can become negative the bufferlist state can be corrupted tricking it into exposing uninitialized memory via regular slice calls publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution bl direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library request tgz simplified http request client library home page a href path to dependency file package json path to vulnerable library node modules grunt retire node modules request package json dependency hierarchy grunt retire tgz root library x request tgz vulnerable library found in head commit a href found in base branch main vulnerability details request is an http client if a request is made using multipart and the body type is a number then the specified number of non zero memory is passed in the body this affects request publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution request direct dependency fix resolution grunt retire in order to enable automatic remediation please create cve vulnerable library tough cookie tgz cookies and cookie jar for node js library home page a href path to dependency file package json path to vulnerable library node modules grunt retire node modules tough cookie package json dependency hierarchy grunt retire tgz root library request tgz x tough cookie tgz vulnerable library found in head commit a href found in base branch main vulnerability details nodejs tough cookie version contains a regular expression parsing vulnerability in http request cookie header parsing that can result in denial of service this attack appear to be exploitable via custom http header passed by client this vulnerability appears to have been fixed in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tough cookie direct dependency fix resolution grunt retire in order to enable automatic remediation please create ws vulnerable library tunnel agent tgz http proxy tunneling agent formerly part of mikeal request now a standalone module library home page a href path to dependency file package json path to vulnerable library node modules npm node modules request node modules tunnel agent package json node modules tunnel agent package json dependency hierarchy grunt retire tgz root library request tgz x tunnel agent tgz vulnerable library found in head commit a href found in base branch main vulnerability details versions of tunnel agent before are vulnerable to memory exposure this is exploitable if user supplied input is provided to the auth value and is a number publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tunnel agent direct dependency fix resolution grunt retire in order to enable automatic remediation please create in order to enable automatic remediation for this issue please create istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package jsonpointer before a type confusion vulnerability can lead to a bypass of a previous prototype pollution fix when the pointer components are arrays vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails arbitrary code execution vulnerability was found in is my json valid before via the fromatname function vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails eran hammer cryptiles version earlier contains a cwe insufficient entropy vulnerability in randomdigits method that can result in an attacker is more likely to be able to brute force something that was supposed to be random this attack appear to be exploitable via depends upon the calling application this vulnerability appears to have been fixed in vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails hoek node module before and x before suffers from a modification of assumed immutable data maid vulnerability via and functions which allows a malicious user to modify the prototype of object via proto causing the addition or modification of an existing property that will exist on all objects vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails prototype pollution vulnerability was found in jsonpointer before via the set function vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a redos regular expression denial of service flaw was found in the tough cookie module before for node js an attacker that is able to make an http request using a specially crafted cookie may cause the application to consume an excessive amount of cpu vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails regular expression denial of service redos vulnerability was found in is my json valid before via the style format vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the web framework using ljharb qs module older than and is vulnerable to a dos a malicious user can send a evil request to cause the web framework crash vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails the package underscore from and before from and before are vulnerable to arbitrary code injection via the template function particularly when a variable property is passed as an argument as it is not sanitized vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a buffer over read vulnerability exists in bl and which could allow an attacker to supply user input even typed that if it ends up in consume argument and can become negative the bufferlist state can be corrupted tricking it into exposing uninitialized memory via regular slice calls vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails request is an http client if a request is made using multipart and the body type is a number then the specified number of non zero memory is passed in the body this affects request vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails nodejs tough cookie version contains a regular expression parsing vulnerability in http request cookie header parsing that can result in denial of service this attack appear to be exploitable via custom http header passed by client this vulnerability appears to have been fixed in vulnerabilityurl istransitivedependency false dependencytree grunt retire isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails versions of tunnel agent before are vulnerable to memory exposure this is exploitable if user supplied input is provided to the auth value and is a number vulnerabilityurl
0
60,255
12,086,144,434
IssuesEvent
2020-04-18 08:25:29
Tcdian/keep
https://api.github.com/repos/Tcdian/keep
closed
1292. Maximum Side Length of a Square with Sum Less than or Equal to Threshold
LeetCode
## [1292. Maximum Side Length of a Square with Sum Less than or Equal to Threshold](https://leetcode.com/problems/maximum-side-length-of-a-square-with-sum-less-than-or-equal-to-threshold/) 给你一个大小为 m x n 的矩阵 mat 和一个整数阈值 threshold。 请你返回元素总和小于或等于阈值的正方形区域的最大边长;如果没有这样的正方形区域,则返回 0 。 #### Example 1 <img src="https://assets.leetcode.com/uploads/2019/12/05/e1.png" /> ```text Input: mat = [[1,1,3,2,4,3,2],[1,1,3,2,4,3,2],[1,1,3,2,4,3,2]], threshold = 4 Output: 2 Explanation: The maximum side length of square with sum less than 4 is 2 as shown. ``` #### Example 2 ```text Input: mat = [[2,2,2,2,2],[2,2,2,2,2],[2,2,2,2,2],[2,2,2,2,2],[2,2,2,2,2]], threshold = 1 Output: 0 ``` #### Example 3 ```text Input: mat = [[1,1,1,1],[1,0,0,0],[1,0,0,0],[1,0,0,0]], threshold = 6 Output: 3 ``` #### Example 4 ```text Input: mat = [[18,70],[61,1],[25,85],[14,40],[11,96],[97,96],[63,45]], threshold = 40184 Output: 2 ``` #### Constraints - `1 <= m, n <= 300` - `m == mat.length` - `n == mat[i].length` - `0 <= mat[i][j] <= 10000` - `0 <= threshold <= 10^5`
1.0
1292. Maximum Side Length of a Square with Sum Less than or Equal to Threshold - ## [1292. Maximum Side Length of a Square with Sum Less than or Equal to Threshold](https://leetcode.com/problems/maximum-side-length-of-a-square-with-sum-less-than-or-equal-to-threshold/) 给你一个大小为 m x n 的矩阵 mat 和一个整数阈值 threshold。 请你返回元素总和小于或等于阈值的正方形区域的最大边长;如果没有这样的正方形区域,则返回 0 。 #### Example 1 <img src="https://assets.leetcode.com/uploads/2019/12/05/e1.png" /> ```text Input: mat = [[1,1,3,2,4,3,2],[1,1,3,2,4,3,2],[1,1,3,2,4,3,2]], threshold = 4 Output: 2 Explanation: The maximum side length of square with sum less than 4 is 2 as shown. ``` #### Example 2 ```text Input: mat = [[2,2,2,2,2],[2,2,2,2,2],[2,2,2,2,2],[2,2,2,2,2],[2,2,2,2,2]], threshold = 1 Output: 0 ``` #### Example 3 ```text Input: mat = [[1,1,1,1],[1,0,0,0],[1,0,0,0],[1,0,0,0]], threshold = 6 Output: 3 ``` #### Example 4 ```text Input: mat = [[18,70],[61,1],[25,85],[14,40],[11,96],[97,96],[63,45]], threshold = 40184 Output: 2 ``` #### Constraints - `1 <= m, n <= 300` - `m == mat.length` - `n == mat[i].length` - `0 <= mat[i][j] <= 10000` - `0 <= threshold <= 10^5`
non_priority
maximum side length of a square with sum less than or equal to threshold 给你一个大小为 m x n 的矩阵 mat 和一个整数阈值 threshold。 请你返回元素总和小于或等于阈值的正方形区域的最大边长;如果没有这样的正方形区域,则返回  。 example text input mat threshold output explanation the maximum side length of square with sum less than is as shown example text input mat threshold output example text input mat threshold output example text input mat threshold output constraints m n m mat length n mat length mat threshold
0
443,453
30,913,140,137
IssuesEvent
2023-08-05 01:10:40
open-metadata/OpenMetadata
https://api.github.com/repos/open-metadata/OpenMetadata
closed
Configuration file details
documentation
**Is some content missing, wrong or not clear?** A clear and concise description of what the problem is and the source URL. Ex. Page [...] is not clear. **Describe the solution you'd like** Let us know what could help us improve the docs. **Additional context** As shown in the figure, whether deletion is required in the configuration. How to configure specifically? **Urgent, urgent, urgent.** Add any other context or screenshots about the feature request here. <img width="793" alt="image" src="https://github.com/open-metadata/OpenMetadata/assets/122763218/0580a717-1d3c-46cd-98ca-3248099fc2dd">
1.0
Configuration file details - **Is some content missing, wrong or not clear?** A clear and concise description of what the problem is and the source URL. Ex. Page [...] is not clear. **Describe the solution you'd like** Let us know what could help us improve the docs. **Additional context** As shown in the figure, whether deletion is required in the configuration. How to configure specifically? **Urgent, urgent, urgent.** Add any other context or screenshots about the feature request here. <img width="793" alt="image" src="https://github.com/open-metadata/OpenMetadata/assets/122763218/0580a717-1d3c-46cd-98ca-3248099fc2dd">
non_priority
configuration file details is some content missing wrong or not clear a clear and concise description of what the problem is and the source url ex page is not clear describe the solution you d like let us know what could help us improve the docs additional context as shown in the figure whether deletion is required in the configuration how to configure specifically urgent urgent urgent add any other context or screenshots about the feature request here img width alt image src
0
70,600
13,502,609,934
IssuesEvent
2020-09-13 09:23:32
EKA2L1/Compatibility-List
https://api.github.com/repos/EKA2L1/Compatibility-List
opened
Sega Rally Championship
- Game Genre: Racing Graphical Issues Menus N-Gage Name Issues Unimplemented Opcode
# App summary - App name: Sega Rally Championship # EKA2L1 info - Build name: B4439326 # Test environment summary - OS: Windows - CPU: AMD - GPU: NVIDIA - RAM: 8 GB # Issues it's showing up under the name 6R12. Broken graphics make in it impossible to start a new game # Screenshots ![Capture](https://user-images.githubusercontent.com/49062935/92422790-d3fa9280-f13b-11ea-9a9a-77a5c97332dd.PNG) # Log [EKA2L1.log](https://github.com/EKA2L1/Compatibility-List/files/5185840/EKA2L1.log)
1.0
Sega Rally Championship - # App summary - App name: Sega Rally Championship # EKA2L1 info - Build name: B4439326 # Test environment summary - OS: Windows - CPU: AMD - GPU: NVIDIA - RAM: 8 GB # Issues it's showing up under the name 6R12. Broken graphics make in it impossible to start a new game # Screenshots ![Capture](https://user-images.githubusercontent.com/49062935/92422790-d3fa9280-f13b-11ea-9a9a-77a5c97332dd.PNG) # Log [EKA2L1.log](https://github.com/EKA2L1/Compatibility-List/files/5185840/EKA2L1.log)
non_priority
sega rally championship app summary app name sega rally championship info build name test environment summary os windows cpu amd gpu nvidia ram gb issues it s showing up under the name broken graphics make in it impossible to start a new game screenshots log
0
33,324
4,822,541,824
IssuesEvent
2016-11-05 22:21:21
camilosampedro/Aton
https://api.github.com/repos/camilosampedro/Aton
closed
Create unit test for LaboratoryController (LaboratoryControllerSpec)
bitesize hacktoberfest help wanted test up-for-grabs
Create a unit test for `controllers.LaboratoryController` controller. It might be pretty similar to [`ComputerControllerSpec`](https://github.com/camilosampedro/Aton/blob/master/test/controllers/admin/ComputerControllerSpec.scala): - You would need to mock the dependencies of LaboratoryController (Add a return value to the needed methods without executing anything, they are not intended to be tested here). - Check the return HTTP code of the methods (Firstly as you would expect them to be). Don't worry if you don't know something about the functionality of this class, it will be a pleasure to me to answer your questions.
1.0
Create unit test for LaboratoryController (LaboratoryControllerSpec) - Create a unit test for `controllers.LaboratoryController` controller. It might be pretty similar to [`ComputerControllerSpec`](https://github.com/camilosampedro/Aton/blob/master/test/controllers/admin/ComputerControllerSpec.scala): - You would need to mock the dependencies of LaboratoryController (Add a return value to the needed methods without executing anything, they are not intended to be tested here). - Check the return HTTP code of the methods (Firstly as you would expect them to be). Don't worry if you don't know something about the functionality of this class, it will be a pleasure to me to answer your questions.
non_priority
create unit test for laboratorycontroller laboratorycontrollerspec create a unit test for controllers laboratorycontroller controller it might be pretty similar to you would need to mock the dependencies of laboratorycontroller add a return value to the needed methods without executing anything they are not intended to be tested here check the return http code of the methods firstly as you would expect them to be don t worry if you don t know something about the functionality of this class it will be a pleasure to me to answer your questions
0
268,887
20,363,699,413
IssuesEvent
2022-02-21 01:17:30
nelsopet/landscape_of_change
https://api.github.com/repos/nelsopet/landscape_of_change
closed
Define how we assign values, terms, etc. - add to Rmd
documentation
Add this info into a write up in the Rmd for future reference.
1.0
Define how we assign values, terms, etc. - add to Rmd - Add this info into a write up in the Rmd for future reference.
non_priority
define how we assign values terms etc add to rmd add this info into a write up in the rmd for future reference
0
90,362
18,127,261,443
IssuesEvent
2021-09-24 00:52:07
4GeeksAcademy/About-4Geeks-Academy
https://api.github.com/repos/4GeeksAcademy/About-4Geeks-Academy
closed
Fix function to replicate same timeslots in all academies
bug :star: P1 backend breathecode D2 (😌 average)
If I try to replicate timeslots among all academies I get an error: ![Screen Shot 2021-09-14 at 8 32 59 PM](https://user-images.githubusercontent.com/426452/133351477-a8a1eefa-6106-4775-9a05-0f1f875b1ebe.png) This is probably because the table certificate does not exist anymore, the function code must be fix to comply with the new database struture. ``` def replicate_in_all(modeladmin, request, queryset): cert_timeslot = queryset.all() academies = Academy.objects.all() for a in academies: to_filter = {} for c in cert_timeslot: # delete all timeslots for that academy and certificate ONLY the first time if c.certificate.slug not in to_filter: SpecialtyModeTimeSlot.objects.filter(certificate=c.certificate, academy=a).delete() to_filter[c.certificate.slug] = True # and then re add the timeslots one by one new_timeslot = SpecialtyModeTimeSlot(recurrent=c.recurrent, starting_at=c.starting_at, ending_at=c.ending_at, certificate=c.certificate, academy=a) new_timeslot.save() ```
1.0
Fix function to replicate same timeslots in all academies - If I try to replicate timeslots among all academies I get an error: ![Screen Shot 2021-09-14 at 8 32 59 PM](https://user-images.githubusercontent.com/426452/133351477-a8a1eefa-6106-4775-9a05-0f1f875b1ebe.png) This is probably because the table certificate does not exist anymore, the function code must be fix to comply with the new database struture. ``` def replicate_in_all(modeladmin, request, queryset): cert_timeslot = queryset.all() academies = Academy.objects.all() for a in academies: to_filter = {} for c in cert_timeslot: # delete all timeslots for that academy and certificate ONLY the first time if c.certificate.slug not in to_filter: SpecialtyModeTimeSlot.objects.filter(certificate=c.certificate, academy=a).delete() to_filter[c.certificate.slug] = True # and then re add the timeslots one by one new_timeslot = SpecialtyModeTimeSlot(recurrent=c.recurrent, starting_at=c.starting_at, ending_at=c.ending_at, certificate=c.certificate, academy=a) new_timeslot.save() ```
non_priority
fix function to replicate same timeslots in all academies if i try to replicate timeslots among all academies i get an error this is probably because the table certificate does not exist anymore the function code must be fix to comply with the new database struture def replicate in all modeladmin request queryset cert timeslot queryset all academies academy objects all for a in academies to filter for c in cert timeslot delete all timeslots for that academy and certificate only the first time if c certificate slug not in to filter specialtymodetimeslot objects filter certificate c certificate academy a delete to filter true and then re add the timeslots one by one new timeslot specialtymodetimeslot recurrent c recurrent starting at c starting at ending at c ending at certificate c certificate academy a new timeslot save
0
13,909
4,787,872,415
IssuesEvent
2016-10-30 08:05:51
DotSpatial/DotSpatial
https://api.github.com/repos/DotSpatial/DotSpatial
closed
DotSpatial.Positioning FormatException and Gobi 2000 GPS Devices
CodePlex DS.Positioning
**This issue was imported from [CodePlex](http://dotspatial.codeplex.com/workitem/63594)** **[ClevelandRaymond](http://www.codeplex.com/site/users/view/ClevelandRaymond)** wrote 2015-08-15 at 21:44 I'm the Sr. Software Engineer for an oil and gas company, and we use the DotSpatial.Positioning library to read GPS data from the Qualcomm Gobi 2000 (HP un2420) card built into our Panasonic CF-19 Toughbook laptops. We were getting FormatException(s) from DotSpatial.Positioning when parsing VTG sentences. So, I incorporated the source code into our solution and debugged the code. I found that the Qualcomm Gobi 2000 (HP un2420) GPS device is returning a VTG sentence with the longitude and speed set to "nan" in the actual sentence read from the COM port. Because the DotSpatial.Positioning library v2.0 uses the double.Parse() method to convert the strings into doubles, the FormatException(s) are being thrown when encountering the "nan" string values. Although the library handles these exceptions, I've fixed the issue within our copy of the source code and we are no longer getting these exceptions. I'm not sure how the DotSpatial team wants to handle this, but I made the following changes to the source code: In file NmeaSentence.cs at line 43, we can change the access modifier for _isValid to protected: protected bool _isValid; or we could stay within best practices and change the property IsValid to have a protected set accessor, but then the IsValid property of the NmeaSentence and Packet base class would have to be modified: Packet.cs: public abstract bool IsValid { get; protected set; } NmeaSentence.cs: public override bool IsValid { <pre><code>get { return _isValid; } protected set { _isValid = value; }</code></pre> } Either way will work, but we have to be able to set IsValid within the OnSentenceChanged method of the derived GpvtgSentence class. Then, in the OnSentenceChanged method located in the file GpvtgSentence.cs at line 77, we test for invalid strings by using double.TryParse as follows: protected override void OnSentenceChanged() { <pre><code>// First, process the basic info for the sentence base.OnSentenceChanged(); // Cache the sentence words string[] words = Words; int wordCount = words.Length; // Even if we get a valid VTG sentence, we can have invalid values if (words != null) { double result = 0; // Check the Longitude - third word of the sentence if (wordCount > 2 && double.TryParse(words[2], out result) == false) { _isValid = false; return; } // Check the Speed - fifth word of the sentence if (wordCount > 4 && double.TryParse(words[4], out result) == false) { _isValid = false; return; } } </code></pre> ... } I've also found some mistakes when testing the wordCount to make sure we are not accessing elements of the words string array that do not exist: protected override void OnSentenceChanged() { <pre><code>// First, process the basic info for the sentence base.OnSentenceChanged(); </code></pre> .... <pre><code>#region Bearing if (wordCount >= 1 && words[0].Length != 0) _bearing = Azimuth.Parse(words[0], NmeaCultureInfo); else _bearing = Azimuth.Invalid; #endregion Bearing #region Magnetic Variation // This is ok because we are testing wordCount >= 3 // but we could've just tested using wordCount > 2 if (wordCount >= 3 && words[2].Length != 0) { _magneticVariation = new Longitude(double.Parse(words[2], NmeaCultureInfo) - _bearing.DecimalDegrees); } else { _magneticVariation = Longitude.Invalid; } #endregion Magnetic Variation #region Speed /* Speed is reported as both knots and KM/H. We can parse either of the values. * First, try to parse knots. If that fails, parse KM/h. */ // This should be testing for wordCount >=5 or just wordCount > 4 if (wordCount > 5 && words[4].Length != 0) { _speed = new Speed( // Parse the numeric portion double.Parse(words[4], NmeaCultureInfo), // Use knots SpeedUnit.Knots); } // This should be testing for wordCount >=7 or just wordCount > 6 else if (wordCount > 7 && words[6].Length != 0) { _speed = new Speed( // Parse the numeric portion double.Parse(words[6], NmeaCultureInfo), // Use knots SpeedUnit.KilometersPerHour); } else { // Invalid speed _speed = Speed.Invalid; } #endregion Speed</code></pre> } I added comments about changing the if statements to use the proper testing of the wordCount, but I don't think this is causing any issues because the word count is longer than 7. However, I did make the changes to our version of the code. Now that the OnSentenceChanged method of the GpvtgSentence class is fixed, we can add the last piece of code that checks the sentence's IsValid property and prevents processing invalid sentences. In the OnReadPacket method located in the file NmeaInterpreter.cs at line 279, we need to add a check for the sentence's IsValid property: protected override void OnReadPacket() { <pre><code>// Read a sentence from the underlying stream NmeaSentence sentence = _stream.ReadTypedSentence(); // Don't process invalid sentences if (sentence.IsValid == false) { return; } </code></pre> ... } There are probably other places in the DotSpatial.Positioning library where this improvement could be made but, since we only use the NmeaInterpreter to read GPS data from our GoBi cards, the above fix is all we needed to resolve the issue. I have attached the GPS device stream as read by a third party application called VisualGPS that shows the $GPSVTG sentence containing "nan" for the values: $GPVTG,nan,T,nan,M,0.0,N,0.0,K,A<em>23 $GPRMC,205238.3,A,3512.585528,N,09725.570975,W,0.0,,100815,,,A</em>50 $GPGSA,A,3,02,05,06,12,17,,,,,,,,5.1,2.2,4.6<em>30 $GPGSV,4,1,16,06,57,032,35,05,25,178,30,12,52,309,28,02,71,279,25</em>7C $GPGSV,4,2,16,17,27,084,24,09,,,,10,50,108,,24,19,244,*49 $GPGSV,4,3,16,25,15,319,,08,,,,32,,,,31,,,*4A $GPGSV,4,4,16,30,,,,29,,,,27,,,,26,,,<em>77 $GPGGA,205239.3,3512.585528,N,09725.570975,W,1,05,2.2,336.2,M,-27.0,M,,<em>69 $PQXFI,205239.3,3512.585528,N,09725.570975,W,336.2,13.08,20.44,2.08</em>75 $GPVTG,nan,T,nan,M,0.0,N,0.0,K,A</em>23 Thank you for writing such a wonderful piece of software. I hope that my analysis will be useful to your team and anyone else who has experienced this issue. Cleveland E. Raymond
1.0
DotSpatial.Positioning FormatException and Gobi 2000 GPS Devices - **This issue was imported from [CodePlex](http://dotspatial.codeplex.com/workitem/63594)** **[ClevelandRaymond](http://www.codeplex.com/site/users/view/ClevelandRaymond)** wrote 2015-08-15 at 21:44 I'm the Sr. Software Engineer for an oil and gas company, and we use the DotSpatial.Positioning library to read GPS data from the Qualcomm Gobi 2000 (HP un2420) card built into our Panasonic CF-19 Toughbook laptops. We were getting FormatException(s) from DotSpatial.Positioning when parsing VTG sentences. So, I incorporated the source code into our solution and debugged the code. I found that the Qualcomm Gobi 2000 (HP un2420) GPS device is returning a VTG sentence with the longitude and speed set to "nan" in the actual sentence read from the COM port. Because the DotSpatial.Positioning library v2.0 uses the double.Parse() method to convert the strings into doubles, the FormatException(s) are being thrown when encountering the "nan" string values. Although the library handles these exceptions, I've fixed the issue within our copy of the source code and we are no longer getting these exceptions. I'm not sure how the DotSpatial team wants to handle this, but I made the following changes to the source code: In file NmeaSentence.cs at line 43, we can change the access modifier for _isValid to protected: protected bool _isValid; or we could stay within best practices and change the property IsValid to have a protected set accessor, but then the IsValid property of the NmeaSentence and Packet base class would have to be modified: Packet.cs: public abstract bool IsValid { get; protected set; } NmeaSentence.cs: public override bool IsValid { <pre><code>get { return _isValid; } protected set { _isValid = value; }</code></pre> } Either way will work, but we have to be able to set IsValid within the OnSentenceChanged method of the derived GpvtgSentence class. Then, in the OnSentenceChanged method located in the file GpvtgSentence.cs at line 77, we test for invalid strings by using double.TryParse as follows: protected override void OnSentenceChanged() { <pre><code>// First, process the basic info for the sentence base.OnSentenceChanged(); // Cache the sentence words string[] words = Words; int wordCount = words.Length; // Even if we get a valid VTG sentence, we can have invalid values if (words != null) { double result = 0; // Check the Longitude - third word of the sentence if (wordCount > 2 && double.TryParse(words[2], out result) == false) { _isValid = false; return; } // Check the Speed - fifth word of the sentence if (wordCount > 4 && double.TryParse(words[4], out result) == false) { _isValid = false; return; } } </code></pre> ... } I've also found some mistakes when testing the wordCount to make sure we are not accessing elements of the words string array that do not exist: protected override void OnSentenceChanged() { <pre><code>// First, process the basic info for the sentence base.OnSentenceChanged(); </code></pre> .... <pre><code>#region Bearing if (wordCount >= 1 && words[0].Length != 0) _bearing = Azimuth.Parse(words[0], NmeaCultureInfo); else _bearing = Azimuth.Invalid; #endregion Bearing #region Magnetic Variation // This is ok because we are testing wordCount >= 3 // but we could've just tested using wordCount > 2 if (wordCount >= 3 && words[2].Length != 0) { _magneticVariation = new Longitude(double.Parse(words[2], NmeaCultureInfo) - _bearing.DecimalDegrees); } else { _magneticVariation = Longitude.Invalid; } #endregion Magnetic Variation #region Speed /* Speed is reported as both knots and KM/H. We can parse either of the values. * First, try to parse knots. If that fails, parse KM/h. */ // This should be testing for wordCount >=5 or just wordCount > 4 if (wordCount > 5 && words[4].Length != 0) { _speed = new Speed( // Parse the numeric portion double.Parse(words[4], NmeaCultureInfo), // Use knots SpeedUnit.Knots); } // This should be testing for wordCount >=7 or just wordCount > 6 else if (wordCount > 7 && words[6].Length != 0) { _speed = new Speed( // Parse the numeric portion double.Parse(words[6], NmeaCultureInfo), // Use knots SpeedUnit.KilometersPerHour); } else { // Invalid speed _speed = Speed.Invalid; } #endregion Speed</code></pre> } I added comments about changing the if statements to use the proper testing of the wordCount, but I don't think this is causing any issues because the word count is longer than 7. However, I did make the changes to our version of the code. Now that the OnSentenceChanged method of the GpvtgSentence class is fixed, we can add the last piece of code that checks the sentence's IsValid property and prevents processing invalid sentences. In the OnReadPacket method located in the file NmeaInterpreter.cs at line 279, we need to add a check for the sentence's IsValid property: protected override void OnReadPacket() { <pre><code>// Read a sentence from the underlying stream NmeaSentence sentence = _stream.ReadTypedSentence(); // Don't process invalid sentences if (sentence.IsValid == false) { return; } </code></pre> ... } There are probably other places in the DotSpatial.Positioning library where this improvement could be made but, since we only use the NmeaInterpreter to read GPS data from our GoBi cards, the above fix is all we needed to resolve the issue. I have attached the GPS device stream as read by a third party application called VisualGPS that shows the $GPSVTG sentence containing "nan" for the values: $GPVTG,nan,T,nan,M,0.0,N,0.0,K,A<em>23 $GPRMC,205238.3,A,3512.585528,N,09725.570975,W,0.0,,100815,,,A</em>50 $GPGSA,A,3,02,05,06,12,17,,,,,,,,5.1,2.2,4.6<em>30 $GPGSV,4,1,16,06,57,032,35,05,25,178,30,12,52,309,28,02,71,279,25</em>7C $GPGSV,4,2,16,17,27,084,24,09,,,,10,50,108,,24,19,244,*49 $GPGSV,4,3,16,25,15,319,,08,,,,32,,,,31,,,*4A $GPGSV,4,4,16,30,,,,29,,,,27,,,,26,,,<em>77 $GPGGA,205239.3,3512.585528,N,09725.570975,W,1,05,2.2,336.2,M,-27.0,M,,<em>69 $PQXFI,205239.3,3512.585528,N,09725.570975,W,336.2,13.08,20.44,2.08</em>75 $GPVTG,nan,T,nan,M,0.0,N,0.0,K,A</em>23 Thank you for writing such a wonderful piece of software. I hope that my analysis will be useful to your team and anyone else who has experienced this issue. Cleveland E. Raymond
non_priority
dotspatial positioning formatexception and gobi gps devices this issue was imported from wrote at i m the sr software engineer for an oil and gas company and we use the dotspatial positioning library to read gps data from the qualcomm gobi hp card built into our panasonic cf toughbook laptops we were getting formatexception s from dotspatial positioning when parsing vtg sentences so i incorporated the source code into our solution and debugged the code i found that the qualcomm gobi hp gps device is returning a vtg sentence with the longitude and speed set to nan in the actual sentence read from the com port because the dotspatial positioning library uses the double parse method to convert the strings into doubles the formatexception s are being thrown when encountering the nan string values although the library handles these exceptions i ve fixed the issue within our copy of the source code and we are no longer getting these exceptions i m not sure how the dotspatial team wants to handle this but i made the following changes to the source code in file nmeasentence cs at line we can change the access modifier for isvalid to protected protected bool isvalid or we could stay within best practices and change the property isvalid to have a protected set accessor but then the isvalid property of the nmeasentence and packet base class would have to be modified packet cs public abstract bool isvalid get protected set nmeasentence cs public override bool isvalid get return isvalid protected set isvalid value either way will work but we have to be able to set isvalid within the onsentencechanged method of the derived gpvtgsentence class then in the onsentencechanged method located in the file gpvtgsentence cs at line we test for invalid strings by using double tryparse as follows protected override void onsentencechanged first process the basic info for the sentence base onsentencechanged cache the sentence words string words words int wordcount words length even if we get a valid vtg sentence we can have invalid values if words null double result check the longitude third word of the sentence if wordcount double tryparse words out result false isvalid false return check the speed fifth word of the sentence if wordcount double tryparse words out result false isvalid false return i ve also found some mistakes when testing the wordcount to make sure we are not accessing elements of the words string array that do not exist protected override void onsentencechanged first process the basic info for the sentence base onsentencechanged region bearing if wordcount words length bearing azimuth parse words nmeacultureinfo else bearing azimuth invalid endregion bearing region magnetic variation this is ok because we are testing wordcount but we could ve just tested using wordcount if wordcount words length magneticvariation new longitude double parse words nmeacultureinfo bearing decimaldegrees else magneticvariation longitude invalid endregion magnetic variation region speed speed is reported as both knots and km h we can parse either of the values first try to parse knots if that fails parse km h this should be testing for wordcount or just wordcount if wordcount words length speed new speed parse the numeric portion double parse words nmeacultureinfo use knots speedunit knots this should be testing for wordcount or just wordcount else if wordcount words length speed new speed parse the numeric portion double parse words nmeacultureinfo use knots speedunit kilometersperhour else invalid speed speed speed invalid endregion speed i added comments about changing the if statements to use the proper testing of the wordcount but i don t think this is causing any issues because the word count is longer than however i did make the changes to our version of the code now that the onsentencechanged method of the gpvtgsentence class is fixed we can add the last piece of code that checks the sentence s isvalid property and prevents processing invalid sentences in the onreadpacket method located in the file nmeainterpreter cs at line we need to add a check for the sentence s isvalid property protected override void onreadpacket read a sentence from the underlying stream nmeasentence sentence stream readtypedsentence don t process invalid sentences if sentence isvalid false return there are probably other places in the dotspatial positioning library where this improvement could be made but since we only use the nmeainterpreter to read gps data from our gobi cards the above fix is all we needed to resolve the issue i have attached the gps device stream as read by a third party application called visualgps that shows the gpsvtg sentence containing nan for the values gpvtg nan t nan m n k a gprmc a n w a gpgsa a gpgsv gpgsv gpgsv gpgsv gpgga n w m m pqxfi n w gpvtg nan t nan m n k a thank you for writing such a wonderful piece of software i hope that my analysis will be useful to your team and anyone else who has experienced this issue cleveland e raymond
0
28,762
11,688,510,844
IssuesEvent
2020-03-05 14:39:25
Ryan-Oneil/oneil-industries-website
https://api.github.com/repos/Ryan-Oneil/oneil-industries-website
closed
CVE-2020-9546 (Medium) detected in jackson-databind-2.9.10.3.jar
security vulnerability
## CVE-2020-9546 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/oneil-industries-website/backend/pom.xml</p> <p>Path to vulnerable library: downloadResource_fef68085-5450-4b7d-ab3e-a02e26e07811/20200305121424/jackson-databind-2.9.10.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.10.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Ryan-Oneil/oneil-industries-website/commit/920764ef724c8d13dd83a8b562b08c635d2694d3">920764ef724c8d13dd83a8b562b08c635d2694d3</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-9546 (Medium) detected in jackson-databind-2.9.10.3.jar - ## CVE-2020-9546 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.10.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/oneil-industries-website/backend/pom.xml</p> <p>Path to vulnerable library: downloadResource_fef68085-5450-4b7d-ab3e-a02e26e07811/20200305121424/jackson-databind-2.9.10.3.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.10.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Ryan-Oneil/oneil-industries-website/commit/920764ef724c8d13dd83a8b562b08c635d2694d3">920764ef724c8d13dd83a8b562b08c635d2694d3</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.hadoop.shaded.com.zaxxer.hikari.HikariConfig (aka shaded hikari-config). <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-9546>CVE-2020-9546</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9546</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jackson databind jar cve medium severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm oneil industries website backend pom xml path to vulnerable library downloadresource jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache hadoop shaded com zaxxer hikari hikariconfig aka shaded hikari config publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
23,607
12,036,001,906
IssuesEvent
2020-04-13 18:57:20
sciencehistory/scihist_digicoll
https://api.github.com/repos/sciencehistory/scihist_digicoll
opened
Rename all source code files related to audio/oral history
developer tools maintenance/performance
We originally named them without referring to oral history, as if they were just for "audio". And we weren't very consistent even there, sometimes `show_audio`, sometimes `show_with_audio`, sometimes `audio_work`, etc. But this set of views became really customized for oral history specifically. We should rename them to be clear about that. But `oral_history` is a lot to type. Maybe all based on `oh_audio`, all beginning with that? And we should change the logic in the controller to only activate this special view if the thing is genre oral histories **and** has audio. Some of the files: * show_audio.scss * audio_work_show_decorator.rb * show_audio.scss * audio_front_end_spec.rb * show_with_audio.html.erb There may be more. Or is this maybe not really worth it?
True
Rename all source code files related to audio/oral history - We originally named them without referring to oral history, as if they were just for "audio". And we weren't very consistent even there, sometimes `show_audio`, sometimes `show_with_audio`, sometimes `audio_work`, etc. But this set of views became really customized for oral history specifically. We should rename them to be clear about that. But `oral_history` is a lot to type. Maybe all based on `oh_audio`, all beginning with that? And we should change the logic in the controller to only activate this special view if the thing is genre oral histories **and** has audio. Some of the files: * show_audio.scss * audio_work_show_decorator.rb * show_audio.scss * audio_front_end_spec.rb * show_with_audio.html.erb There may be more. Or is this maybe not really worth it?
non_priority
rename all source code files related to audio oral history we originally named them without referring to oral history as if they were just for audio and we weren t very consistent even there sometimes show audio sometimes show with audio sometimes audio work etc but this set of views became really customized for oral history specifically we should rename them to be clear about that but oral history is a lot to type maybe all based on oh audio all beginning with that and we should change the logic in the controller to only activate this special view if the thing is genre oral histories and has audio some of the files show audio scss audio work show decorator rb show audio scss audio front end spec rb show with audio html erb there may be more or is this maybe not really worth it
0
271,340
29,477,316,387
IssuesEvent
2023-06-02 00:09:44
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
Dart internal builds always use main recipes
team: security
Dart internal builds are not using their release candidate branch of recipes.
True
Dart internal builds always use main recipes - Dart internal builds are not using their release candidate branch of recipes.
non_priority
dart internal builds always use main recipes dart internal builds are not using their release candidate branch of recipes
0
35,596
7,786,135,582
IssuesEvent
2018-06-06 17:58:24
telus/tds-core
https://api.github.com/repos/telus/tds-core
closed
[StepTracker] - Mobile view - "Step x of y" is hardcoded and displayed only in English
defect in development status: core team
## Description - On the step tracker for mobile view, copy "Step x of y" is displayed in English for French ## Reproduction Steps - https://www.wcstage.telus.com/my-account/payment/preauthorized/account/ye_rZFV2bLYlFedcXxDH5w/debit - Login: ssffh4@telusinternal.com / Passw0rd - BAN: 603163163s ## Reproduction Percentage (if applicable) - 10/10 times ## Version Number of TDS - [0.19] Include version of TDS this is occuring on *note attach screenshots whenever possible* ![image](https://user-images.githubusercontent.com/16292379/29332477-27941d0c-81ce-11e7-92d6-e59daa18de1b.png)
1.0
[StepTracker] - Mobile view - "Step x of y" is hardcoded and displayed only in English - ## Description - On the step tracker for mobile view, copy "Step x of y" is displayed in English for French ## Reproduction Steps - https://www.wcstage.telus.com/my-account/payment/preauthorized/account/ye_rZFV2bLYlFedcXxDH5w/debit - Login: ssffh4@telusinternal.com / Passw0rd - BAN: 603163163s ## Reproduction Percentage (if applicable) - 10/10 times ## Version Number of TDS - [0.19] Include version of TDS this is occuring on *note attach screenshots whenever possible* ![image](https://user-images.githubusercontent.com/16292379/29332477-27941d0c-81ce-11e7-92d6-e59daa18de1b.png)
non_priority
mobile view step x of y is hardcoded and displayed only in english description on the step tracker for mobile view copy step x of y is displayed in english for french reproduction steps login telusinternal com ban reproduction percentage if applicable times version number of tds include version of tds this is occuring on note attach screenshots whenever possible
0
110,261
16,977,092,098
IssuesEvent
2021-06-30 01:43:25
AlekEagle/sharex-vue-docs
https://api.github.com/repos/AlekEagle/sharex-vue-docs
opened
CVE-2021-32723 (High) detected in prismjs-1.22.0.tgz
security vulnerability
## CVE-2021-32723 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>prismjs-1.22.0.tgz</b></p></summary> <p>Lightweight, robust, elegant syntax highlighting. A spin-off project from Dabblet.</p> <p>Library home page: <a href="https://registry.npmjs.org/prismjs/-/prismjs-1.22.0.tgz">https://registry.npmjs.org/prismjs/-/prismjs-1.22.0.tgz</a></p> <p>Path to dependency file: sharex-vue-docs/package.json</p> <p>Path to vulnerable library: sharex-vue-docs/node_modules/prismjs/package.json</p> <p> Dependency Hierarchy: - vuepress-1.7.1.tgz (Root Library) - core-1.7.1.tgz - markdown-1.7.1.tgz - :x: **prismjs-1.22.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text. <p>Publish Date: 2021-06-28 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32723>CVE-2021-32723</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg">https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg</a></p> <p>Release Date: 2021-06-28</p> <p>Fix Resolution: prismjs - 1.24.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-32723 (High) detected in prismjs-1.22.0.tgz - ## CVE-2021-32723 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>prismjs-1.22.0.tgz</b></p></summary> <p>Lightweight, robust, elegant syntax highlighting. A spin-off project from Dabblet.</p> <p>Library home page: <a href="https://registry.npmjs.org/prismjs/-/prismjs-1.22.0.tgz">https://registry.npmjs.org/prismjs/-/prismjs-1.22.0.tgz</a></p> <p>Path to dependency file: sharex-vue-docs/package.json</p> <p>Path to vulnerable library: sharex-vue-docs/node_modules/prismjs/package.json</p> <p> Dependency Hierarchy: - vuepress-1.7.1.tgz (Root Library) - core-1.7.1.tgz - markdown-1.7.1.tgz - :x: **prismjs-1.22.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prism is a syntax highlighting library. Some languages before 1.24.0 are vulnerable to Regular Expression Denial of Service (ReDoS). When Prism is used to highlight untrusted (user-given) text, an attacker can craft a string that will take a very very long time to highlight. This problem has been fixed in Prism v1.24. As a workaround, do not use ASCIIDoc or ERB to highlight untrusted text. Other languages are not affected and can be used to highlight untrusted text. <p>Publish Date: 2021-06-28 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32723>CVE-2021-32723</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg">https://github.com/PrismJS/prism/security/advisories/GHSA-gj77-59wh-66hg</a></p> <p>Release Date: 2021-06-28</p> <p>Fix Resolution: prismjs - 1.24.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in prismjs tgz cve high severity vulnerability vulnerable library prismjs tgz lightweight robust elegant syntax highlighting a spin off project from dabblet library home page a href path to dependency file sharex vue docs package json path to vulnerable library sharex vue docs node modules prismjs package json dependency hierarchy vuepress tgz root library core tgz markdown tgz x prismjs tgz vulnerable library found in base branch master vulnerability details prism is a syntax highlighting library some languages before are vulnerable to regular expression denial of service redos when prism is used to highlight untrusted user given text an attacker can craft a string that will take a very very long time to highlight this problem has been fixed in prism as a workaround do not use asciidoc or erb to highlight untrusted text other languages are not affected and can be used to highlight untrusted text publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution prismjs step up your open source security game with whitesource
0
4,616
7,247,806,762
IssuesEvent
2018-02-15 05:52:29
PrinceOfAmber/Cyclic
https://api.github.com/repos/PrinceOfAmber/Cyclic
closed
cyclicmagic.fake_player.sapling_regrowth wakes up Weirding Gadget chunk loader
bug: lag done [pending release] mod compatibility
Minecraft version & Mod Version: Forge 2615 1.12.2 Cyclic-1.12.2-1.11.2 Latest Weirding Gadget Single player or Server: Server Cyclic cyclicmagic.fake_player.sapling_regrowth triggers Weirding Gadget chunk loader. Excerpt from log: `[10:36:09] [Server thread/INFO] [weirdinggadget]: Waking up Chunk Loader at BlockPos{x=2577, y=66, z=1175} because cyclicmagic.fake_player.sapling_regrowth placed/interacted with it`
True
cyclicmagic.fake_player.sapling_regrowth wakes up Weirding Gadget chunk loader - Minecraft version & Mod Version: Forge 2615 1.12.2 Cyclic-1.12.2-1.11.2 Latest Weirding Gadget Single player or Server: Server Cyclic cyclicmagic.fake_player.sapling_regrowth triggers Weirding Gadget chunk loader. Excerpt from log: `[10:36:09] [Server thread/INFO] [weirdinggadget]: Waking up Chunk Loader at BlockPos{x=2577, y=66, z=1175} because cyclicmagic.fake_player.sapling_regrowth placed/interacted with it`
non_priority
cyclicmagic fake player sapling regrowth wakes up weirding gadget chunk loader minecraft version mod version forge cyclic latest weirding gadget single player or server server cyclic cyclicmagic fake player sapling regrowth triggers weirding gadget chunk loader excerpt from log waking up chunk loader at blockpos x y z because cyclicmagic fake player sapling regrowth placed interacted with it
0
8,811
3,791,017,086
IssuesEvent
2016-03-22 00:04:17
WayofTime/BloodMagic
https://api.github.com/repos/WayofTime/BloodMagic
closed
Crash while launching game. (1.9)
1.9 bug code complete
#### Issue Description: Note: If this bug occurs in a modpack, please report this to the modpack author. Otherwise, delete this line and add your description here. If this is a feature request, this template does not apply to you. Just delete everything. #### What happens: While loading, the game crashed with this crash report: http://pastebin.com/hkXCApgc #### What you expected to happen: Game should open. #### Steps to reproduce: 1. I pressed ''play'' 2. Game started loading. 3. Crash happened. ... ____ #### Affected Versions (Do *not* use "latest"): - BloodMagic: 1.9- 2.0.0-21 - Minecraft: 1.9 - Forge: 1.9-12.16.0.1782-1.9
1.0
Crash while launching game. (1.9) - #### Issue Description: Note: If this bug occurs in a modpack, please report this to the modpack author. Otherwise, delete this line and add your description here. If this is a feature request, this template does not apply to you. Just delete everything. #### What happens: While loading, the game crashed with this crash report: http://pastebin.com/hkXCApgc #### What you expected to happen: Game should open. #### Steps to reproduce: 1. I pressed ''play'' 2. Game started loading. 3. Crash happened. ... ____ #### Affected Versions (Do *not* use "latest"): - BloodMagic: 1.9- 2.0.0-21 - Minecraft: 1.9 - Forge: 1.9-12.16.0.1782-1.9
non_priority
crash while launching game issue description note if this bug occurs in a modpack please report this to the modpack author otherwise delete this line and add your description here if this is a feature request this template does not apply to you just delete everything what happens while loading the game crashed with this crash report what you expected to happen game should open steps to reproduce i pressed play game started loading crash happened affected versions do not use latest bloodmagic minecraft forge
0
271,275
29,368,851,996
IssuesEvent
2023-05-29 01:08:36
vlaship/bank-api
https://api.github.com/repos/vlaship/bank-api
opened
CVE-2023-24998 (High) detected in tomcat-embed-core-9.0.30.jar
Mend: dependency security vulnerability
## CVE-2023-24998 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.30.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="https://tomcat.apache.org/">https://tomcat.apache.org/</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar,/root/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.2.4.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.2.4.RELEASE.jar - :x: **tomcat-embed-core-9.0.30.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. <p>Publish Date: 2023-02-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-24998>CVE-2023-24998</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tomcat.apache.org/security-10.html">https://tomcat.apache.org/security-10.html</a></p> <p>Release Date: 2023-02-20</p> <p>Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 9.0.71</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.5.15</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-24998 (High) detected in tomcat-embed-core-9.0.30.jar - ## CVE-2023-24998 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tomcat-embed-core-9.0.30.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="https://tomcat.apache.org/">https://tomcat.apache.org/</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar,/root/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/9.0.30/ad32909314fe2ba02cec036434c0addd19bcc580/tomcat-embed-core-9.0.30.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.2.4.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.2.4.RELEASE.jar - :x: **tomcat-embed-core-9.0.30.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. <p>Publish Date: 2023-02-20 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-24998>CVE-2023-24998</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tomcat.apache.org/security-10.html">https://tomcat.apache.org/security-10.html</a></p> <p>Release Date: 2023-02-20</p> <p>Fix Resolution (org.apache.tomcat.embed:tomcat-embed-core): 9.0.71</p> <p>Direct dependency fix Resolution (org.springframework.boot:spring-boot-starter-web): 2.5.15</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tomcat embed core jar cve high severity vulnerability vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file build gradle path to vulnerable library root gradle caches modules files org apache tomcat embed tomcat embed core tomcat embed core jar root gradle caches modules files org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy spring boot starter web release jar root library spring boot starter tomcat release jar x tomcat embed core jar vulnerable library vulnerability details apache commons fileupload before does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a dos with a malicious upload or series of uploads note that like all of the file upload limits the new configuration option fileuploadbase setfilecountmax is not enabled by default and must be explicitly configured publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed core direct dependency fix resolution org springframework boot spring boot starter web step up your open source security game with mend
0
130,528
27,717,350,118
IssuesEvent
2023-03-14 17:50:00
informalsystems/hermes
https://api.github.com/repos/informalsystems/hermes
closed
Improve packet forward tests by submitting transaction within Rust
O: code-hygiene
## Proposal <!-- Describe your proposal for how the process of Hermes should be improved --> <!-- Apply relevant labels to indicate: - (WHY) The purpose or objective of this proposal with "O" labels - (WHICH) The part of the system this proposal relates to (use "E" for external or "I" for internal levels) - (HOW) If any administrative considerations should be taken into account (use "A" labels) This will help us prioritize and categorize your proposal more effectively --> Following https://github.com/informalsystems/hermes/pull/3032#discussion_r1085311988 the method used to test packet forwarding should be updated to submit the transaction without using the chain binary CLI. This requires `ibc-proto-rs` to have the `memo` field. ____ ## For Admin Use - [ ] Not duplicate issue - [ ] Appropriate labels applied - [ ] Appropriate milestone (priority) applied - [ ] Appropriate contributors tagged - [ ] Contributor assigned/self-assigned
1.0
Improve packet forward tests by submitting transaction within Rust - ## Proposal <!-- Describe your proposal for how the process of Hermes should be improved --> <!-- Apply relevant labels to indicate: - (WHY) The purpose or objective of this proposal with "O" labels - (WHICH) The part of the system this proposal relates to (use "E" for external or "I" for internal levels) - (HOW) If any administrative considerations should be taken into account (use "A" labels) This will help us prioritize and categorize your proposal more effectively --> Following https://github.com/informalsystems/hermes/pull/3032#discussion_r1085311988 the method used to test packet forwarding should be updated to submit the transaction without using the chain binary CLI. This requires `ibc-proto-rs` to have the `memo` field. ____ ## For Admin Use - [ ] Not duplicate issue - [ ] Appropriate labels applied - [ ] Appropriate milestone (priority) applied - [ ] Appropriate contributors tagged - [ ] Contributor assigned/self-assigned
non_priority
improve packet forward tests by submitting transaction within rust proposal apply relevant labels to indicate why the purpose or objective of this proposal with o labels which the part of the system this proposal relates to use e for external or i for internal levels how if any administrative considerations should be taken into account use a labels this will help us prioritize and categorize your proposal more effectively following the method used to test packet forwarding should be updated to submit the transaction without using the chain binary cli this requires ibc proto rs to have the memo field for admin use not duplicate issue appropriate labels applied appropriate milestone priority applied appropriate contributors tagged contributor assigned self assigned
0