Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
428,555
29,997,969,337
IssuesEvent
2023-06-26 07:18:44
pharmaverse/admiralvaccine
https://api.github.com/repos/pharmaverse/admiralvaccine
opened
Update full form for all acronyms
documentation final review
### Please select a category the issue is focused on? _No response_ ### Let us know where something needs a refresh or put your idea here! Eg: Update full for CBER
1.0
Update full form for all acronyms - ### Please select a category the issue is focused on? _No response_ ### Let us know where something needs a refresh or put your idea here! Eg: Update full for CBER
non_priority
update full form for all acronyms please select a category the issue is focused on no response let us know where something needs a refresh or put your idea here eg update full for cber
0
77,813
21,965,607,186
IssuesEvent
2022-05-24 19:57:49
GaloisInc/cryptol
https://api.github.com/repos/GaloisInc/cryptol
closed
Windows installer includes too many files?
windows build system
The Windows `.msi` installer we produce for releases is 4x the size of the corresponding tarball. It may partly be using less powerful compression, but I'm suspicious that it might include multiple copies of the binaries, in different locations.
1.0
Windows installer includes too many files? - The Windows `.msi` installer we produce for releases is 4x the size of the corresponding tarball. It may partly be using less powerful compression, but I'm suspicious that it might include multiple copies of the binaries, in different locations.
non_priority
windows installer includes too many files the windows msi installer we produce for releases is the size of the corresponding tarball it may partly be using less powerful compression but i m suspicious that it might include multiple copies of the binaries in different locations
0
451
2,858,527,722
IssuesEvent
2015-06-03 03:25:49
uqfoundation/dill
https://api.github.com/repos/uqfoundation/dill
closed
Unpicklable objects defined in doctests interfere with serialization of lambdas
compatibility
I found another example where Dill fails to pickle objects when running under doctest. This is a one-line addition to my test-case in #18. I'm using Python 2.7.6 and Dill eb122e6eb00dcfa9704ffa692fc7a14850867185. /cc @distobj ```python import dill as pickle import doctest pickle.dill._trace(1) class SomeUnreferencedUnpicklableClass(object): def __reduce__(self): raise Exception unpicklable = SomeUnreferencedUnpicklableClass() # This works fine outside of Doctest: serialized = pickle.dumps(lambda x: x) # This fails because it tries to pickle the unpicklable object: def tests(): """ >>> unpicklable = SomeUnreferencedUnpicklableClass() # <-- Added since #18 >>> serialized = pickle.dumps(lambda x: x) """ return print "\n\nRunning Doctest:" doctest.testmod() ``` Output: ``` F1: <function <lambda> at 0x101f8f848> F2: <function _create_function at 0x101c96d70> Co: <code object <lambda> at 0x100474ab0, file "dillbugtwo.py", line 13> F2: <function _unmarshal at 0x101c96c08> D1: <dict object at 0x10031ba20> D2: <dict object at 0x101da9de0> Running Doctest: F1: <function <lambda> at 0x101f8f938> F2: <function _create_function at 0x101c96d70> Co: <code object <lambda> at 0x101f369b0, file "<doctest __main__.tests[1]>", line 1> F2: <function _unmarshal at 0x101c96c08> D2: <dict object at 0x102206120> F1: <function tests at 0x101f8f848> Co: <code object tests at 0x100474e30, file "dillbugtwo.py", line 16> D1: <dict object at 0x10031ba20> D2: <dict object at 0x10222e940> ********************************************************************** File "dillbugtwo.py", line 19, in __main__.tests Failed example: serialized = pickle.dumps(lambda x: x) Exception raised: Traceback (most recent call last): File "/Users/joshrosen/anaconda/lib/python2.7/doctest.py", line 1289, in __run compileflags, 1) in test.globs File "<doctest __main__.tests[1]>", line 1, in <module> serialized = pickle.dumps(lambda x: x) File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 165, in dumps dump(obj, file, protocol, byref) File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 158, in dump pik.dump(obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 224, in dump self.save(obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 286, in save f(self, obj) # Call unbound method with explicit self File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 506, in save_function obj.__dict__), obj=obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 401, in save_reduce save(args) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 286, in save f(self, obj) # Call unbound method with explicit self File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 562, in save_tuple save(element) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 286, in save f(self, obj) # Call unbound method with explicit self File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 538, in save_module_dict StockPickler.save_dict(pickler, obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 649, in save_dict self._batch_setitems(obj.iteritems()) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 681, in _batch_setitems save(v) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 306, in save rv = reduce(self.proto) File "dillbugtwo.py", line 8, in __reduce__ raise Exception Exception ********************************************************************** 1 items had failures: 1 of 2 in __main__.tests ***Test Failed*** 1 failures. ```
True
Unpicklable objects defined in doctests interfere with serialization of lambdas - I found another example where Dill fails to pickle objects when running under doctest. This is a one-line addition to my test-case in #18. I'm using Python 2.7.6 and Dill eb122e6eb00dcfa9704ffa692fc7a14850867185. /cc @distobj ```python import dill as pickle import doctest pickle.dill._trace(1) class SomeUnreferencedUnpicklableClass(object): def __reduce__(self): raise Exception unpicklable = SomeUnreferencedUnpicklableClass() # This works fine outside of Doctest: serialized = pickle.dumps(lambda x: x) # This fails because it tries to pickle the unpicklable object: def tests(): """ >>> unpicklable = SomeUnreferencedUnpicklableClass() # <-- Added since #18 >>> serialized = pickle.dumps(lambda x: x) """ return print "\n\nRunning Doctest:" doctest.testmod() ``` Output: ``` F1: <function <lambda> at 0x101f8f848> F2: <function _create_function at 0x101c96d70> Co: <code object <lambda> at 0x100474ab0, file "dillbugtwo.py", line 13> F2: <function _unmarshal at 0x101c96c08> D1: <dict object at 0x10031ba20> D2: <dict object at 0x101da9de0> Running Doctest: F1: <function <lambda> at 0x101f8f938> F2: <function _create_function at 0x101c96d70> Co: <code object <lambda> at 0x101f369b0, file "<doctest __main__.tests[1]>", line 1> F2: <function _unmarshal at 0x101c96c08> D2: <dict object at 0x102206120> F1: <function tests at 0x101f8f848> Co: <code object tests at 0x100474e30, file "dillbugtwo.py", line 16> D1: <dict object at 0x10031ba20> D2: <dict object at 0x10222e940> ********************************************************************** File "dillbugtwo.py", line 19, in __main__.tests Failed example: serialized = pickle.dumps(lambda x: x) Exception raised: Traceback (most recent call last): File "/Users/joshrosen/anaconda/lib/python2.7/doctest.py", line 1289, in __run compileflags, 1) in test.globs File "<doctest __main__.tests[1]>", line 1, in <module> serialized = pickle.dumps(lambda x: x) File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 165, in dumps dump(obj, file, protocol, byref) File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 158, in dump pik.dump(obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 224, in dump self.save(obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 286, in save f(self, obj) # Call unbound method with explicit self File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 506, in save_function obj.__dict__), obj=obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 401, in save_reduce save(args) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 286, in save f(self, obj) # Call unbound method with explicit self File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 562, in save_tuple save(element) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 286, in save f(self, obj) # Call unbound method with explicit self File "/Users/joshrosen/anaconda/lib/python2.7/site-packages/dill-0.2.2.dev-py2.7.egg/dill/dill.py", line 538, in save_module_dict StockPickler.save_dict(pickler, obj) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 649, in save_dict self._batch_setitems(obj.iteritems()) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 681, in _batch_setitems save(v) File "/Users/joshrosen/anaconda/lib/python2.7/pickle.py", line 306, in save rv = reduce(self.proto) File "dillbugtwo.py", line 8, in __reduce__ raise Exception Exception ********************************************************************** 1 items had failures: 1 of 2 in __main__.tests ***Test Failed*** 1 failures. ```
non_priority
unpicklable objects defined in doctests interfere with serialization of lambdas i found another example where dill fails to pickle objects when running under doctest this is a one line addition to my test case in i m using python and dill cc distobj python import dill as pickle import doctest pickle dill trace class someunreferencedunpicklableclass object def reduce self raise exception unpicklable someunreferencedunpicklableclass this works fine outside of doctest serialized pickle dumps lambda x x this fails because it tries to pickle the unpicklable object def tests unpicklable someunreferencedunpicklableclass added since serialized pickle dumps lambda x x return print n nrunning doctest doctest testmod output at co at file dillbugtwo py line running doctest at co at file line co file dillbugtwo py line in main tests failed example serialized pickle dumps lambda x x exception raised traceback most recent call last file users joshrosen anaconda lib doctest py line in run compileflags in test globs file line in serialized pickle dumps lambda x x file users joshrosen anaconda lib site packages dill dev egg dill dill py line in dumps dump obj file protocol byref file users joshrosen anaconda lib site packages dill dev egg dill dill py line in dump pik dump obj file users joshrosen anaconda lib pickle py line in dump self save obj file users joshrosen anaconda lib pickle py line in save f self obj call unbound method with explicit self file users joshrosen anaconda lib site packages dill dev egg dill dill py line in save function obj dict obj obj file users joshrosen anaconda lib pickle py line in save reduce save args file users joshrosen anaconda lib pickle py line in save f self obj call unbound method with explicit self file users joshrosen anaconda lib pickle py line in save tuple save element file users joshrosen anaconda lib pickle py line in save f self obj call unbound method with explicit self file users joshrosen anaconda lib site packages dill dev egg dill dill py line in save module dict stockpickler save dict pickler obj file users joshrosen anaconda lib pickle py line in save dict self batch setitems obj iteritems file users joshrosen anaconda lib pickle py line in batch setitems save v file users joshrosen anaconda lib pickle py line in save rv reduce self proto file dillbugtwo py line in reduce raise exception exception items had failures of in main tests test failed failures
0
280,001
30,792,334,796
IssuesEvent
2023-07-31 17:06:16
KDWSS/openedr
https://api.github.com/repos/KDWSS/openedr
closed
CVE-2021-23840 (High) detected in multiple libraries - autoclosed
Mend: dependency security vulnerability
## CVE-2021-23840 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opensslOpenSSL_1_1_1b</b>, <b>opensslOpenSSL_1_1_1b</b>, <b>opensslOpenSSL_1_1_1b</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). <p>Publish Date: 2021-02-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23840>CVE-2021-23840</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a></p> <p>Release Date: 2021-02-16</p> <p>Fix Resolution: OpenSSL_1_1_1j; openssl-src -111.14.0+1.1.1j</p> </p> </details> <p></p>
True
CVE-2021-23840 (High) detected in multiple libraries - autoclosed - ## CVE-2021-23840 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>opensslOpenSSL_1_1_1b</b>, <b>opensslOpenSSL_1_1_1b</b>, <b>opensslOpenSSL_1_1_1b</b></p></summary> <p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform. In such cases the return value from the function call will be 1 (indicating success), but the output length value will be negative. This could cause applications to behave incorrectly or crash. OpenSSL versions 1.1.1i and below are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue. However OpenSSL 1.0.2 is out of support and no longer receiving public updates. Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j (Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected 1.0.2-1.0.2x). <p>Publish Date: 2021-02-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23840>CVE-2021-23840</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23840</a></p> <p>Release Date: 2021-02-16</p> <p>Fix Resolution: OpenSSL_1_1_1j; openssl-src -111.14.0+1.1.1j</p> </p> </details> <p></p>
non_priority
cve high detected in multiple libraries autoclosed cve high severity vulnerability vulnerable libraries opensslopenssl opensslopenssl opensslopenssl vulnerability details calls to evp cipherupdate evp encryptupdate and evp decryptupdate may overflow the output length argument in some cases where the input length is close to the maximum permissable length for an integer on the platform in such cases the return value from the function call will be indicating success but the output length value will be negative this could cause applications to behave incorrectly or crash openssl versions and below are affected by this issue users of these versions should upgrade to openssl openssl versions and below are affected by this issue however openssl is out of support and no longer receiving public updates premium support customers of openssl should upgrade to other users should upgrade to fixed in openssl affected fixed in openssl affected publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution openssl openssl src
0
15,861
5,192,252,882
IssuesEvent
2017-01-22 06:17:36
ClinGen/clincoded
https://api.github.com/repos/ClinGen/clincoded
closed
Travis/Sauce Lab connection -- decrease sporadic connection problems
bug code testing release ready
We are getting Sauce Labs failures with some frequency. This is *not* due to errors related to actual BDD test errors, but appears to be related to the client/browser not being ready on the Sauce Labs end. Restarting just the browser test half of the test on Travis fixes problem of the test failing. Multiple restarts may be required on some days. Each restart means an additional 6 minutes of waiting (for instance if you are waiting for a PR to be completed) Possible things to try: - upgrade sauce connect package in our local Travis config... we have `4.3.11` and the current one is `4.4.2` (possibly this has better connection capabilities) - Upgrade pytest-splinter to `1.8.0` (or whatever is the latest) - Upgrade splinter - Add an explicit wait after the Sauce tunnel is created. Possibly there is a lag before Sauce is ready on their end to begin the test. This is likely because as far as Sauce is concerned the test _never even_ was run as evidenced by the absence of the failing BDD test suite on https://saucelabs.com/u/clincoded
1.0
Travis/Sauce Lab connection -- decrease sporadic connection problems - We are getting Sauce Labs failures with some frequency. This is *not* due to errors related to actual BDD test errors, but appears to be related to the client/browser not being ready on the Sauce Labs end. Restarting just the browser test half of the test on Travis fixes problem of the test failing. Multiple restarts may be required on some days. Each restart means an additional 6 minutes of waiting (for instance if you are waiting for a PR to be completed) Possible things to try: - upgrade sauce connect package in our local Travis config... we have `4.3.11` and the current one is `4.4.2` (possibly this has better connection capabilities) - Upgrade pytest-splinter to `1.8.0` (or whatever is the latest) - Upgrade splinter - Add an explicit wait after the Sauce tunnel is created. Possibly there is a lag before Sauce is ready on their end to begin the test. This is likely because as far as Sauce is concerned the test _never even_ was run as evidenced by the absence of the failing BDD test suite on https://saucelabs.com/u/clincoded
non_priority
travis sauce lab connection decrease sporadic connection problems we are getting sauce labs failures with some frequency this is not due to errors related to actual bdd test errors but appears to be related to the client browser not being ready on the sauce labs end restarting just the browser test half of the test on travis fixes problem of the test failing multiple restarts may be required on some days each restart means an additional minutes of waiting for instance if you are waiting for a pr to be completed possible things to try upgrade sauce connect package in our local travis config we have and the current one is possibly this has better connection capabilities upgrade pytest splinter to or whatever is the latest upgrade splinter add an explicit wait after the sauce tunnel is created possibly there is a lag before sauce is ready on their end to begin the test this is likely because as far as sauce is concerned the test never even was run as evidenced by the absence of the failing bdd test suite on
0
10,001
25,972,920,052
IssuesEvent
2022-12-19 12:45:35
facebook/react-native
https://api.github.com/repos/facebook/react-native
closed
Codegen for TurboModules does not allow for Events to be Emitted
Type: New Architecture Resolution: Answered
### Description I am working on an app that requires a native module to be able to emit random events. In my case I am building a pedometer and steps can come from the native part of the application at random times. I can't use simple method calls because of this behaviour. I also want to use a BLE heart rate monitor which again requires the ability to use random events because the sensor data comes in at random times. I tried to use `DirectEventHandler` in my Codegen file and the codegen compiler just shows errors. My interface code looks like this: ``` import type { TurboModule } from 'react-native'; import { TurboModuleRegistry } from 'react-native'; import type { DirectEventHandler, Int32, } from 'react-native/Libraries/Types/CodegenTypes'; export interface Spec extends TurboModule { multiply(a: number, b: number): number; add(a: number, b: number): number; randomEvent: DirectEventHandler<{ data: Int32 }>; } export default TurboModuleRegistry.getEnforcing<Spec>('RtmPedometer'); ``` If I comment out the randomEvent code then Codegen works perfectly fine and I have no issues. This seems to be the only type in the documentation we have for event emitting unless I am missing something. This issue is especially frustrating because this was easy to do with the old arch and is really well documented. See: https://reactnative.dev/docs/native-modules-android#sending-events-to-javascript . This bug with `DirectEventHandler` is integral to how TurboModules should work and I feel like it should be a pretty high priority fix. ### Version 0.70.5 ### Output of `npx react-native info` ``` System: OS: macOS 12.5 CPU: (10) arm64 Apple M1 Pro Memory: 149.16 MB / 16.00 GB Shell: 5.8.1 - /bin/zsh Binaries: Node: 16.17.0 - /usr/local/bin/node Yarn: 1.22.19 - /usr/local/bin/yarn npm: 8.15.0 - /usr/local/bin/npm Watchman: Not Found Managers: CocoaPods: 1.11.3 - /Users/danielfriyia/.rvm/gems/ruby-3.0.0/bin/pod SDKs: iOS SDK: Platforms: DriverKit 21.4, iOS 16.0, macOS 12.3, tvOS 16.0, watchOS 9.0 Android SDK: Not Found IDEs: Android Studio: 2021.2 AI-212.5712.43.2112.8815526 Xcode: 14.0/14A309 - /usr/bin/xcodebuild Languages: Java: 11.0.16 - /usr/bin/javac npmPackages: @react-native-community/cli: Not Found react: 18.1.0 => 18.1.0 react-native: 0.70.5 => 0.70.5 react-native-macos: Not Found npmGlobalPackages: *react-native*: Not Found ``` ### Steps to reproduce Clone the Reproducer Repo: https://github.com/friyiajr/EventBugReproducer Run the command `yarn bootstrap` At this point you will see it fail. If you want it to succeed comment out the `randomEvent` line along with its import statements. ### Snack, code example, screenshot, or link to a repository https://github.com/friyiajr/EventBugReproducer
1.0
Codegen for TurboModules does not allow for Events to be Emitted - ### Description I am working on an app that requires a native module to be able to emit random events. In my case I am building a pedometer and steps can come from the native part of the application at random times. I can't use simple method calls because of this behaviour. I also want to use a BLE heart rate monitor which again requires the ability to use random events because the sensor data comes in at random times. I tried to use `DirectEventHandler` in my Codegen file and the codegen compiler just shows errors. My interface code looks like this: ``` import type { TurboModule } from 'react-native'; import { TurboModuleRegistry } from 'react-native'; import type { DirectEventHandler, Int32, } from 'react-native/Libraries/Types/CodegenTypes'; export interface Spec extends TurboModule { multiply(a: number, b: number): number; add(a: number, b: number): number; randomEvent: DirectEventHandler<{ data: Int32 }>; } export default TurboModuleRegistry.getEnforcing<Spec>('RtmPedometer'); ``` If I comment out the randomEvent code then Codegen works perfectly fine and I have no issues. This seems to be the only type in the documentation we have for event emitting unless I am missing something. This issue is especially frustrating because this was easy to do with the old arch and is really well documented. See: https://reactnative.dev/docs/native-modules-android#sending-events-to-javascript . This bug with `DirectEventHandler` is integral to how TurboModules should work and I feel like it should be a pretty high priority fix. ### Version 0.70.5 ### Output of `npx react-native info` ``` System: OS: macOS 12.5 CPU: (10) arm64 Apple M1 Pro Memory: 149.16 MB / 16.00 GB Shell: 5.8.1 - /bin/zsh Binaries: Node: 16.17.0 - /usr/local/bin/node Yarn: 1.22.19 - /usr/local/bin/yarn npm: 8.15.0 - /usr/local/bin/npm Watchman: Not Found Managers: CocoaPods: 1.11.3 - /Users/danielfriyia/.rvm/gems/ruby-3.0.0/bin/pod SDKs: iOS SDK: Platforms: DriverKit 21.4, iOS 16.0, macOS 12.3, tvOS 16.0, watchOS 9.0 Android SDK: Not Found IDEs: Android Studio: 2021.2 AI-212.5712.43.2112.8815526 Xcode: 14.0/14A309 - /usr/bin/xcodebuild Languages: Java: 11.0.16 - /usr/bin/javac npmPackages: @react-native-community/cli: Not Found react: 18.1.0 => 18.1.0 react-native: 0.70.5 => 0.70.5 react-native-macos: Not Found npmGlobalPackages: *react-native*: Not Found ``` ### Steps to reproduce Clone the Reproducer Repo: https://github.com/friyiajr/EventBugReproducer Run the command `yarn bootstrap` At this point you will see it fail. If you want it to succeed comment out the `randomEvent` line along with its import statements. ### Snack, code example, screenshot, or link to a repository https://github.com/friyiajr/EventBugReproducer
non_priority
codegen for turbomodules does not allow for events to be emitted description i am working on an app that requires a native module to be able to emit random events in my case i am building a pedometer and steps can come from the native part of the application at random times i can t use simple method calls because of this behaviour i also want to use a ble heart rate monitor which again requires the ability to use random events because the sensor data comes in at random times i tried to use directeventhandler in my codegen file and the codegen compiler just shows errors my interface code looks like this import type turbomodule from react native import turbomoduleregistry from react native import type directeventhandler from react native libraries types codegentypes export interface spec extends turbomodule multiply a number b number number add a number b number number randomevent directeventhandler export default turbomoduleregistry getenforcing rtmpedometer if i comment out the randomevent code then codegen works perfectly fine and i have no issues this seems to be the only type in the documentation we have for event emitting unless i am missing something this issue is especially frustrating because this was easy to do with the old arch and is really well documented see this bug with directeventhandler is integral to how turbomodules should work and i feel like it should be a pretty high priority fix version output of npx react native info system os macos cpu apple pro memory mb gb shell bin zsh binaries node usr local bin node yarn usr local bin yarn npm usr local bin npm watchman not found managers cocoapods users danielfriyia rvm gems ruby bin pod sdks ios sdk platforms driverkit ios macos tvos watchos android sdk not found ides android studio ai xcode usr bin xcodebuild languages java usr bin javac npmpackages react native community cli not found react react native react native macos not found npmglobalpackages react native not found steps to reproduce clone the reproducer repo run the command yarn bootstrap at this point you will see it fail if you want it to succeed comment out the randomevent line along with its import statements snack code example screenshot or link to a repository
0
20,455
6,889,973,020
IssuesEvent
2017-11-22 12:21:35
spack/spack
https://api.github.com/repos/spack/spack
closed
Failure to install RHEL6 hpctoolkit
build-error
I get an error in the install phase. Log file attached [speck.zip](https://github.com/LLNL/spack/files/622925/speck.zip)
1.0
Failure to install RHEL6 hpctoolkit - I get an error in the install phase. Log file attached [speck.zip](https://github.com/LLNL/spack/files/622925/speck.zip)
non_priority
failure to install hpctoolkit i get an error in the install phase log file attached
0
7,649
9,917,261,654
IssuesEvent
2019-06-28 23:17:19
sisbell/tor-android-service
https://api.github.com/repos/sisbell/tor-android-service
opened
Change to Toolbar Notification Text
Orbit Compatibility
Don't show any text on toolbar notification, just icon https://github.com/guardianproject/orbot/commit/56917567cd21a734a35f3bee0e56ba23793b6887
True
Change to Toolbar Notification Text - Don't show any text on toolbar notification, just icon https://github.com/guardianproject/orbot/commit/56917567cd21a734a35f3bee0e56ba23793b6887
non_priority
change to toolbar notification text don t show any text on toolbar notification just icon
0
350,643
24,994,665,702
IssuesEvent
2022-11-02 22:20:53
PlasmoHQ/plasmo
https://api.github.com/repos/PlasmoHQ/plasmo
opened
EXP | with-tailwindcss dark mode not working
documentation
### What is the example you wish to see? In the `with-tailwindcss` example the content.tsx uses `dark:` classes. In my experiments, can't get tailwind to recognise dark mode of the current page. Neither if `<html class="dark"...` is set nor if `<html data-color-mode="dark"` with the suggested `darkMode: ['class', '[data-color-mode="dark"]']` tailwind config setup. ### Is there any context that might help us understand? Debugging context so far: https://discord.com/channels/946290204443025438/1035409196218331238/1037474596192014446 ### Code of Conduct - [X] I agree to follow this project's Code of Conduct - [X] I checked the [current issues](https://github.com/PlasmoHQ/plasmo/issues) for duplicate problems.
1.0
EXP | with-tailwindcss dark mode not working - ### What is the example you wish to see? In the `with-tailwindcss` example the content.tsx uses `dark:` classes. In my experiments, can't get tailwind to recognise dark mode of the current page. Neither if `<html class="dark"...` is set nor if `<html data-color-mode="dark"` with the suggested `darkMode: ['class', '[data-color-mode="dark"]']` tailwind config setup. ### Is there any context that might help us understand? Debugging context so far: https://discord.com/channels/946290204443025438/1035409196218331238/1037474596192014446 ### Code of Conduct - [X] I agree to follow this project's Code of Conduct - [X] I checked the [current issues](https://github.com/PlasmoHQ/plasmo/issues) for duplicate problems.
non_priority
exp with tailwindcss dark mode not working what is the example you wish to see in the with tailwindcss example the content tsx uses dark classes in my experiments can t get tailwind to recognise dark mode of the current page neither if html class dark is set nor if html data color mode dark with the suggested darkmode tailwind config setup is there any context that might help us understand debugging context so far code of conduct i agree to follow this project s code of conduct i checked the for duplicate problems
0
4,032
6,969,020,272
IssuesEvent
2017-12-11 02:13:35
triplea-game/triplea
https://api.github.com/repos/triplea-game/triplea
closed
Remove Codacy?
category: dev & admin process close pending confirmation discussion
At question: remove codacy branch builds? Codacy is reading zero issues, did we zero that out thanks to the checkstyle? If so, then codacy is seeming a bit redundant. ![wow](https://user-images.githubusercontent.com/12397753/31573101-aa409e0a-b069-11e7-8cdb-2f64bf0b9771.png)
1.0
Remove Codacy? - At question: remove codacy branch builds? Codacy is reading zero issues, did we zero that out thanks to the checkstyle? If so, then codacy is seeming a bit redundant. ![wow](https://user-images.githubusercontent.com/12397753/31573101-aa409e0a-b069-11e7-8cdb-2f64bf0b9771.png)
non_priority
remove codacy at question remove codacy branch builds codacy is reading zero issues did we zero that out thanks to the checkstyle if so then codacy is seeming a bit redundant
0
242,886
20,270,749,248
IssuesEvent
2022-02-15 15:59:08
mozilla-mobile/focus-android
https://api.github.com/repos/mozilla-mobile/focus-android
closed
Intermittent UI test failure - <notificationOpenButtonTest>
eng:ui-test eng:intermittent-test
https://console.firebase.google.com/u/0/project/moz-focus-android/testlab/histories/bh.2189b040bbce6d5a/matrices/5933786035319020532 ```Kotlin java.lang.AssertionError at org.junit.Assert.fail(Assert.java:86) at org.junit.Assert.assertTrue(Assert.java:41) at org.junit.Assert.assertTrue(Assert.java:52) at org.mozilla.focus.activity.robots.NotificationRobot.verifySystemNotificationExists(NotificationRobot.kt:49) at org.mozilla.focus.activity.SwitchContextTest$notificationOpenButtonTest$3.invoke(SwitchContextTest.kt:97) at org.mozilla.focus.activity.SwitchContextTest$notificationOpenButtonTest$3.invoke(SwitchContextTest.kt:96) at org.mozilla.focus.activity.robots.NotificationRobotKt.notificationTray(NotificationRobot.kt:94) at org.mozilla.focus.activity.SwitchContextTest.notificationOpenButtonTest(SwitchContextTest.kt:96) ``` ![image](https://user-images.githubusercontent.com/102331/153948579-c4c349e4-0224-4f42-b5f7-82616b24231d.png) @AndiAJ It looks like there are more default notifications completely filling up the Firebase Pixel 3 device all of a sudden. Clear all is supposed to clear the silent notifications which is called in the `setup`, but it didn't do anything here. Can you see if you can reproduce locally by filling up notifications and seeing why clear all isn't working here?
2.0
Intermittent UI test failure - <notificationOpenButtonTest> - https://console.firebase.google.com/u/0/project/moz-focus-android/testlab/histories/bh.2189b040bbce6d5a/matrices/5933786035319020532 ```Kotlin java.lang.AssertionError at org.junit.Assert.fail(Assert.java:86) at org.junit.Assert.assertTrue(Assert.java:41) at org.junit.Assert.assertTrue(Assert.java:52) at org.mozilla.focus.activity.robots.NotificationRobot.verifySystemNotificationExists(NotificationRobot.kt:49) at org.mozilla.focus.activity.SwitchContextTest$notificationOpenButtonTest$3.invoke(SwitchContextTest.kt:97) at org.mozilla.focus.activity.SwitchContextTest$notificationOpenButtonTest$3.invoke(SwitchContextTest.kt:96) at org.mozilla.focus.activity.robots.NotificationRobotKt.notificationTray(NotificationRobot.kt:94) at org.mozilla.focus.activity.SwitchContextTest.notificationOpenButtonTest(SwitchContextTest.kt:96) ``` ![image](https://user-images.githubusercontent.com/102331/153948579-c4c349e4-0224-4f42-b5f7-82616b24231d.png) @AndiAJ It looks like there are more default notifications completely filling up the Firebase Pixel 3 device all of a sudden. Clear all is supposed to clear the silent notifications which is called in the `setup`, but it didn't do anything here. Can you see if you can reproduce locally by filling up notifications and seeing why clear all isn't working here?
non_priority
intermittent ui test failure kotlin java lang assertionerror at org junit assert fail assert java at org junit assert asserttrue assert java at org junit assert asserttrue assert java at org mozilla focus activity robots notificationrobot verifysystemnotificationexists notificationrobot kt at org mozilla focus activity switchcontexttest notificationopenbuttontest invoke switchcontexttest kt at org mozilla focus activity switchcontexttest notificationopenbuttontest invoke switchcontexttest kt at org mozilla focus activity robots notificationrobotkt notificationtray notificationrobot kt at org mozilla focus activity switchcontexttest notificationopenbuttontest switchcontexttest kt andiaj it looks like there are more default notifications completely filling up the firebase pixel device all of a sudden clear all is supposed to clear the silent notifications which is called in the setup but it didn t do anything here can you see if you can reproduce locally by filling up notifications and seeing why clear all isn t working here
0
17,521
6,468,753,681
IssuesEvent
2017-08-17 02:28:10
istio/istio
https://api.github.com/repos/istio/istio
closed
pre submit keeps failing: investigate why it takes minutes for pod to be ready some times
bug build-cop debuggability e2e & integration
see #533 and many build failures after > 2mins of retry
1.0
pre submit keeps failing: investigate why it takes minutes for pod to be ready some times - see #533 and many build failures after > 2mins of retry
non_priority
pre submit keeps failing investigate why it takes minutes for pod to be ready some times see and many build failures after of retry
0
405,291
27,511,854,841
IssuesEvent
2023-03-06 09:22:05
keptn/lifecycle-toolkit
https://api.github.com/repos/keptn/lifecycle-toolkit
opened
Add Markdownlint-rule Max 1 Sentence Per Line
documentation enhancement question
## Description Having a consistent style for Markdown files helps contributors and maintainers. Currently, we're only checking for line length, but that doesn't mean it is easy to work with the documentation, moving around sentences etc. is hard with punctuation in the middle of a line, etc. ## Issue There is a markdown-lint rule, which limits the amount of sentences to max one per line - https://github.com/aepfli/markdownlint-rule-max-one-sentence-per-line as an example: ```markdown This is a markdown example where we are working with a certain line limit, specially with our currently configured one. This line limit is set to 120 and allows us for a limited line length. If this is suitabl or not is questionable, as we can easily use `soft-wrap` which is supported by any kind of tool. Hence that, why not focus more on one sentence per line. ``` and ```markdown This is a markdown example where we are working with a certain line limit, specially with our currently configured one. This line limit is set to 120 and allows us for a limited line-length. If this is suitabl or not is questionable, as we can easily use `soft-wrap` which is supported by any kind of tool. Hence that, why not focus more on one sentence per line. ``` are both the same when rendered. But the first one is easier to maintain, as you can rearrange the sentences easier. Note this rule those not enforce one sentence per line, it is maximum one sentence per line, which allows more specific breaking if needed and depending on the contributor. ## Proposal Usage of https://github.com/aepfli/markdownlint-rule-max-one-sentence-per-line ### Problems There is only one docker image containing this rule out of the box and it is within davidanson/markdownlint-cli2-rules:next hence that we would need to swap also to markdownlint-cli2 instead of markdownlint-cli. #### Possible problems with IDE Integrations It might be that eg. the VS code extension for markdownlint, does not like the new kind of configuration, because of the missing rule (it is in the docker image but not within the project) We should provide a functionality or a guide within our readme on how to handle this. - [ ] lets discuss this approach - [ ] how do we want to handle IDE integration, or do we want to do this afterwards?
1.0
Add Markdownlint-rule Max 1 Sentence Per Line - ## Description Having a consistent style for Markdown files helps contributors and maintainers. Currently, we're only checking for line length, but that doesn't mean it is easy to work with the documentation, moving around sentences etc. is hard with punctuation in the middle of a line, etc. ## Issue There is a markdown-lint rule, which limits the amount of sentences to max one per line - https://github.com/aepfli/markdownlint-rule-max-one-sentence-per-line as an example: ```markdown This is a markdown example where we are working with a certain line limit, specially with our currently configured one. This line limit is set to 120 and allows us for a limited line length. If this is suitabl or not is questionable, as we can easily use `soft-wrap` which is supported by any kind of tool. Hence that, why not focus more on one sentence per line. ``` and ```markdown This is a markdown example where we are working with a certain line limit, specially with our currently configured one. This line limit is set to 120 and allows us for a limited line-length. If this is suitabl or not is questionable, as we can easily use `soft-wrap` which is supported by any kind of tool. Hence that, why not focus more on one sentence per line. ``` are both the same when rendered. But the first one is easier to maintain, as you can rearrange the sentences easier. Note this rule those not enforce one sentence per line, it is maximum one sentence per line, which allows more specific breaking if needed and depending on the contributor. ## Proposal Usage of https://github.com/aepfli/markdownlint-rule-max-one-sentence-per-line ### Problems There is only one docker image containing this rule out of the box and it is within davidanson/markdownlint-cli2-rules:next hence that we would need to swap also to markdownlint-cli2 instead of markdownlint-cli. #### Possible problems with IDE Integrations It might be that eg. the VS code extension for markdownlint, does not like the new kind of configuration, because of the missing rule (it is in the docker image but not within the project) We should provide a functionality or a guide within our readme on how to handle this. - [ ] lets discuss this approach - [ ] how do we want to handle IDE integration, or do we want to do this afterwards?
non_priority
add markdownlint rule max sentence per line description having a consistent style for markdown files helps contributors and maintainers currently we re only checking for line length but that doesn t mean it is easy to work with the documentation moving around sentences etc is hard with punctuation in the middle of a line etc issue there is a markdown lint rule which limits the amount of sentences to max one per line as an example markdown this is a markdown example where we are working with a certain line limit specially with our currently configured one this line limit is set to and allows us for a limited line length if this is suitabl or not is questionable as we can easily use soft wrap which is supported by any kind of tool hence that why not focus more on one sentence per line and markdown this is a markdown example where we are working with a certain line limit specially with our currently configured one this line limit is set to and allows us for a limited line length if this is suitabl or not is questionable as we can easily use soft wrap which is supported by any kind of tool hence that why not focus more on one sentence per line are both the same when rendered but the first one is easier to maintain as you can rearrange the sentences easier note this rule those not enforce one sentence per line it is maximum one sentence per line which allows more specific breaking if needed and depending on the contributor proposal usage of problems there is only one docker image containing this rule out of the box and it is within davidanson markdownlint rules next hence that we would need to swap also to markdownlint instead of markdownlint cli possible problems with ide integrations it might be that eg the vs code extension for markdownlint does not like the new kind of configuration because of the missing rule it is in the docker image but not within the project we should provide a functionality or a guide within our readme on how to handle this lets discuss this approach how do we want to handle ide integration or do we want to do this afterwards
0
11,011
13,795,713,609
IssuesEvent
2020-10-09 18:30:35
unicode-org/icu4x
https://api.github.com/repos/unicode-org/icu4x
closed
Where to save generated data
C-process T-task
I would like to save the output of the data exporter tool (#200) such that the CLDR source files are not required when using ICU4X. Putting this directly into the ICU4X repo has some advantages: fewer moving parts, easy to make synchronous updates to code and data, etc. However, if we put it into the ICU4X repo, but that would mean a deep directory structure with volatile, generated data. I was thinking that a separate, independently versioned repo, called icu4x-data, might be more appropriate. In addition to keeping ICU4X as a pristine source of truth (without auto-generated clutter), it would make it easier to check in multiple types of generated data (e.g., JSON and Bincode for multiple CLDR versions). We could also use a branch of the ICU4X repo. Thoughts?
1.0
Where to save generated data - I would like to save the output of the data exporter tool (#200) such that the CLDR source files are not required when using ICU4X. Putting this directly into the ICU4X repo has some advantages: fewer moving parts, easy to make synchronous updates to code and data, etc. However, if we put it into the ICU4X repo, but that would mean a deep directory structure with volatile, generated data. I was thinking that a separate, independently versioned repo, called icu4x-data, might be more appropriate. In addition to keeping ICU4X as a pristine source of truth (without auto-generated clutter), it would make it easier to check in multiple types of generated data (e.g., JSON and Bincode for multiple CLDR versions). We could also use a branch of the ICU4X repo. Thoughts?
non_priority
where to save generated data i would like to save the output of the data exporter tool such that the cldr source files are not required when using putting this directly into the repo has some advantages fewer moving parts easy to make synchronous updates to code and data etc however if we put it into the repo but that would mean a deep directory structure with volatile generated data i was thinking that a separate independently versioned repo called data might be more appropriate in addition to keeping as a pristine source of truth without auto generated clutter it would make it easier to check in multiple types of generated data e g json and bincode for multiple cldr versions we could also use a branch of the repo thoughts
0
8,508
8,336,410,218
IssuesEvent
2018-09-28 07:42:54
kyma-project/kyma
https://api.github.com/repos/kyma-project/kyma
closed
[Remote Environment Broker] Issue Relist Request when EM is created/removed
area/service-catalog bug
**Description** In case of Remote Environment Broker working as a namespace broker, we should issue Relist request on creation/removal of Environment Mapping. Currently, we relist request only on changes to Remote Environments, what was ok in case of Cluster Service Broker. **Steps to reproduce** 1. Ensure that REB is working as a namespace broker 2. Create 2 Remote Environments 3. In the `testing` namespace, create 2 Environment Mapping to 2 RE created in the previous step, but do it with some time gap between registering EM **Expected result** 4. Classes from both RE are visible in the namespace **Actual result** 4. Classes only from the first RE are visible in the namespace. To see classes from the second RE, we have to manually increase RelistRequest for the ServiceBroker.
1.0
[Remote Environment Broker] Issue Relist Request when EM is created/removed - **Description** In case of Remote Environment Broker working as a namespace broker, we should issue Relist request on creation/removal of Environment Mapping. Currently, we relist request only on changes to Remote Environments, what was ok in case of Cluster Service Broker. **Steps to reproduce** 1. Ensure that REB is working as a namespace broker 2. Create 2 Remote Environments 3. In the `testing` namespace, create 2 Environment Mapping to 2 RE created in the previous step, but do it with some time gap between registering EM **Expected result** 4. Classes from both RE are visible in the namespace **Actual result** 4. Classes only from the first RE are visible in the namespace. To see classes from the second RE, we have to manually increase RelistRequest for the ServiceBroker.
non_priority
issue relist request when em is created removed description in case of remote environment broker working as a namespace broker we should issue relist request on creation removal of environment mapping currently we relist request only on changes to remote environments what was ok in case of cluster service broker steps to reproduce ensure that reb is working as a namespace broker create remote environments in the testing namespace create environment mapping to re created in the previous step but do it with some time gap between registering em expected result classes from both re are visible in the namespace actual result classes only from the first re are visible in the namespace to see classes from the second re we have to manually increase relistrequest for the servicebroker
0
27,653
11,525,095,997
IssuesEvent
2020-02-15 05:35:26
TrapTeamCCNZ/website
https://api.github.com/repos/TrapTeamCCNZ/website
opened
CVE-2019-11358 (Medium) detected in jquery-3.3.1.min.js
security vulnerability
## CVE-2019-11358 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-3.3.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/website/about.html</p> <p>Path to vulnerable library: /website/about.html</p> <p> Dependency Hierarchy: - :x: **jquery-3.3.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TrapTeamCCNZ/website/commit/df4cd067502ec4dc965766214531392cfeb2fa89">df4cd067502ec4dc965766214531392cfeb2fa89</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-11358 (Medium) detected in jquery-3.3.1.min.js - ## CVE-2019-11358 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-3.3.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/jquery.min.js</a></p> <p>Path to dependency file: /tmp/ws-scm/website/about.html</p> <p>Path to vulnerable library: /website/about.html</p> <p> Dependency Hierarchy: - :x: **jquery-3.3.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/TrapTeamCCNZ/website/commit/df4cd067502ec4dc965766214531392cfeb2fa89">df4cd067502ec4dc965766214531392cfeb2fa89</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype. <p>Publish Date: 2019-04-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-11358>CVE-2019-11358</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11358</a></p> <p>Release Date: 2019-04-20</p> <p>Fix Resolution: 3.4.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file tmp ws scm website about html path to vulnerable library website about html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details jquery before as used in drupal backdrop cms and other products mishandles jquery extend true because of object prototype pollution if an unsanitized source object contained an enumerable proto property it could extend the native object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
4,923
3,479,632,981
IssuesEvent
2015-12-28 21:49:58
AlexIIL/Buildcraft_1.8_Issues
https://api.github.com/repos/AlexIIL/Buildcraft_1.8_Issues
closed
Crash when breaking block without breaking particle icon with a filler (probably a builder too)
help wanted not buildcraft
http://paste.ee/p/cW89A To reproduce, remove a chest with a filler
1.0
Crash when breaking block without breaking particle icon with a filler (probably a builder too) - http://paste.ee/p/cW89A To reproduce, remove a chest with a filler
non_priority
crash when breaking block without breaking particle icon with a filler probably a builder too to reproduce remove a chest with a filler
0
25,347
6,654,061,014
IssuesEvent
2017-09-29 11:04:37
Porucznik/Nexia-Home
https://api.github.com/repos/Porucznik/Nexia-Home
closed
Correct code formating
code refactor
We should correct code formating, in current state is too illegible (lines are too long). Maybe use PEP-8 code guilde (80 lines for code, 72 comments, tabs as spaces, 4 spaces long).
1.0
Correct code formating - We should correct code formating, in current state is too illegible (lines are too long). Maybe use PEP-8 code guilde (80 lines for code, 72 comments, tabs as spaces, 4 spaces long).
non_priority
correct code formating we should correct code formating in current state is too illegible lines are too long maybe use pep code guilde lines for code comments tabs as spaces spaces long
0
241,273
18,440,285,864
IssuesEvent
2021-10-14 17:12:56
ICEI-PUC-Minas-PMV-ADS/pmv-ads-2021-2-e1-proj-web-t4-projeto-mundo-sem-fronteiras
https://api.github.com/repos/ICEI-PUC-Minas-PMV-ADS/pmv-ads-2021-2-e1-proj-web-t4-projeto-mundo-sem-fronteiras
closed
Especificação do Projeto - Personas e Histórias de Usuários
documentation
Identificação do grupo de pessoas a qual o sistema será útil e quais desejos os usuários têm em relação a solução que será prestada.
1.0
Especificação do Projeto - Personas e Histórias de Usuários - Identificação do grupo de pessoas a qual o sistema será útil e quais desejos os usuários têm em relação a solução que será prestada.
non_priority
especificação do projeto personas e histórias de usuários identificação do grupo de pessoas a qual o sistema será útil e quais desejos os usuários têm em relação a solução que será prestada
0
453,002
32,077,781,131
IssuesEvent
2023-09-25 12:11:12
kyma-project/community
https://api.github.com/repos/kyma-project/community
reopened
Review and update /docs/guidelines/releases-guidelines
area/documentation area/tooling
**Description** After enabling Markdown Link Check GitHub Action, some links in the [release guidelines](https://github.com/kyma-project/community/tree/main/docs/guidelines/releases-guidelines), occurred to break. Investigating broken links proved that in order to fix the links, the documents in the directory require review and update first. TWs and Neighbors, let's join forces and update the release documentation. **Area** - infrastructure - documentation **Reasons** <!-- Explain why we should improve the document. --> **Assignees** @kyma-project/technical-writers **Attachments** <!-- Attach any files, links, code samples, or screenshots that will convince us to your idea. -->
1.0
Review and update /docs/guidelines/releases-guidelines - **Description** After enabling Markdown Link Check GitHub Action, some links in the [release guidelines](https://github.com/kyma-project/community/tree/main/docs/guidelines/releases-guidelines), occurred to break. Investigating broken links proved that in order to fix the links, the documents in the directory require review and update first. TWs and Neighbors, let's join forces and update the release documentation. **Area** - infrastructure - documentation **Reasons** <!-- Explain why we should improve the document. --> **Assignees** @kyma-project/technical-writers **Attachments** <!-- Attach any files, links, code samples, or screenshots that will convince us to your idea. -->
non_priority
review and update docs guidelines releases guidelines description after enabling markdown link check github action some links in the occurred to break investigating broken links proved that in order to fix the links the documents in the directory require review and update first tws and neighbors let s join forces and update the release documentation area infrastructure documentation reasons assignees kyma project technical writers attachments
0
5,976
6,076,747,133
IssuesEvent
2017-06-16 00:31:43
sindresorhus/refined-github
https://api.github.com/repos/sindresorhus/refined-github
opened
Use Promised `browser.*` APIs
firefox infrastructure under discussion
Firefox copied Chrome's extensions API, renamed `chrome.*` to `browser.*` and made them Promised. Do you think it's worthwhile to use a `browser.*` polyfill like [mozilla/webextension-polyfill](https://github.com/mozilla/webextension-polyfill) so we can leave callback APIs (and the awful `chrome.runtime.lastError`) in the dust? I'm guessing that the polyfill also works with unsupported APIs like `chrome.permissions.*`
1.0
Use Promised `browser.*` APIs - Firefox copied Chrome's extensions API, renamed `chrome.*` to `browser.*` and made them Promised. Do you think it's worthwhile to use a `browser.*` polyfill like [mozilla/webextension-polyfill](https://github.com/mozilla/webextension-polyfill) so we can leave callback APIs (and the awful `chrome.runtime.lastError`) in the dust? I'm guessing that the polyfill also works with unsupported APIs like `chrome.permissions.*`
non_priority
use promised browser apis firefox copied chrome s extensions api renamed chrome to browser and made them promised do you think it s worthwhile to use a browser polyfill like so we can leave callback apis and the awful chrome runtime lasterror in the dust i m guessing that the polyfill also works with unsupported apis like chrome permissions
0
2,078
11,355,895,328
IssuesEvent
2020-01-24 21:11:41
kedacore/keda-scaler-durable-functions
https://api.github.com/repos/kedacore/keda-scaler-durable-functions
opened
Update Azure Functions Core Tools
Need to investigate automation enhancement
As a developer, I'd like to update Azure Functions Core Tools template. Currently, the `func kubernetes` command doesn't generate correct YAML file. Once this project is approved, It should be updated to fit this project. ## Success Criteria - [ ] Azure Functions Core Tools https://github.com/Azure/azure-functions-core-tools behavior should be updated for using this project - [ ] Document is property updated for Azure Functions Core Tools repo - [ ] Document (Getting Started) is property updated.
1.0
Update Azure Functions Core Tools - As a developer, I'd like to update Azure Functions Core Tools template. Currently, the `func kubernetes` command doesn't generate correct YAML file. Once this project is approved, It should be updated to fit this project. ## Success Criteria - [ ] Azure Functions Core Tools https://github.com/Azure/azure-functions-core-tools behavior should be updated for using this project - [ ] Document is property updated for Azure Functions Core Tools repo - [ ] Document (Getting Started) is property updated.
non_priority
update azure functions core tools as a developer i d like to update azure functions core tools template currently the func kubernetes command doesn t generate correct yaml file once this project is approved it should be updated to fit this project success criteria azure functions core tools behavior should be updated for using this project document is property updated for azure functions core tools repo document getting started is property updated
0
158,742
24,890,394,873
IssuesEvent
2022-10-28 11:28:38
react-hook-form/react-hook-form
https://api.github.com/repos/react-hook-form/react-hook-form
closed
issue: FieldErrors can't handle union type
duplicated design limitation
### Version Number 7.38.0 ### Codesandbox/Expo snack https://codesandbox.io/s/nostalgic-butterfly-j84vtt?file=/src/App.tsx ### Steps to reproduce 1. Create a form with a union type. The types used in the union should have a property not in common 2. When trying to access to errors.property, typescript is not happy ### Expected behaviour The errors object should have the same shape as the FormValues, so in case of union type, we could use a type predicate to correctly infer the type With ``` type Foo = { id: 1; foo: string; }; type Bar = { id: 2; bar: string; } type Form = Foo | Bar; ``` We should be able to do: ``` function isFoo(foobar: Foo | Bar): foobar is Foo { return foobar.foo !== undefined; } if (isFoo(errors)) { errors.foo // OK } ``` ### What browsers are you seeing the problem on? Chrome ### Relevant log output _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
1.0
issue: FieldErrors can't handle union type - ### Version Number 7.38.0 ### Codesandbox/Expo snack https://codesandbox.io/s/nostalgic-butterfly-j84vtt?file=/src/App.tsx ### Steps to reproduce 1. Create a form with a union type. The types used in the union should have a property not in common 2. When trying to access to errors.property, typescript is not happy ### Expected behaviour The errors object should have the same shape as the FormValues, so in case of union type, we could use a type predicate to correctly infer the type With ``` type Foo = { id: 1; foo: string; }; type Bar = { id: 2; bar: string; } type Form = Foo | Bar; ``` We should be able to do: ``` function isFoo(foobar: Foo | Bar): foobar is Foo { return foobar.foo !== undefined; } if (isFoo(errors)) { errors.foo // OK } ``` ### What browsers are you seeing the problem on? Chrome ### Relevant log output _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
non_priority
issue fielderrors can t handle union type version number codesandbox expo snack steps to reproduce create a form with a union type the types used in the union should have a property not in common when trying to access to errors property typescript is not happy expected behaviour the errors object should have the same shape as the formvalues so in case of union type we could use a type predicate to correctly infer the type with type foo id foo string type bar id bar string type form foo bar we should be able to do function isfoo foobar foo bar foobar is foo return foobar foo undefined if isfoo errors errors foo ok what browsers are you seeing the problem on chrome relevant log output no response code of conduct i agree to follow this project s code of conduct
0
277,510
30,659,279,463
IssuesEvent
2023-07-25 14:04:33
rsoreq/zenbot
https://api.github.com/repos/rsoreq/zenbot
closed
CVE-2020-13822 (High) detected in elliptic-6.5.0.tgz - autoclosed
Mend: dependency security vulnerability
## CVE-2020-13822 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.0.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz</a></p> <p> Dependency Hierarchy: - webpack-4.44.1.tgz (Root Library) - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rsoreq/zenbot/commit/7a24c0d7b98ee76e6bac827974cff490a7694378">7a24c0d7b98ee76e6bac827974cff490a7694378</a></p> <p>Found in base branch: <b>unstable</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. <p>Publish Date: 2020-06-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-13822>CVE-2020-13822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-07-02</p> <p>Fix Resolution (elliptic): 6.5.3</p> <p>Direct dependency fix Resolution (webpack): 4.44.2</p> </p> </details> <p></p>
True
CVE-2020-13822 (High) detected in elliptic-6.5.0.tgz - autoclosed - ## CVE-2020-13822 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>elliptic-6.5.0.tgz</b></p></summary> <p>EC cryptography</p> <p>Library home page: <a href="https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz">https://registry.npmjs.org/elliptic/-/elliptic-6.5.0.tgz</a></p> <p> Dependency Hierarchy: - webpack-4.44.1.tgz (Root Library) - node-libs-browser-2.2.1.tgz - crypto-browserify-3.12.0.tgz - create-ecdh-4.0.3.tgz - :x: **elliptic-6.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/rsoreq/zenbot/commit/7a24c0d7b98ee76e6bac827974cff490a7694378">7a24c0d7b98ee76e6bac827974cff490a7694378</a></p> <p>Found in base branch: <b>unstable</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The Elliptic package 6.5.2 for Node.js allows ECDSA signature malleability via variations in encoding, leading '\0' bytes, or integer overflows. This could conceivably have a security-relevant impact if an application relied on a single canonical signature. <p>Publish Date: 2020-06-04 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-13822>CVE-2020-13822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-07-02</p> <p>Fix Resolution (elliptic): 6.5.3</p> <p>Direct dependency fix Resolution (webpack): 4.44.2</p> </p> </details> <p></p>
non_priority
cve high detected in elliptic tgz autoclosed cve high severity vulnerability vulnerable library elliptic tgz ec cryptography library home page a href dependency hierarchy webpack tgz root library node libs browser tgz crypto browserify tgz create ecdh tgz x elliptic tgz vulnerable library found in head commit a href found in base branch unstable vulnerability details the elliptic package for node js allows ecdsa signature malleability via variations in encoding leading bytes or integer overflows this could conceivably have a security relevant impact if an application relied on a single canonical signature publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution elliptic direct dependency fix resolution webpack
0
86,727
10,791,130,782
IssuesEvent
2019-11-05 16:07:12
aragon/aragon
https://api.github.com/repos/aragon/aragon
closed
Interpreting custom radspec for intent baskets / accumulators
abandoned design: request ux
## Context In instances where we are able to use calls scripts to do multiple actions, e.g. upgrade an entire organization's applications to their latest versions, we often need to use custom radspec descriptors to make the final intent clear and understandable for users. For the 0.7 single-transaction upgrade, we've gone with the following descriptors: *Client (short) description*: <img width="302" alt="Screen Shot 2019-04-17 at 7 58 05 PM" src="https://user-images.githubusercontent.com/4166642/56310256-b9410b80-614b-11e9-8d40-901cf8373d9c.png"> *Voting app (full) description*: <img width="400" alt="Screen Shot 2019-04-17 at 7 58 10 PM" src="https://user-images.githubusercontent.com/4166642/56310258-bba36580-614b-11e9-8c67-4207b6eaa9c9.png"> -------------- **However**, it would be nice if we used the same description across all areas of the app. One idea is to make these descriptions expandable, so that we could always use the short description but on hover (like a tooltip) or click it displays the full, literal description.
1.0
Interpreting custom radspec for intent baskets / accumulators - ## Context In instances where we are able to use calls scripts to do multiple actions, e.g. upgrade an entire organization's applications to their latest versions, we often need to use custom radspec descriptors to make the final intent clear and understandable for users. For the 0.7 single-transaction upgrade, we've gone with the following descriptors: *Client (short) description*: <img width="302" alt="Screen Shot 2019-04-17 at 7 58 05 PM" src="https://user-images.githubusercontent.com/4166642/56310256-b9410b80-614b-11e9-8d40-901cf8373d9c.png"> *Voting app (full) description*: <img width="400" alt="Screen Shot 2019-04-17 at 7 58 10 PM" src="https://user-images.githubusercontent.com/4166642/56310258-bba36580-614b-11e9-8c67-4207b6eaa9c9.png"> -------------- **However**, it would be nice if we used the same description across all areas of the app. One idea is to make these descriptions expandable, so that we could always use the short description but on hover (like a tooltip) or click it displays the full, literal description.
non_priority
interpreting custom radspec for intent baskets accumulators context in instances where we are able to use calls scripts to do multiple actions e g upgrade an entire organization s applications to their latest versions we often need to use custom radspec descriptors to make the final intent clear and understandable for users for the single transaction upgrade we ve gone with the following descriptors client short description img width alt screen shot at pm src voting app full description img width alt screen shot at pm src however it would be nice if we used the same description across all areas of the app one idea is to make these descriptions expandable so that we could always use the short description but on hover like a tooltip or click it displays the full literal description
0
327,842
28,084,791,601
IssuesEvent
2023-03-30 09:04:07
ansible/ansible
https://api.github.com/repos/ansible/ansible
closed
ansible-test sanity expects all modules to be licensed under the GPLv3
python3 test support:core bug affects_2.9 bot_closed
##### SUMMARY Running `ansible-test sanity --test validate-modules` in a collection that is not licensed under the GPLv3 produces the following error: ``` Running sanity test 'validate-modules' with Python 3.7 ERROR: Found 1 validate-modules issue(s) which need to be resolved: ERROR: plugins/modules/marker.py:0:0: missing-gplv3-license: GPLv3 license header not found in the first 20 lines of the module See documentation for help: https://docs.ansible.com/ansible/2.9/dev_guide/testing/sanity/validate-modules.html ERROR: The 1 sanity test(s) listed below (out of 1) failed. See error output above for details. validate-modules ``` ##### ISSUE TYPE - ~Bug Report~ - Feature Idea ##### COMPONENT NAME ansible-test ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below ansible 2.9.4 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/tadej/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /home/tadej/xlab/steampunk/circleci/venv/lib64/python3.7/site-packages/ansible executable location = /home/tadej/xlab/steampunk/circleci/venv/bin/ansible python version = 3.7.6 (default, Dec 19 2019, 22:52:49) [GCC 9.2.1 20190827 (Red Hat 9.2.1-1)] ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below COLLECTIONS_PATHS(env: ANSIBLE_COLLECTIONS_PATHS) = ['/home/tadej/xlab/steampunk/circleci/molecule-tests'] ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> Commands are being executed on latest stable Fedora (31). ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> Just run the `ansible-test sanity --test validate-modules` command against the module that does not have a GPLv3 header (but it does have another valid license header). ##### WORKAROUND Placing the `plugins/modules validate-modules:missing-gplv3-license` line into the *tests/sanity/ignore-2.9.txt* silences this check.
1.0
ansible-test sanity expects all modules to be licensed under the GPLv3 - ##### SUMMARY Running `ansible-test sanity --test validate-modules` in a collection that is not licensed under the GPLv3 produces the following error: ``` Running sanity test 'validate-modules' with Python 3.7 ERROR: Found 1 validate-modules issue(s) which need to be resolved: ERROR: plugins/modules/marker.py:0:0: missing-gplv3-license: GPLv3 license header not found in the first 20 lines of the module See documentation for help: https://docs.ansible.com/ansible/2.9/dev_guide/testing/sanity/validate-modules.html ERROR: The 1 sanity test(s) listed below (out of 1) failed. See error output above for details. validate-modules ``` ##### ISSUE TYPE - ~Bug Report~ - Feature Idea ##### COMPONENT NAME ansible-test ##### ANSIBLE VERSION <!--- Paste verbatim output from "ansible --version" between quotes --> ```paste below ansible 2.9.4 config file = /etc/ansible/ansible.cfg configured module search path = ['/home/tadej/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /home/tadej/xlab/steampunk/circleci/venv/lib64/python3.7/site-packages/ansible executable location = /home/tadej/xlab/steampunk/circleci/venv/bin/ansible python version = 3.7.6 (default, Dec 19 2019, 22:52:49) [GCC 9.2.1 20190827 (Red Hat 9.2.1-1)] ``` ##### CONFIGURATION <!--- Paste verbatim output from "ansible-config dump --only-changed" between quotes --> ```paste below COLLECTIONS_PATHS(env: ANSIBLE_COLLECTIONS_PATHS) = ['/home/tadej/xlab/steampunk/circleci/molecule-tests'] ``` ##### OS / ENVIRONMENT <!--- Provide all relevant information below, e.g. target OS versions, network device firmware, etc. --> Commands are being executed on latest stable Fedora (31). ##### STEPS TO REPRODUCE <!--- Describe exactly how to reproduce the problem, using a minimal test-case --> Just run the `ansible-test sanity --test validate-modules` command against the module that does not have a GPLv3 header (but it does have another valid license header). ##### WORKAROUND Placing the `plugins/modules validate-modules:missing-gplv3-license` line into the *tests/sanity/ignore-2.9.txt* silences this check.
non_priority
ansible test sanity expects all modules to be licensed under the summary running ansible test sanity test validate modules in a collection that is not licensed under the produces the following error running sanity test validate modules with python error found validate modules issue s which need to be resolved error plugins modules marker py missing license license header not found in the first lines of the module see documentation for help error the sanity test s listed below out of failed see error output above for details validate modules issue type bug report feature idea component name ansible test ansible version paste below ansible config file etc ansible ansible cfg configured module search path ansible python module location home tadej xlab steampunk circleci venv site packages ansible executable location home tadej xlab steampunk circleci venv bin ansible python version default dec configuration paste below collections paths env ansible collections paths os environment commands are being executed on latest stable fedora steps to reproduce just run the ansible test sanity test validate modules command against the module that does not have a header but it does have another valid license header workaround placing the plugins modules validate modules missing license line into the tests sanity ignore txt silences this check
0
4,855
3,897,123,431
IssuesEvent
2016-04-16 07:02:03
lionheart/openradar-mirror
https://api.github.com/repos/lionheart/openradar-mirror
opened
15885970: The location of the "next keyboard" button is inconsistent
classification:usability reproducible:always status:open
#### Description Summary: The “next keyboard“ button on the Emoji keyboard is located in the lower left corner, but on the English or German iOS keyboard the "123" button is located at this point and the "next keyboard" button moved to the right of it (I don't know if the location of the "next keyboard" button differs on any other than the Emoji keyboard, but I guess most of us use that one often enough to get confused). This behavior leads to unwanted touches of the "123" keyboard, especially because the button switches to the last or most recently used keyboard and thus the order of the keyboards changes and you can only guess if the Emoji or another keyboard is going to show up. As this button is in need on every iOS keyboard, it should stay at the same point to provide maximum usability. Steps to Reproduce: Use minimum one standard and the Emoji keyboard. Change the keyboards with the "next keyboard" button in the lower left corner. Get confused when you want to change the keyboard back and the button moved to the right of the "123" button. Expected Results: I would like the "next keyboard" button to stay in place. Actual Results: The "next keyboard" button moves to the right of the "123" button on the Emoji keyboard. Version: iOS 7 - Product Version: 7 Created: 2014-01-22T23:35:51.453971 Originated: 2014-01-23T00:00:00 Open Radar Link: http://www.openradar.me/15885970
True
15885970: The location of the "next keyboard" button is inconsistent - #### Description Summary: The “next keyboard“ button on the Emoji keyboard is located in the lower left corner, but on the English or German iOS keyboard the "123" button is located at this point and the "next keyboard" button moved to the right of it (I don't know if the location of the "next keyboard" button differs on any other than the Emoji keyboard, but I guess most of us use that one often enough to get confused). This behavior leads to unwanted touches of the "123" keyboard, especially because the button switches to the last or most recently used keyboard and thus the order of the keyboards changes and you can only guess if the Emoji or another keyboard is going to show up. As this button is in need on every iOS keyboard, it should stay at the same point to provide maximum usability. Steps to Reproduce: Use minimum one standard and the Emoji keyboard. Change the keyboards with the "next keyboard" button in the lower left corner. Get confused when you want to change the keyboard back and the button moved to the right of the "123" button. Expected Results: I would like the "next keyboard" button to stay in place. Actual Results: The "next keyboard" button moves to the right of the "123" button on the Emoji keyboard. Version: iOS 7 - Product Version: 7 Created: 2014-01-22T23:35:51.453971 Originated: 2014-01-23T00:00:00 Open Radar Link: http://www.openradar.me/15885970
non_priority
the location of the next keyboard button is inconsistent description summary the “next keyboard“ button on the emoji keyboard is located in the lower left corner but on the english or german ios keyboard the button is located at this point and the next keyboard button moved to the right of it i don t know if the location of the next keyboard button differs on any other than the emoji keyboard but i guess most of us use that one often enough to get confused this behavior leads to unwanted touches of the keyboard especially because the button switches to the last or most recently used keyboard and thus the order of the keyboards changes and you can only guess if the emoji or another keyboard is going to show up as this button is in need on every ios keyboard it should stay at the same point to provide maximum usability steps to reproduce use minimum one standard and the emoji keyboard change the keyboards with the next keyboard button in the lower left corner get confused when you want to change the keyboard back and the button moved to the right of the button expected results i would like the next keyboard button to stay in place actual results the next keyboard button moves to the right of the button on the emoji keyboard version ios product version created originated open radar link
0
12,997
8,758,386,284
IssuesEvent
2018-12-15 03:14:18
GillesCrebassa/FinancialManager
https://api.github.com/repos/GillesCrebassa/FinancialManager
opened
CVE-2015-8860 High Severity Vulnerability detected by WhiteSource
security vulnerability
## CVE-2015-8860 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-0.1.20.tgz</b></p></summary> <p>tar for node</p> <p>path: /tmp/git/FinancialManager/web/assets/vendors/morris.js/node_modules/tar/package.json,/FinancialManager/web/assets/vendors/switchery/node_modules/tar/package.json</p> <p> <p>Library home page: <a href=http://registry.npmjs.org/tar/-/tar-0.1.20.tgz>http://registry.npmjs.org/tar/-/tar-0.1.20.tgz</a></p> Dependency Hierarchy: - :x: **tar-0.1.20.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive. <p>Publish Date: 2017-01-23 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8860>CVE-2015-8860</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/npm/node-tar/commit/a5337a6cd58a2d800fc03b3781a25751cf459f28">https://github.com/npm/node-tar/commit/a5337a6cd58a2d800fc03b3781a25751cf459f28</a></p> <p>Release Date: 2015-03-27</p> <p>Fix Resolution: Replace or update the following files: extract.js, dir-normalization.tar, dir-normalization.js</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2015-8860 High Severity Vulnerability detected by WhiteSource - ## CVE-2015-8860 - High Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-0.1.20.tgz</b></p></summary> <p>tar for node</p> <p>path: /tmp/git/FinancialManager/web/assets/vendors/morris.js/node_modules/tar/package.json,/FinancialManager/web/assets/vendors/switchery/node_modules/tar/package.json</p> <p> <p>Library home page: <a href=http://registry.npmjs.org/tar/-/tar-0.1.20.tgz>http://registry.npmjs.org/tar/-/tar-0.1.20.tgz</a></p> Dependency Hierarchy: - :x: **tar-0.1.20.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The tar package before 2.0.0 for Node.js allows remote attackers to write to arbitrary files via a symlink attack in an archive. <p>Publish Date: 2017-01-23 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8860>CVE-2015-8860</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/npm/node-tar/commit/a5337a6cd58a2d800fc03b3781a25751cf459f28">https://github.com/npm/node-tar/commit/a5337a6cd58a2d800fc03b3781a25751cf459f28</a></p> <p>Release Date: 2015-03-27</p> <p>Fix Resolution: Replace or update the following files: extract.js, dir-normalization.tar, dir-normalization.js</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high severity vulnerability detected by whitesource cve high severity vulnerability vulnerable library tar tgz tar for node path tmp git financialmanager web assets vendors morris js node modules tar package json financialmanager web assets vendors switchery node modules tar package json library home page a href dependency hierarchy x tar tgz vulnerable library vulnerability details the tar package before for node js allows remote attackers to write to arbitrary files via a symlink attack in an archive publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type change files origin a href release date fix resolution replace or update the following files extract js dir normalization tar dir normalization js step up your open source security game with whitesource
0
4,779
3,081,460,343
IssuesEvent
2015-08-22 19:01:54
PSMGGamesSS2015/PSMG_SS_2015_RTS_GameGroup
https://api.github.com/repos/PSMGGamesSS2015/PSMG_SS_2015_RTS_GameGroup
closed
Einsammeln von Objekten Fade-Out
code Product Backlog Normal Prio unity
z.B. Blinken von Icon, +-Symbol oder weiches Fade-Out bei verschwinden der Objekte
1.0
Einsammeln von Objekten Fade-Out - z.B. Blinken von Icon, +-Symbol oder weiches Fade-Out bei verschwinden der Objekte
non_priority
einsammeln von objekten fade out z b blinken von icon symbol oder weiches fade out bei verschwinden der objekte
0
12,827
9,793,569,927
IssuesEvent
2019-06-10 20:17:50
terraform-providers/terraform-provider-aws
https://api.github.com/repos/terraform-providers/terraform-provider-aws
closed
Include ability to request headers with ses_identity_notification_topic
enhancement service/ses
[ses_identity_notification_topic](https://www.terraform.io/docs/providers/aws/r/ses_identity_notification_topic.html) does not appear to offer the ability to request headers with notifications. This functionality is presented in the web console as: ![image](https://user-images.githubusercontent.com/900469/39350656-24fc967c-4a42-11e8-961f-1d2255d0434e.png) And is available via the AWS cli command [`aws ses set-identity-headers-in-notifications-enabled`](https://docs.aws.amazon.com/cli/latest/reference/ses/set-identity-headers-in-notifications-enabled.html) (unfortunately it's not part of [`set-identity-notification-topic`](https://docs.aws.amazon.com/cli/latest/reference/ses/set-identity-notification-topic.html) which might be why it didn't make it into Terraform!) Is this possible?
1.0
Include ability to request headers with ses_identity_notification_topic - [ses_identity_notification_topic](https://www.terraform.io/docs/providers/aws/r/ses_identity_notification_topic.html) does not appear to offer the ability to request headers with notifications. This functionality is presented in the web console as: ![image](https://user-images.githubusercontent.com/900469/39350656-24fc967c-4a42-11e8-961f-1d2255d0434e.png) And is available via the AWS cli command [`aws ses set-identity-headers-in-notifications-enabled`](https://docs.aws.amazon.com/cli/latest/reference/ses/set-identity-headers-in-notifications-enabled.html) (unfortunately it's not part of [`set-identity-notification-topic`](https://docs.aws.amazon.com/cli/latest/reference/ses/set-identity-notification-topic.html) which might be why it didn't make it into Terraform!) Is this possible?
non_priority
include ability to request headers with ses identity notification topic does not appear to offer the ability to request headers with notifications this functionality is presented in the web console as and is available via the aws cli command unfortunately it s not part of which might be why it didn t make it into terraform is this possible
0
8,963
12,069,463,017
IssuesEvent
2020-04-16 16:05:58
ORNL-AMO/AMO-Tools-Desktop
https://api.github.com/repos/ORNL-AMO/AMO-Tools-Desktop
closed
Explore Opps + Report
Fans Process Heating Pumps Steam enhancement
Need to report which “Assessment” modifications are checked, and echo the input parameters for each modification, i.e. “Install VFD”, “more efficient fan”, etc. - koa - @rmroot can we do this? what about assessments made in expert view? if we do it here we should do with with other assessments also Could we use something like the Select Scenario page + the checkboxes from Explore Opps? ![image.png](https://images.zenhubusercontent.com/5cd48a2af8cffa5a19122d27/5c27240a-97e2-4462-ae00-4e4ec7590e86)
1.0
Explore Opps + Report - Need to report which “Assessment” modifications are checked, and echo the input parameters for each modification, i.e. “Install VFD”, “more efficient fan”, etc. - koa - @rmroot can we do this? what about assessments made in expert view? if we do it here we should do with with other assessments also Could we use something like the Select Scenario page + the checkboxes from Explore Opps? ![image.png](https://images.zenhubusercontent.com/5cd48a2af8cffa5a19122d27/5c27240a-97e2-4462-ae00-4e4ec7590e86)
non_priority
explore opps report need to report which “assessment” modifications are checked and echo the input parameters for each modification i e “install vfd” “more efficient fan” etc koa rmroot can we do this what about assessments made in expert view if we do it here we should do with with other assessments also could we use something like the select scenario page the checkboxes from explore opps
0
178,800
14,679,590,200
IssuesEvent
2020-12-31 07:25:34
rasatmaja/links-barnacle
https://api.github.com/repos/rasatmaja/links-barnacle
closed
Add logging on repository, cors, and server
documentation
# **Add logging on repository, cors, and server** **Issue type** : - [x] 🤴 Code style update (formatting, renaming) - [x] 🏇🏼 Refactoring (no functional changes, no api changes)
1.0
Add logging on repository, cors, and server - # **Add logging on repository, cors, and server** **Issue type** : - [x] 🤴 Code style update (formatting, renaming) - [x] 🏇🏼 Refactoring (no functional changes, no api changes)
non_priority
add logging on repository cors and server add logging on repository cors and server issue type 🤴 code style update formatting renaming 🏇🏼 refactoring no functional changes no api changes
0
390,261
26,855,675,996
IssuesEvent
2023-02-03 14:27:12
geta-org/sex-adapt-backend
https://api.github.com/repos/geta-org/sex-adapt-backend
closed
Backend | Documento com as informações sobre o deploy
documentation question
Top 5 plataformas e seus custo beneficios
1.0
Backend | Documento com as informações sobre o deploy - Top 5 plataformas e seus custo beneficios
non_priority
backend documento com as informações sobre o deploy top plataformas e seus custo beneficios
0
183,909
14,962,622,006
IssuesEvent
2021-01-27 09:30:52
cqfn/diKTat
https://api.github.com/repos/cqfn/diKTat
closed
Add warning to suggest to use inline classes when a class has single property
documentation enhancement
https://kotlinlang.org/docs/reference/inline-classes.html However, only since 1.3. Maybe needs some more considerations.
1.0
Add warning to suggest to use inline classes when a class has single property - https://kotlinlang.org/docs/reference/inline-classes.html However, only since 1.3. Maybe needs some more considerations.
non_priority
add warning to suggest to use inline classes when a class has single property however only since maybe needs some more considerations
0
223,846
17,142,489,674
IssuesEvent
2021-07-13 11:12:25
oladhari/e-commerce
https://api.github.com/repos/oladhari/e-commerce
opened
RoadMap: ecommerce
documentation
TODO before deployment: ## frontend - [ ] add page Product list with categories - [ ] add a category page - [ ] add the cart page - [ ] add the payment page ## backend - [ ] add the models related to products, and cart - [ ] create a related API - [ ] connect the API with the fronted ## deployment - [ ] dockerize the whole application - [ ] use Kubernetes for containers - [ ] connect media and static files to cloud storage (Google or Amazon) - [ ] deploy to google cloud or AWS (check the free options)
1.0
RoadMap: ecommerce - TODO before deployment: ## frontend - [ ] add page Product list with categories - [ ] add a category page - [ ] add the cart page - [ ] add the payment page ## backend - [ ] add the models related to products, and cart - [ ] create a related API - [ ] connect the API with the fronted ## deployment - [ ] dockerize the whole application - [ ] use Kubernetes for containers - [ ] connect media and static files to cloud storage (Google or Amazon) - [ ] deploy to google cloud or AWS (check the free options)
non_priority
roadmap ecommerce todo before deployment frontend add page product list with categories add a category page add the cart page add the payment page backend add the models related to products and cart create a related api connect the api with the fronted deployment dockerize the whole application use kubernetes for containers connect media and static files to cloud storage google or amazon deploy to google cloud or aws check the free options
0
304,264
23,057,556,291
IssuesEvent
2022-07-25 06:50:09
scalameta/metals
https://api.github.com/repos/scalameta/metals
closed
Add a section to the docs that show all code actions
documentation
There isn't currently a great way to know what code actions exist in Metals apart from looking in the source. I think it'd be a great idea to have a small section in the docs highlighting the code actions that Metals supports. As we continue to add in more refactoring related actions, it may be wise to have a centralized place to show those. It seems to be a somewhat common questions asked of Metals, _What refactoring support does Metals have?_
1.0
Add a section to the docs that show all code actions - There isn't currently a great way to know what code actions exist in Metals apart from looking in the source. I think it'd be a great idea to have a small section in the docs highlighting the code actions that Metals supports. As we continue to add in more refactoring related actions, it may be wise to have a centralized place to show those. It seems to be a somewhat common questions asked of Metals, _What refactoring support does Metals have?_
non_priority
add a section to the docs that show all code actions there isn t currently a great way to know what code actions exist in metals apart from looking in the source i think it d be a great idea to have a small section in the docs highlighting the code actions that metals supports as we continue to add in more refactoring related actions it may be wise to have a centralized place to show those it seems to be a somewhat common questions asked of metals what refactoring support does metals have
0
57,575
7,079,080,331
IssuesEvent
2018-01-10 08:03:06
BSData/wh40k
https://api.github.com/repos/BSData/wh40k
closed
[Anon] Bug report: Imperium - Adeptus Mechanicus.catz
Bug - text/rule/profile Imperium - Adeptus Mechanicus Resolution - by design
**File:** Imperium - Adeptus Mechanicus.catz **BattleScribe version:** 2.01.13 **Platform:** Android **Dropbox:** No **Description:** In v23 admech of v1.1.11 of wh40k the onegar dunecrawler will only show 1 cognise stubber if it's selected in addition to the neutron laser / stubber combo. It should show HEAVY 6 for the weapon type not HEAVY 3.
1.0
[Anon] Bug report: Imperium - Adeptus Mechanicus.catz - **File:** Imperium - Adeptus Mechanicus.catz **BattleScribe version:** 2.01.13 **Platform:** Android **Dropbox:** No **Description:** In v23 admech of v1.1.11 of wh40k the onegar dunecrawler will only show 1 cognise stubber if it's selected in addition to the neutron laser / stubber combo. It should show HEAVY 6 for the weapon type not HEAVY 3.
non_priority
bug report imperium adeptus mechanicus catz file imperium adeptus mechanicus catz battlescribe version platform android dropbox no description in admech of of the onegar dunecrawler will only show cognise stubber if it s selected in addition to the neutron laser stubber combo it should show heavy for the weapon type not heavy
0
30,217
11,801,271,778
IssuesEvent
2020-03-18 19:07:14
jgeraigery/blueocean-environments
https://api.github.com/repos/jgeraigery/blueocean-environments
opened
CVE-2015-8858 (High) detected in uglify-js-2.2.5.tgz, uglify-js-2.3.6.tgz
security vulnerability
## CVE-2015-8858 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-2.2.5.tgz</b>, <b>uglify-js-2.3.6.tgz</b></p></summary> <p> <details><summary><b>uglify-js-2.2.5.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/transformers/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - transform-1.1.2.tgz - transformers-2.1.0.tgz - :x: **uglify-js-2.2.5.tgz** (Vulnerable Library) </details> <details><summary><b>uglify-js-2.3.6.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - handlebars-3.0.3.tgz - :x: **uglify-js-2.3.6.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/blueocean-environments/commit/906df1e2c2b1353a7f809ef51960f8980d6cec13">906df1e2c2b1353a7f809ef51960f8980d6cec13</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)." <p>Publish Date: 2017-01-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8858>CVE-2015-8858</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858</a></p> <p>Release Date: 2018-12-15</p> <p>Fix Resolution: v2.6.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.2.5","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;transform:1.1.2;transformers:2.1.0;uglify-js:2.2.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.6.0"},{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.3.6","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;handlebars:3.0.3;uglify-js:2.3.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.6.0"}],"vulnerabilityIdentifier":"CVE-2015-8858","vulnerabilityDetails":"The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a \"regular expression denial of service (ReDoS).\"","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8858","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2015-8858 (High) detected in uglify-js-2.2.5.tgz, uglify-js-2.3.6.tgz - ## CVE-2015-8858 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-2.2.5.tgz</b>, <b>uglify-js-2.3.6.tgz</b></p></summary> <p> <details><summary><b>uglify-js-2.2.5.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.2.5.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/transformers/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - transform-1.1.2.tgz - transformers-2.1.0.tgz - :x: **uglify-js-2.2.5.tgz** (Vulnerable Library) </details> <details><summary><b>uglify-js-2.3.6.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-2.3.6.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/blueocean-environments/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/blueocean-environments/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - js-builder-0.0.62.tgz (Root Library) - handlebars-3.0.3.tgz - :x: **uglify-js-2.3.6.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/blueocean-environments/commit/906df1e2c2b1353a7f809ef51960f8980d6cec13">906df1e2c2b1353a7f809ef51960f8980d6cec13</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a "regular expression denial of service (ReDoS)." <p>Publish Date: 2017-01-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8858>CVE-2015-8858</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8858</a></p> <p>Release Date: 2018-12-15</p> <p>Fix Resolution: v2.6.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.2.5","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;transform:1.1.2;transformers:2.1.0;uglify-js:2.2.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.6.0"},{"packageType":"javascript/Node.js","packageName":"uglify-js","packageVersion":"2.3.6","isTransitiveDependency":true,"dependencyTree":"@jenkins-cd/js-builder:0.0.62;handlebars:3.0.3;uglify-js:2.3.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"v2.6.0"}],"vulnerabilityIdentifier":"CVE-2015-8858","vulnerabilityDetails":"The uglify-js package before 2.6.0 for Node.js allows attackers to cause a denial of service (CPU consumption) via crafted input in a parse call, aka a \"regular expression denial of service (ReDoS).\"","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2015-8858","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in uglify js tgz uglify js tgz cve high severity vulnerability vulnerable libraries uglify js tgz uglify js tgz uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file tmp ws scm blueocean environments package json path to vulnerable library tmp ws scm blueocean environments node modules transformers node modules uglify js package json dependency hierarchy js builder tgz root library transform tgz transformers tgz x uglify js tgz vulnerable library uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file tmp ws scm blueocean environments package json path to vulnerable library tmp ws scm blueocean environments node modules uglify js package json dependency hierarchy js builder tgz root library handlebars tgz x uglify js tgz vulnerable library found in head commit a href vulnerability details the uglify js package before for node js allows attackers to cause a denial of service cpu consumption via crafted input in a parse call aka a regular expression denial of service redos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the uglify js package before for node js allows attackers to cause a denial of service cpu consumption via crafted input in a parse call aka a regular expression denial of service redos vulnerabilityurl
0
217,509
16,719,300,188
IssuesEvent
2021-06-10 04:22:13
IoTReady/iotready.github.io
https://api.github.com/repos/IoTReady/iotready.github.io
opened
Blog on Building a Websockets Client
documentation
- WS fundamentals - link to previous blog post - State diagram of a WS client or a flowchart - whatever is easier to understand - Code blocks with description - Why and how are we able to connect from a browser to a local server? - Limitations - Possibilities
1.0
Blog on Building a Websockets Client - - WS fundamentals - link to previous blog post - State diagram of a WS client or a flowchart - whatever is easier to understand - Code blocks with description - Why and how are we able to connect from a browser to a local server? - Limitations - Possibilities
non_priority
blog on building a websockets client ws fundamentals link to previous blog post state diagram of a ws client or a flowchart whatever is easier to understand code blocks with description why and how are we able to connect from a browser to a local server limitations possibilities
0
243,856
20,593,554,336
IssuesEvent
2022-03-05 05:53:36
Uuvana-Studios/longvinter-windows-client
https://api.github.com/repos/Uuvana-Studios/longvinter-windows-client
opened
17 digit code to connect gives no password prompt
bug Not Tested
**Describe the bug** When you use the 17 digit code to connect to a server, if that server is password protected there is no prompt to input a password. The server disconnects you automatically with an incorrect password. This makes it more so difficult for server hosts that must use this to connect to a local server that they are unable to see in the server browser. **To Reproduce** Steps to reproduce the behavior: 1. Go to '...' 2. Click on '....' 3. Scroll down to '....' 4. See error **Expected behavior** Enter code, prompted with password input to connect. **Screenshots** If applicable, add screenshots to help explain your problem. **Desktop (please complete the following information):** - OS: [e.g. Windows] - Game Version [e.g. 1.0] - Steam Version [e.g. 1.0] **Additional context** Add any other context about the problem here.
1.0
17 digit code to connect gives no password prompt - **Describe the bug** When you use the 17 digit code to connect to a server, if that server is password protected there is no prompt to input a password. The server disconnects you automatically with an incorrect password. This makes it more so difficult for server hosts that must use this to connect to a local server that they are unable to see in the server browser. **To Reproduce** Steps to reproduce the behavior: 1. Go to '...' 2. Click on '....' 3. Scroll down to '....' 4. See error **Expected behavior** Enter code, prompted with password input to connect. **Screenshots** If applicable, add screenshots to help explain your problem. **Desktop (please complete the following information):** - OS: [e.g. Windows] - Game Version [e.g. 1.0] - Steam Version [e.g. 1.0] **Additional context** Add any other context about the problem here.
non_priority
digit code to connect gives no password prompt describe the bug when you use the digit code to connect to a server if that server is password protected there is no prompt to input a password the server disconnects you automatically with an incorrect password this makes it more so difficult for server hosts that must use this to connect to a local server that they are unable to see in the server browser to reproduce steps to reproduce the behavior go to click on scroll down to see error expected behavior enter code prompted with password input to connect screenshots if applicable add screenshots to help explain your problem desktop please complete the following information os game version steam version additional context add any other context about the problem here
0
103,202
11,349,107,529
IssuesEvent
2020-01-24 03:15:36
irods/irods
https://api.github.com/repos/irods/irods
opened
document cannot specify dbsalt during upgrade
consortium-member documentation
`dbsalt` was a compile-time option for 4.1.x and before - it is not something that can be changed after upgrade. document this behavior and reasoning in the upgrade section of the docs.
1.0
document cannot specify dbsalt during upgrade - `dbsalt` was a compile-time option for 4.1.x and before - it is not something that can be changed after upgrade. document this behavior and reasoning in the upgrade section of the docs.
non_priority
document cannot specify dbsalt during upgrade dbsalt was a compile time option for x and before it is not something that can be changed after upgrade document this behavior and reasoning in the upgrade section of the docs
0
275,420
23,914,263,646
IssuesEvent
2022-09-09 11:09:10
xmos/lib_i2s
https://api.github.com/repos/xmos/lib_i2s
opened
Backpressure test for <32b data widths needs refining
type:testing size:S
In particular, a 24b data width takes significantly longer to process than the current tests allow; I suspect all non-power-of-2 cases take longer than their power-of-2 counterparts. Either the implementation needs tightening to give some breathing space or the test needs loosening in these cases.
1.0
Backpressure test for <32b data widths needs refining - In particular, a 24b data width takes significantly longer to process than the current tests allow; I suspect all non-power-of-2 cases take longer than their power-of-2 counterparts. Either the implementation needs tightening to give some breathing space or the test needs loosening in these cases.
non_priority
backpressure test for data widths needs refining in particular a data width takes significantly longer to process than the current tests allow i suspect all non power of cases take longer than their power of counterparts either the implementation needs tightening to give some breathing space or the test needs loosening in these cases
0
325,939
24,066,786,371
IssuesEvent
2022-09-17 15:59:14
illBeRoy/taskipy
https://api.github.com/repos/illBeRoy/taskipy
closed
Backport and use a changelog
documentation
It would be nice if the project had some sort of changelog so users of the package would know what is changing with each release and, if the package has a major version bump, what breaking changes may have occurred. For ideas, I like the [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) format personally.
1.0
Backport and use a changelog - It would be nice if the project had some sort of changelog so users of the package would know what is changing with each release and, if the package has a major version bump, what breaking changes may have occurred. For ideas, I like the [Keep a Changelog](https://keepachangelog.com/en/1.0.0/) format personally.
non_priority
backport and use a changelog it would be nice if the project had some sort of changelog so users of the package would know what is changing with each release and if the package has a major version bump what breaking changes may have occurred for ideas i like the format personally
0
311,777
23,404,549,023
IssuesEvent
2022-08-12 11:28:03
UnBArqDsw2022-1/2022_1_G5_SerFit
https://api.github.com/repos/UnBArqDsw2022-1/2022_1_G5_SerFit
closed
GOF Criacional - Builder
documentation
### Contact Details (optional) _No response_ ### Summary Documetar Builder ### Motivation Entrega 3 ### Alternatives _No response_ ### Additional Context _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
1.0
GOF Criacional - Builder - ### Contact Details (optional) _No response_ ### Summary Documetar Builder ### Motivation Entrega 3 ### Alternatives _No response_ ### Additional Context _No response_ ### Code of Conduct - [X] I agree to follow this project's Code of Conduct
non_priority
gof criacional builder contact details optional no response summary documetar builder motivation entrega alternatives no response additional context no response code of conduct i agree to follow this project s code of conduct
0
275,974
20,962,284,229
IssuesEvent
2022-03-28 00:02:06
unstructuredstudio/zubhub
https://api.github.com/repos/unstructuredstudio/zubhub
opened
Generate improved and conscise ZubHub documentation
documentation enhancement good first issue
Current developer documentation for ZubHub resides in multiple places - https://github.com/unstructuredstudio/zubhub/tree/master/zubhub_backend/zubhub/docs as well as - https://github.com/unstructuredstudio/zubhub#development - https://github.com/unstructuredstudio/zubhub/tree/master/single_vm_deployment We currently need a way to bring all the documentation in one place which is concise and easy to use. New documentation should make lives of developers and newcomers to the project more easy than it is now. We have decided for now to being working on the existing markdown documentation we have and integrate it into a statically generated doc using `mkdocs`. We will be using the mkdocs-material project (https://squidfunk.github.io/mkdocs-material/) to build this new documentation. The tasks involved in this work are as follows: - [ ] Consolidate all markdown files and create a proper documentation structure. Get inspired from https://beta.reactjs.org/learn and https://squidfunk.github.io/mkdocs-material/reference/ themselves - [ ] Convert all the documentation in structure the mkdocs understands and ensure that the documentation builds - [ ] Use current ERD diagram generator mechanism as part of the build - [ ] Create a Github Sction to build the docs and push them to github pages
1.0
Generate improved and conscise ZubHub documentation - Current developer documentation for ZubHub resides in multiple places - https://github.com/unstructuredstudio/zubhub/tree/master/zubhub_backend/zubhub/docs as well as - https://github.com/unstructuredstudio/zubhub#development - https://github.com/unstructuredstudio/zubhub/tree/master/single_vm_deployment We currently need a way to bring all the documentation in one place which is concise and easy to use. New documentation should make lives of developers and newcomers to the project more easy than it is now. We have decided for now to being working on the existing markdown documentation we have and integrate it into a statically generated doc using `mkdocs`. We will be using the mkdocs-material project (https://squidfunk.github.io/mkdocs-material/) to build this new documentation. The tasks involved in this work are as follows: - [ ] Consolidate all markdown files and create a proper documentation structure. Get inspired from https://beta.reactjs.org/learn and https://squidfunk.github.io/mkdocs-material/reference/ themselves - [ ] Convert all the documentation in structure the mkdocs understands and ensure that the documentation builds - [ ] Use current ERD diagram generator mechanism as part of the build - [ ] Create a Github Sction to build the docs and push them to github pages
non_priority
generate improved and conscise zubhub documentation current developer documentation for zubhub resides in multiple places as well as we currently need a way to bring all the documentation in one place which is concise and easy to use new documentation should make lives of developers and newcomers to the project more easy than it is now we have decided for now to being working on the existing markdown documentation we have and integrate it into a statically generated doc using mkdocs we will be using the mkdocs material project to build this new documentation the tasks involved in this work are as follows consolidate all markdown files and create a proper documentation structure get inspired from and themselves convert all the documentation in structure the mkdocs understands and ensure that the documentation builds use current erd diagram generator mechanism as part of the build create a github sction to build the docs and push them to github pages
0
26,724
20,608,632,650
IssuesEvent
2022-03-07 05:23:17
WordPress/performance
https://api.github.com/repos/WordPress/performance
closed
Provide admin pointer informing about the plugin's admin screen
[Type] Enhancement Infrastructure Needs Review
For WordPress plugins that don't add their own top-level menu item to the WordPress admin menu it has been notoriously hard to be noticeable after plugin activation. The "Performance Lab" plugin adds a new submenu item "Settings > Performance", but that's obviously hard to find since it's under the existing "Settings" top-level menu item. Displaying a WP admin pointer was suggested in https://github.com/WordPress/performance/issues/61#issuecomment-1012844968, and this issue is focused on implementing that. Related is #192 which also adds an alternative way to discover the plugin's admin screen. My suggestion for the admin pointer copy would be a simple text like this: * Title: _Performance Lab_ * Content: _You can now test upcoming WordPress performance features. Open Settings > Performance to individually toggle the performance features included in the plugin._ * The _Settings > Performance_ part could be a link to the admin screen. cc @JustinyAhin
1.0
Provide admin pointer informing about the plugin's admin screen - For WordPress plugins that don't add their own top-level menu item to the WordPress admin menu it has been notoriously hard to be noticeable after plugin activation. The "Performance Lab" plugin adds a new submenu item "Settings > Performance", but that's obviously hard to find since it's under the existing "Settings" top-level menu item. Displaying a WP admin pointer was suggested in https://github.com/WordPress/performance/issues/61#issuecomment-1012844968, and this issue is focused on implementing that. Related is #192 which also adds an alternative way to discover the plugin's admin screen. My suggestion for the admin pointer copy would be a simple text like this: * Title: _Performance Lab_ * Content: _You can now test upcoming WordPress performance features. Open Settings > Performance to individually toggle the performance features included in the plugin._ * The _Settings > Performance_ part could be a link to the admin screen. cc @JustinyAhin
non_priority
provide admin pointer informing about the plugin s admin screen for wordpress plugins that don t add their own top level menu item to the wordpress admin menu it has been notoriously hard to be noticeable after plugin activation the performance lab plugin adds a new submenu item settings performance but that s obviously hard to find since it s under the existing settings top level menu item displaying a wp admin pointer was suggested in and this issue is focused on implementing that related is which also adds an alternative way to discover the plugin s admin screen my suggestion for the admin pointer copy would be a simple text like this title performance lab content you can now test upcoming wordpress performance features open settings performance to individually toggle the performance features included in the plugin the settings performance part could be a link to the admin screen cc justinyahin
0
119,251
10,036,008,682
IssuesEvent
2019-07-18 09:38:52
certbot/certbot
https://api.github.com/repos/certbot/certbot
closed
Integration tests for CLI < -- > plugin interactions
area: testing needs-update
Unit testing of cli.py's responses to various types of misconfigured plugins is quite an intricate task, because the plugins are not present when unit tests are run, and because mocking out the relevant bits of disco and plugins while keeping the tests meaningful is a very elaborate process. Instead, we should use integration tests where the plugins are actually available, and we can mock up things like broken Apache and Nginx configurations.
1.0
Integration tests for CLI < -- > plugin interactions - Unit testing of cli.py's responses to various types of misconfigured plugins is quite an intricate task, because the plugins are not present when unit tests are run, and because mocking out the relevant bits of disco and plugins while keeping the tests meaningful is a very elaborate process. Instead, we should use integration tests where the plugins are actually available, and we can mock up things like broken Apache and Nginx configurations.
non_priority
integration tests for cli plugin interactions unit testing of cli py s responses to various types of misconfigured plugins is quite an intricate task because the plugins are not present when unit tests are run and because mocking out the relevant bits of disco and plugins while keeping the tests meaningful is a very elaborate process instead we should use integration tests where the plugins are actually available and we can mock up things like broken apache and nginx configurations
0
28,419
8,140,095,651
IssuesEvent
2018-08-20 19:55:35
cpbills/openpa_migrate
https://api.github.com/repos/cpbills/openpa_migrate
opened
Release tarball for V1.0.4 is missing the GCC ARM header for primitives
C: build system P: blocker bug
**Reported by michael forstner on 19 Sep 2013 11:20 UTC** Release tarball for V1.0.4 is missing the GCC ARM header for primitives. I've downloaded the header from the current trunk and successfully compiled and tested the release on a nVidia Tegra2 system.
1.0
Release tarball for V1.0.4 is missing the GCC ARM header for primitives - **Reported by michael forstner on 19 Sep 2013 11:20 UTC** Release tarball for V1.0.4 is missing the GCC ARM header for primitives. I've downloaded the header from the current trunk and successfully compiled and tested the release on a nVidia Tegra2 system.
non_priority
release tarball for is missing the gcc arm header for primitives reported by michael forstner on sep utc release tarball for is missing the gcc arm header for primitives i ve downloaded the header from the current trunk and successfully compiled and tested the release on a nvidia system
0
59,021
6,626,338,702
IssuesEvent
2017-09-22 19:06:49
Princeton-CDH/cdh-web
https://api.github.com/repos/Princeton-CDH/cdh-web
closed
As a user, I want to view previous events by semester so that I can get a sense of event and workshop offerings.
awaiting testing
## Notes for testing - links to archive are not styled yet, but logic should be working
1.0
As a user, I want to view previous events by semester so that I can get a sense of event and workshop offerings. - ## Notes for testing - links to archive are not styled yet, but logic should be working
non_priority
as a user i want to view previous events by semester so that i can get a sense of event and workshop offerings notes for testing links to archive are not styled yet but logic should be working
0
119,252
15,439,055,880
IssuesEvent
2021-03-07 22:43:57
civictechindex/CTI-website-frontend
https://api.github.com/repos/civictechindex/CTI-website-frontend
closed
Fix Breadcrumbs color issues
bug feature: design system feature: header role: front end
### Overview Per Figma, breadcrumb links should be our standard light on dark, or dark on light, but not purple like they are now, nor other colors. These are typical problems: <img width="439" alt="Screen Shot 2021-02-16 at 11 41 07 AM" src="https://user-images.githubusercontent.com/1218844/108113127-ef9f8880-704b-11eb-9756-d494df8d886e.png"> <img width="439" alt="Screen Shot 2021-02-16 at 11 40 45 AM" src="https://user-images.githubusercontent.com/1218844/108113135-f201e280-704b-11eb-888f-4ff445de73a9.png"> ### Action Refactor NavBreadcrumbs.js accordingly.
1.0
Fix Breadcrumbs color issues - ### Overview Per Figma, breadcrumb links should be our standard light on dark, or dark on light, but not purple like they are now, nor other colors. These are typical problems: <img width="439" alt="Screen Shot 2021-02-16 at 11 41 07 AM" src="https://user-images.githubusercontent.com/1218844/108113127-ef9f8880-704b-11eb-9756-d494df8d886e.png"> <img width="439" alt="Screen Shot 2021-02-16 at 11 40 45 AM" src="https://user-images.githubusercontent.com/1218844/108113135-f201e280-704b-11eb-888f-4ff445de73a9.png"> ### Action Refactor NavBreadcrumbs.js accordingly.
non_priority
fix breadcrumbs color issues overview per figma breadcrumb links should be our standard light on dark or dark on light but not purple like they are now nor other colors these are typical problems img width alt screen shot at am src img width alt screen shot at am src action refactor navbreadcrumbs js accordingly
0
12,729
20,825,035,661
IssuesEvent
2022-03-18 19:41:33
rltsystems/Group5_CST438_Project02
https://api.github.com/repos/rltsystems/Group5_CST438_Project02
closed
User Story: Create Account
Core Requirement Back-End Complete
As a user, I want to be able to create an account, so I can make use of the website
1.0
User Story: Create Account - As a user, I want to be able to create an account, so I can make use of the website
non_priority
user story create account as a user i want to be able to create an account so i can make use of the website
0
237,109
26,078,803,532
IssuesEvent
2022-12-25 01:16:48
Nivaskumark/CVE-2020-0114-frameworks_base11
https://api.github.com/repos/Nivaskumark/CVE-2020-0114-frameworks_base11
opened
CVE-2022-20504 (Medium) detected in baseandroid-10.0.0_r14
security vulnerability
## CVE-2022-20504 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r14</b></p></summary> <p> <p>Android framework classes and services</p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/SystemUI/src/com/android/systemui/Somnambulator.java</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In multiple locations of DreamManagerService.java, there is a missing permission check. This could lead to local escalation of privilege and dismissal of system dialogs with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225878553 <p>Publish Date: 2022-12-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20504>CVE-2022-20504</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/74c52366701debed5f39c629ab85906fd3965605">https://android.googlesource.com/platform/frameworks/base/+/74c52366701debed5f39c629ab85906fd3965605</a></p> <p>Release Date: 2022-12-16</p> <p>Fix Resolution: android-13.0.0_r16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-20504 (Medium) detected in baseandroid-10.0.0_r14 - ## CVE-2022-20504 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>baseandroid-10.0.0_r14</b></p></summary> <p> <p>Android framework classes and services</p> <p>Library home page: <a href=https://android.googlesource.com/platform/frameworks/base>https://android.googlesource.com/platform/frameworks/base</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/SystemUI/src/com/android/systemui/Somnambulator.java</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In multiple locations of DreamManagerService.java, there is a missing permission check. This could lead to local escalation of privilege and dismissal of system dialogs with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-225878553 <p>Publish Date: 2022-12-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20504>CVE-2022-20504</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/platform/frameworks/base/+/74c52366701debed5f39c629ab85906fd3965605">https://android.googlesource.com/platform/frameworks/base/+/74c52366701debed5f39c629ab85906fd3965605</a></p> <p>Release Date: 2022-12-16</p> <p>Fix Resolution: android-13.0.0_r16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in baseandroid cve medium severity vulnerability vulnerable library baseandroid android framework classes and services library home page a href found in base branch master vulnerable source files systemui src com android systemui somnambulator java vulnerability details in multiple locations of dreammanagerservice java there is a missing permission check this could lead to local escalation of privilege and dismissal of system dialogs with user execution privileges needed user interaction is not needed for exploitation product androidversions android id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
0
246,476
26,611,721,861
IssuesEvent
2023-01-24 01:06:47
MohamedElashri/snibox-1
https://api.github.com/repos/MohamedElashri/snibox-1
opened
CVE-2022-23633 (Medium) detected in actionpack-5.2.3.gem
security vulnerability
## CVE-2022-23633 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-5.2.3.gem</b></p></summary> <p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p> <p>Library home page: <a href="https://rubygems.org/gems/actionpack-5.2.3.gem">https://rubygems.org/gems/actionpack-5.2.3.gem</a></p> <p>Path to dependency file: /Gemfile.lock</p> <p>Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-5.2.3.gem</p> <p> Dependency Hierarchy: - rails-5.2.3.gem (Root Library) - :x: **actionpack-5.2.3.gem** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used. <p>Publish Date: 2022-02-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23633>CVE-2022-23633</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9">https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9</a></p> <p>Release Date: 2022-02-11</p> <p>Fix Resolution: 5.2.6.2, 6.0.4.6, 6.1.4.6, 7.0.2.2 </p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-23633 (Medium) detected in actionpack-5.2.3.gem - ## CVE-2022-23633 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>actionpack-5.2.3.gem</b></p></summary> <p>Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.</p> <p>Library home page: <a href="https://rubygems.org/gems/actionpack-5.2.3.gem">https://rubygems.org/gems/actionpack-5.2.3.gem</a></p> <p>Path to dependency file: /Gemfile.lock</p> <p>Path to vulnerable library: /home/wss-scanner/.gem/ruby/2.7.0/cache/actionpack-5.2.3.gem</p> <p> Dependency Hierarchy: - rails-5.2.3.gem (Root Library) - :x: **actionpack-5.2.3.gem** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Action Pack is a framework for handling and responding to web requests. Under certain circumstances response bodies will not be closed. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next request. This can lead to data being leaked to subsequent requests.This has been fixed in Rails 7.0.2.1, 6.1.4.5, 6.0.4.5, and 5.2.6.1. Upgrading is highly recommended, but to work around this problem a middleware described in GHSA-wh98-p28r-vrc9 can be used. <p>Publish Date: 2022-02-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23633>CVE-2022-23633</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9">https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9</a></p> <p>Release Date: 2022-02-11</p> <p>Fix Resolution: 5.2.6.2, 6.0.4.6, 6.1.4.6, 7.0.2.2 </p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in actionpack gem cve medium severity vulnerability vulnerable library actionpack gem web apps on rails simple battle tested conventions for building and testing mvc web applications works with any rack compatible server library home page a href path to dependency file gemfile lock path to vulnerable library home wss scanner gem ruby cache actionpack gem dependency hierarchy rails gem root library x actionpack gem vulnerable library found in base branch master vulnerability details action pack is a framework for handling and responding to web requests under certain circumstances response bodies will not be closed in the event a response is not notified of a close actiondispatch executor will not know to reset thread local state for the next request this can lead to data being leaked to subsequent requests this has been fixed in rails and upgrading is highly recommended but to work around this problem a middleware described in ghsa can be used publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
62,316
6,793,677,574
IssuesEvent
2017-11-01 08:47:30
Microsoft/vscode
https://api.github.com/repos/Microsoft/vscode
closed
Test: Quicklook for source files supported by Code
testplan-item
Tests #25843 Complexity: 1 - [ ] macOS - @roblourens [File types supported by Code](https://github.com/Microsoft/vscode/blob/master/build/gulpfile.vscode.js#L140) should now be able to be displayed as source code when using the <kbd>Space</kbd> key in Finder: their source should be readable.
1.0
Test: Quicklook for source files supported by Code - Tests #25843 Complexity: 1 - [ ] macOS - @roblourens [File types supported by Code](https://github.com/Microsoft/vscode/blob/master/build/gulpfile.vscode.js#L140) should now be able to be displayed as source code when using the <kbd>Space</kbd> key in Finder: their source should be readable.
non_priority
test quicklook for source files supported by code tests complexity macos roblourens should now be able to be displayed as source code when using the space key in finder their source should be readable
0
65,887
8,852,603,746
IssuesEvent
2019-01-08 18:50:03
open-oni/open-oni
https://api.github.com/repos/open-oni/open-oni
opened
Document how MARC fields are used
documentation metadata type_tech
We need to create documentation that says which marc fields are used for what database / solr features. This would be very helpful in debugging features of issue and title displays.
1.0
Document how MARC fields are used - We need to create documentation that says which marc fields are used for what database / solr features. This would be very helpful in debugging features of issue and title displays.
non_priority
document how marc fields are used we need to create documentation that says which marc fields are used for what database solr features this would be very helpful in debugging features of issue and title displays
0
128,265
27,223,875,182
IssuesEvent
2023-02-21 08:16:13
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
[4.0] Add support search ID in articles and modules managers in search field admin panel.
No Code Attached Yet
### Steps to reproduce the issue For a very large number of 1500 articles and a large number of 100 modules . It is very inconvenient to search by sorting materials. For example, among 1500 materials, it is extremely difficult to find a material with ID 525. At the same time, we know that searching for material by ID is a very common task. . You also need to add a filter for several categories, several types , and several positions for modules in the module Manager.
1.0
[4.0] Add support search ID in articles and modules managers in search field admin panel. - ### Steps to reproduce the issue For a very large number of 1500 articles and a large number of 100 modules . It is very inconvenient to search by sorting materials. For example, among 1500 materials, it is extremely difficult to find a material with ID 525. At the same time, we know that searching for material by ID is a very common task. . You also need to add a filter for several categories, several types , and several positions for modules in the module Manager.
non_priority
add support search id in articles and modules managers in search field admin panel steps to reproduce the issue for a very large number of articles and a large number of modules it is very inconvenient to search by sorting materials for example among materials it is extremely difficult to find a material with id at the same time we know that searching for material by id is a very common task you also need to add a filter for several categories several types and several positions for modules in the module manager
0
13,180
3,690,337,316
IssuesEvent
2016-02-25 19:37:59
scikit-image/scikit-image
https://api.github.com/repos/scikit-image/scikit-image
opened
Clarify difference between filled_area, area, and convex_hull_area in regionprops
documentation
Update the regionprops docstring to clarify the above.
1.0
Clarify difference between filled_area, area, and convex_hull_area in regionprops - Update the regionprops docstring to clarify the above.
non_priority
clarify difference between filled area area and convex hull area in regionprops update the regionprops docstring to clarify the above
0
259,255
27,621,778,937
IssuesEvent
2023-03-10 01:11:01
artsking/linux-4.1.15
https://api.github.com/repos/artsking/linux-4.1.15
opened
CVE-2023-1078 (High) detected in linux-stable-rtv4.1.33
Mend: dependency security vulnerability
## CVE-2023-1078 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-4.1.15/commit/b1c15f7dc4cfe553aeed8332e46f285ee92b5756">b1c15f7dc4cfe553aeed8332e46f285ee92b5756</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This CVE was marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher. Still, the CVE details were not included in the CVE entry. This is because the original requester of the CVE ID assignment has not sent an update to MITRE with the information needed to populate the CVE entry. This page will reflect the classification results once they are available through NVD <p>Publish Date: 2023-02-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1078>CVE-2023-1078</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1078">https://www.linuxkernelcves.com/cves/CVE-2023-1078</a></p> <p>Release Date: 2023-02-28</p> <p>Fix Resolution: v4.19.273,v5.4.232,v5.10.168,v5.15.94,v6.1.12,v6.2-rc8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-1078 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2023-1078 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-4.1.15/commit/b1c15f7dc4cfe553aeed8332e46f285ee92b5756">b1c15f7dc4cfe553aeed8332e46f285ee92b5756</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This CVE was marked as RESERVED by NVD. This means that the CVE-ID is reserved for future use by the CVE Numbering Authority (CNA) or a security researcher. Still, the CVE details were not included in the CVE entry. This is because the original requester of the CVE ID assignment has not sent an update to MITRE with the information needed to populate the CVE entry. This page will reflect the classification results once they are available through NVD <p>Publish Date: 2023-02-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-1078>CVE-2023-1078</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-1078">https://www.linuxkernelcves.com/cves/CVE-2023-1078</a></p> <p>Release Date: 2023-02-28</p> <p>Fix Resolution: v4.19.273,v5.4.232,v5.10.168,v5.15.94,v6.1.12,v6.2-rc8</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details this cve was marked as reserved by nvd this means that the cve id is reserved for future use by the cve numbering authority cna or a security researcher still the cve details were not included in the cve entry this is because the original requester of the cve id assignment has not sent an update to mitre with the information needed to populate the cve entry this page will reflect the classification results once they are available through nvd publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
125,082
12,246,814,054
IssuesEvent
2020-05-05 14:59:26
Yuki2Kisaragi/github-slideshow
https://api.github.com/repos/Yuki2Kisaragi/github-slideshow
closed
Your first contribution
documentation good first issue question
### GitHubフローの紹介 さてイシューに慣れてきたところで、このイシューを使ってあなたの初めてのコントリビュートの道筋をたどってみましょう。 プロジェクトによってコントリビュートのフローは異なりますが、GitHub上で最もシンプルで最も効率的なコントリビュートのやり方はGitHubフローです。 :tv: [ビデオ:GitHubフローを理解する](https://www.youtube.com/watch?v=PBI2Rz-ZOxU) <hr> <h3 align="center">以下を読み進めて、次のステップに移りましょう</h3>
1.0
Your first contribution - ### GitHubフローの紹介 さてイシューに慣れてきたところで、このイシューを使ってあなたの初めてのコントリビュートの道筋をたどってみましょう。 プロジェクトによってコントリビュートのフローは異なりますが、GitHub上で最もシンプルで最も効率的なコントリビュートのやり方はGitHubフローです。 :tv: [ビデオ:GitHubフローを理解する](https://www.youtube.com/watch?v=PBI2Rz-ZOxU) <hr> <h3 align="center">以下を読み進めて、次のステップに移りましょう</h3>
non_priority
your first contribution githubフローの紹介 さてイシューに慣れてきたところで、このイシューを使ってあなたの初めてのコントリビュートの道筋をたどってみましょう。 プロジェクトによってコントリビュートのフローは異なりますが、github上で最もシンプルで最も効率的なコントリビュートのやり方はgithubフローです。 tv 以下を読み進めて、次のステップに移りましょう
0
368,238
25,783,531,212
IssuesEvent
2022-12-09 18:05:35
webdataset/webdataset
https://api.github.com/repos/webdataset/webdataset
closed
WebDataset no longer has a length argument (documentation)
documentation
In the docs, it's mentioned that "you can specify an explicit size using the `length=` argument to WebDataset" https://github.com/webdataset/webdataset/blob/2eaa96e6a266ad0ae1a1433e86eb6c2d3b7c50f8/docs/sharding/index.html#L177-L179 This is no longer true, as there is no `length=` argument to WebDataset. https://github.com/webdataset/webdataset/blob/45724cdfcc0935c63ac6952c5f6b0ada9fa44f37/webdataset/dataset.py#L29-L39 I'm not sure if the documentation is out of date in mentioning a removed parameter, or if the parameter should be there, but got removed accidentally.
1.0
WebDataset no longer has a length argument (documentation) - In the docs, it's mentioned that "you can specify an explicit size using the `length=` argument to WebDataset" https://github.com/webdataset/webdataset/blob/2eaa96e6a266ad0ae1a1433e86eb6c2d3b7c50f8/docs/sharding/index.html#L177-L179 This is no longer true, as there is no `length=` argument to WebDataset. https://github.com/webdataset/webdataset/blob/45724cdfcc0935c63ac6952c5f6b0ada9fa44f37/webdataset/dataset.py#L29-L39 I'm not sure if the documentation is out of date in mentioning a removed parameter, or if the parameter should be there, but got removed accidentally.
non_priority
webdataset no longer has a length argument documentation in the docs it s mentioned that you can specify an explicit size using the length argument to webdataset this is no longer true as there is no length argument to webdataset i m not sure if the documentation is out of date in mentioning a removed parameter or if the parameter should be there but got removed accidentally
0
187,732
15,106,711,595
IssuesEvent
2021-02-08 14:37:15
phantom08266/TIL
https://api.github.com/repos/phantom08266/TIL
closed
JSP 웹 프로그래밍
documentation
최범균의 JSP2.3 웹 프로그래밍 학습하기. - [x] 1장 - [x] 2장 - [x] 3장 - [x] 4장 - [x] 9장 - [x] 10장 - [x] 17장 - [x] 18장 - [x] 19장 - [x] 20장 1 ~ 4, 9, 10, 17 ~ 20 학습할 것.
1.0
JSP 웹 프로그래밍 - 최범균의 JSP2.3 웹 프로그래밍 학습하기. - [x] 1장 - [x] 2장 - [x] 3장 - [x] 4장 - [x] 9장 - [x] 10장 - [x] 17장 - [x] 18장 - [x] 19장 - [x] 20장 1 ~ 4, 9, 10, 17 ~ 20 학습할 것.
non_priority
jsp 웹 프로그래밍 최범균의 웹 프로그래밍 학습하기 학습할 것
0
267,792
28,509,224,469
IssuesEvent
2023-04-19 01:46:13
dpteam/RK3188_TABLET
https://api.github.com/repos/dpteam/RK3188_TABLET
closed
CVE-2013-2889 (Medium) detected in linuxv3.0 - autoclosed
Mend: dependency security vulnerability
## CVE-2013-2889 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv3.0</b></p></summary> <p> <p>Linux kernel source tree</p> <p>Library home page: <a href=https://github.com/verygreen/linux.git>https://github.com/verygreen/linux.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-zpff.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-zpff.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-zpff.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. <p>Publish Date: 2013-09-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2889>CVE-2013-2889</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2889">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2889</a></p> <p>Release Date: 2013-09-16</p> <p>Fix Resolution: v3.12-rc2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2013-2889 (Medium) detected in linuxv3.0 - autoclosed - ## CVE-2013-2889 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv3.0</b></p></summary> <p> <p>Linux kernel source tree</p> <p>Library home page: <a href=https://github.com/verygreen/linux.git>https://github.com/verygreen/linux.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/dpteam/RK3188_TABLET/commit/0c501f5a0fd72c7b2ac82904235363bd44fd8f9e">0c501f5a0fd72c7b2ac82904235363bd44fd8f9e</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-zpff.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-zpff.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-zpff.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> drivers/hid/hid-zpff.c in the Human Interface Device (HID) subsystem in the Linux kernel through 3.11, when CONFIG_HID_ZEROPLUS is enabled, allows physically proximate attackers to cause a denial of service (heap-based out-of-bounds write) via a crafted device. <p>Publish Date: 2013-09-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-2889>CVE-2013-2889</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2889">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-2889</a></p> <p>Release Date: 2013-09-16</p> <p>Fix Resolution: v3.12-rc2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in autoclosed cve medium severity vulnerability vulnerable library linux kernel source tree library home page a href found in head commit a href found in base branch master vulnerable source files drivers hid hid zpff c drivers hid hid zpff c drivers hid hid zpff c vulnerability details drivers hid hid zpff c in the human interface device hid subsystem in the linux kernel through when config hid zeroplus is enabled allows physically proximate attackers to cause a denial of service heap based out of bounds write via a crafted device publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
25,259
12,532,611,873
IssuesEvent
2020-06-04 16:12:50
intellij-rust/intellij-rust
https://api.github.com/repos/intellij-rust/intellij-rust
closed
Half minute to minute long freezes on versions > 0.2.120.2202-201 due to getOwnedDirectory
performance
<!-- Hello and thank you for the issue! If you would like to report a bug, we have added some points below that you can fill out. Feel free to remove all the irrelevant text to request a new feature. --> ## Environment * 0.2.123.3132-201 * rustc 1.45.0-nightly (769d12eec 2020-05-12) * IntelliJ Ultimate Edition 2020.1.2 * macOS 10.15.4 ## Problem description In order to prevent 10s of seconds to almost a minute long pauses when making changes in https://github.com/lumen/lumen, I've had to downgrade from the latest release to 0.2.120.2202-201. A lot of the longest pauses seem attributed to `getOwnedDirectory` from the `threadDumps-freeze` directories. ![Screen Shot 2020-06-04 at 7 49 44 AM](https://user-images.githubusercontent.com/298259/83758657-04f89200-a638-11ea-9294-051a00994ca4.png) All the `threadDumps-freeze` directories that appear associated with the plugin are attached in this zip: [Archive.zip](https://github.com/intellij-rust/intellij-rust/files/4730110/Archive.zip) ## Steps to reproduce 1. `git clone git@github.com:lumen/lumen.git lumen/lumen` 2. `cd lumen/lumen` 3. `git checkout otp-runtime-selection` 3. Open the repository in the IDE. 4. Try to edit a file, such as adding an if inside a function in `liblumen_alloc/src/erts/process.rs` 5. Get a long freeze if plugin > 0.2.120.2202-201
True
Half minute to minute long freezes on versions > 0.2.120.2202-201 due to getOwnedDirectory - <!-- Hello and thank you for the issue! If you would like to report a bug, we have added some points below that you can fill out. Feel free to remove all the irrelevant text to request a new feature. --> ## Environment * 0.2.123.3132-201 * rustc 1.45.0-nightly (769d12eec 2020-05-12) * IntelliJ Ultimate Edition 2020.1.2 * macOS 10.15.4 ## Problem description In order to prevent 10s of seconds to almost a minute long pauses when making changes in https://github.com/lumen/lumen, I've had to downgrade from the latest release to 0.2.120.2202-201. A lot of the longest pauses seem attributed to `getOwnedDirectory` from the `threadDumps-freeze` directories. ![Screen Shot 2020-06-04 at 7 49 44 AM](https://user-images.githubusercontent.com/298259/83758657-04f89200-a638-11ea-9294-051a00994ca4.png) All the `threadDumps-freeze` directories that appear associated with the plugin are attached in this zip: [Archive.zip](https://github.com/intellij-rust/intellij-rust/files/4730110/Archive.zip) ## Steps to reproduce 1. `git clone git@github.com:lumen/lumen.git lumen/lumen` 2. `cd lumen/lumen` 3. `git checkout otp-runtime-selection` 3. Open the repository in the IDE. 4. Try to edit a file, such as adding an if inside a function in `liblumen_alloc/src/erts/process.rs` 5. Get a long freeze if plugin > 0.2.120.2202-201
non_priority
half minute to minute long freezes on versions due to getowneddirectory hello and thank you for the issue if you would like to report a bug we have added some points below that you can fill out feel free to remove all the irrelevant text to request a new feature environment rustc nightly intellij ultimate edition macos problem description in order to prevent of seconds to almost a minute long pauses when making changes in i ve had to downgrade from the latest release to a lot of the longest pauses seem attributed to getowneddirectory from the threaddumps freeze directories all the threaddumps freeze directories that appear associated with the plugin are attached in this zip steps to reproduce git clone git github com lumen lumen git lumen lumen cd lumen lumen git checkout otp runtime selection open the repository in the ide try to edit a file such as adding an if inside a function in liblumen alloc src erts process rs get a long freeze if plugin
0
235,278
18,046,019,361
IssuesEvent
2021-09-18 22:56:27
exoscoriae/eXoDOS
https://api.github.com/repos/exoscoriae/eXoDOS
closed
Wing Commander (1990)
documentation
There's a German fan patch for Wing Commander 1 and Secret Missions 1: [CG-Board (Traxx Amiga EP](https://cgboard.raysworld.ch/showthread.php?tid=26961) - Install english WC (I used 3*3,5" floppies) - Install english Secret Missions (I used 2*3,5" floppies) - copy the files from the patch WC folder to the installation folder (WING) - copy the files from the patch WC_SM1 folder to the installation folder (WING) - copy the INTRO.DAT from PROT\WC1 SM1 folder to the installation folder (WING) (it's a "special" copy protection solution ;-) ) - copy the WINGCMDR.CFG from the patch folder to the installation folder (WING) (I also modified the WINGCMDR.CFG for MT32 and added it as a startup option) Now the game is German 👍
1.0
Wing Commander (1990) - There's a German fan patch for Wing Commander 1 and Secret Missions 1: [CG-Board (Traxx Amiga EP](https://cgboard.raysworld.ch/showthread.php?tid=26961) - Install english WC (I used 3*3,5" floppies) - Install english Secret Missions (I used 2*3,5" floppies) - copy the files from the patch WC folder to the installation folder (WING) - copy the files from the patch WC_SM1 folder to the installation folder (WING) - copy the INTRO.DAT from PROT\WC1 SM1 folder to the installation folder (WING) (it's a "special" copy protection solution ;-) ) - copy the WINGCMDR.CFG from the patch folder to the installation folder (WING) (I also modified the WINGCMDR.CFG for MT32 and added it as a startup option) Now the game is German 👍
non_priority
wing commander there s a german fan patch for wing commander and secret missions install english wc i used floppies install english secret missions i used floppies copy the files from the patch wc folder to the installation folder wing copy the files from the patch wc folder to the installation folder wing copy the intro dat from prot folder to the installation folder wing it s a special copy protection solution copy the wingcmdr cfg from the patch folder to the installation folder wing i also modified the wingcmdr cfg for and added it as a startup option now the game is german 👍
0
242,876
20,269,541,996
IssuesEvent
2022-02-15 15:05:07
microsoft/playwright
https://api.github.com/repos/microsoft/playwright
closed
Hide/remove Elements from Screenshots
feature-visual-regression-testing v1.20
### Discussed in https://github.com/microsoft/playwright/discussions/5068 <div type='discussions-op-text'> <sup>Originally posted by **rollin-cogers** January 20, 2021</sup> Hey everyone! I've been very excited to use this tool for testing, as I've previously been using protractor for all my testing. In the past I've used modules like webdriver-image-comparison that allow for options like [hiding and removing elements](https://github.com/wswebcreation/webdriver-image-comparison/blob/master/docs/OPTIONS.md#hideelements-5) from a screenshot by adding `visibility: hidden` or `display: none` to the styling for the passed elements. Is this a feature that we might see in the future with playwright? Would anyone else benefit from the ability to exclude elements from screenshots? I would love to see something like this: ```javascript page.screenshot({fullpage: true, hideElements: ['div.dynamic_content', 'div#profilePicture']}) ```</div>
1.0
Hide/remove Elements from Screenshots - ### Discussed in https://github.com/microsoft/playwright/discussions/5068 <div type='discussions-op-text'> <sup>Originally posted by **rollin-cogers** January 20, 2021</sup> Hey everyone! I've been very excited to use this tool for testing, as I've previously been using protractor for all my testing. In the past I've used modules like webdriver-image-comparison that allow for options like [hiding and removing elements](https://github.com/wswebcreation/webdriver-image-comparison/blob/master/docs/OPTIONS.md#hideelements-5) from a screenshot by adding `visibility: hidden` or `display: none` to the styling for the passed elements. Is this a feature that we might see in the future with playwright? Would anyone else benefit from the ability to exclude elements from screenshots? I would love to see something like this: ```javascript page.screenshot({fullpage: true, hideElements: ['div.dynamic_content', 'div#profilePicture']}) ```</div>
non_priority
hide remove elements from screenshots discussed in originally posted by rollin cogers january hey everyone i ve been very excited to use this tool for testing as i ve previously been using protractor for all my testing in the past i ve used modules like webdriver image comparison that allow for options like from a screenshot by adding visibility hidden or display none to the styling for the passed elements is this a feature that we might see in the future with playwright would anyone else benefit from the ability to exclude elements from screenshots i would love to see something like this javascript page screenshot fullpage true hideelements
0
12,549
3,281,800,760
IssuesEvent
2015-10-28 00:28:10
d3athrow/vgstation13
https://api.github.com/repos/d3athrow/vgstation13
closed
BLINDED BY MY HATE FOR OXYGEN-BREATHERS
Bug Needs Moar Testing
AFTER BEING BOMBED BY AN OXYGEN BREATHER I WAS CLONED. DURING THE TIME I WAS BEING CLONED I BECAME BLINDED BY MY HATE FOR THOSE WHO BREATHE TOXINS OFF THE O2 ![OFFTHEO2](http://puu.sh/jnXta/797303086b.png)
1.0
BLINDED BY MY HATE FOR OXYGEN-BREATHERS - AFTER BEING BOMBED BY AN OXYGEN BREATHER I WAS CLONED. DURING THE TIME I WAS BEING CLONED I BECAME BLINDED BY MY HATE FOR THOSE WHO BREATHE TOXINS OFF THE O2 ![OFFTHEO2](http://puu.sh/jnXta/797303086b.png)
non_priority
blinded by my hate for oxygen breathers after being bombed by an oxygen breather i was cloned during the time i was being cloned i became blinded by my hate for those who breathe toxins off the
0
211,441
23,826,148,690
IssuesEvent
2022-09-05 15:01:24
sast-automation-dev/easybuggy-12
https://api.github.com/repos/sast-automation-dev/easybuggy-12
opened
esapi-2.1.0.1.jar: 14 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>esapi-2.1.0.1.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2016-1000031](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2016-2510](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | bsh-core-2.0b4.jar | Transitive | N/A | &#10060; | | [CVE-2016-3092](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3092) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2012-0881](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-0881) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xercesImpl-2.8.0.jar | Transitive | N/A | &#10060; | | [WS-2014-0034](https://commons.apache.org/proper/commons-fileupload/changes-report.html) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2014-0107](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0107) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | xalan-2.7.0.jar | Transitive | 2.5.0.0 | &#9989; | | [CVE-2019-10086](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2014-0114](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | N/A | &#10060; | | [CVE-2016-10006](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10006) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2017-14735](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-14735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2013-4002](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-4002) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | xercesImpl-2.8.0.jar | Transitive | N/A | &#10060; | | [CVE-2009-2625](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2009-2625) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | xercesImpl-2.8.0.jar | Transitive | N/A | &#10060; | | [CVE-2012-5783](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2021-29425](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.2.jar | Transitive | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000031</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution <p>Publish Date: 2016-10-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p> <p>Release Date: 2016-10-25</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2510</summary> ### Vulnerable Library - <b>bsh-core-2.0b4.jar</b></p> <p>BeanShell core</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh-core/2.0b4/bsh-core-2.0b4.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **bsh-core-2.0b4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. <p>Publish Date: 2016-04-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510>CVE-2016-2510</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p> <p>Release Date: 2016-04-07</p> <p>Fix Resolution: 2.0b6</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-3092</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. <p>Publish Date: 2016-07-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3092>CVE-2016-3092</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092</a></p> <p>Release Date: 2016-07-04</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2012-0881</summary> ### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p> <p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.</p> <p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xercesImpl-2.8.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions. <p>Publish Date: 2017-10-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-0881>CVE-2012-0881</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881</a></p> <p>Release Date: 2017-10-30</p> <p>Fix Resolution: 2.12.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2014-0034</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The class FileUploadBase in Apache Commons Fileupload before 1.4 has potential resource leak - InputStream not closed on exception. <p>Publish Date: 2014-02-17 <p>URL: <a href=https://commons.apache.org/proper/commons-fileupload/changes-report.html>WS-2014-0034</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2014-02-17</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0107</summary> ### Vulnerable Library - <b>xalan-2.7.0.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xalan-2.7.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function. <p>Publish Date: 2014-04-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0107>CVE-2014-0107</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107</a></p> <p>Release Date: 2014-04-15</p> <p>Fix Resolution (xalan:xalan): 2.7.1-NODEP</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.5.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10086</summary> ### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p> <p>The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.</p> <p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. <p>Publish Date: 2019-08-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10086>CVE-2019-10086</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-08-20</p> <p>Fix Resolution (commons-beanutils:commons-beanutils-core): 1.8.3-SONATYPE</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0114</summary> ### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p> <p>The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.</p> <p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. <p>Publish Date: 2014-04-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0114>CVE-2014-0114</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114</a></p> <p>Release Date: 2014-04-30</p> <p>Fix Resolution: commons-beanutils:commons-beanutils:1.9.4;org.apache.struts:struts2-core:2.0.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10006</summary> ### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p> <p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.</p> <p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **antisamy-1.5.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS. <p>Publish Date: 2016-12-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10006>CVE-2016-10006</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006</a></p> <p>Release Date: 2016-12-24</p> <p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.5</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-14735</summary> ### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p> <p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.</p> <p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **antisamy-1.5.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of &colon; to construct a javascript: URL. <p>Publish Date: 2017-09-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-14735>CVE-2017-14735</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735</a></p> <p>Release Date: 2017-09-25</p> <p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.7</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2013-4002</summary> ### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p> <p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.</p> <p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xercesImpl-2.8.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names. <p>Publish Date: 2013-07-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-4002>CVE-2013-4002</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002</a></p> <p>Release Date: 2013-07-23</p> <p>Fix Resolution: xerces:xercesImpl:Xerces-J_2_12_0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2009-2625</summary> ### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p> <p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.</p> <p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xercesImpl-2.8.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework. <p>Publish Date: 2009-08-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2009-2625>CVE-2009-2625</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">https://nvd.nist.gov/vuln/detail/CVE-2009-2625</a></p> <p>Release Date: 2009-08-06</p> <p>Fix Resolution: apache-xerces:xercesImpl - 2.9.1;xerces:xercesImpl - 2.9.1-NODEP,2.3.0,2.9.0;org.apache.servicemix.bundles:org.apache.servicemix.bundles.xerces - 2.10.0_1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2012-5783</summary> ### Vulnerable Library - <b>commons-httpclient-3.1.jar</b></p> <p>The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.</p> <p>Library home page: <a href="http://jakarta.apache.org/httpcomponents/httpclient-3.x/">http://jakarta.apache.org/httpcomponents/httpclient-3.x/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - antisamy-1.5.3.jar - :x: **commons-httpclient-3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. <p>Publish Date: 2012-11-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-5783>CVE-2012-5783</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">https://nvd.nist.gov/vuln/detail/CVE-2012-5783</a></p> <p>Release Date: 2012-11-04</p> <p>Fix Resolution (commons-httpclient:commons-httpclient): 3.1-HTTPCLIENT-1265</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-29425</summary> ### Vulnerable Library - <b>commons-io-2.2.jar</b></p> <p>The Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.</p> <p>Library home page: <a href="http://commons.apache.org/io/">http://commons.apache.org/io/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.2/commons-io-2.2.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - commons-fileupload-1.3.1.jar - :x: **commons-io-2.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. <p>Publish Date: 2021-04-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29425>CVE-2021-29425</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p> <p>Release Date: 2021-04-13</p> <p>Fix Resolution: commons-io:commons-io:2.7</p> </p> <p></p> </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
esapi-2.1.0.1.jar: 14 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>esapi-2.1.0.1.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2016-1000031](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2016-2510](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | bsh-core-2.0b4.jar | Transitive | N/A | &#10060; | | [CVE-2016-3092](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3092) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2012-0881](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-0881) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xercesImpl-2.8.0.jar | Transitive | N/A | &#10060; | | [WS-2014-0034](https://commons.apache.org/proper/commons-fileupload/changes-report.html) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-fileupload-1.3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2014-0107](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0107) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | xalan-2.7.0.jar | Transitive | 2.5.0.0 | &#9989; | | [CVE-2019-10086](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10086) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2014-0114](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0114) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.3 | commons-beanutils-core-1.8.3.jar | Transitive | N/A | &#10060; | | [CVE-2016-10006](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10006) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2017-14735](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-14735) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | antisamy-1.5.3.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2013-4002](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-4002) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.9 | xercesImpl-2.8.0.jar | Transitive | N/A | &#10060; | | [CVE-2009-2625](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2009-2625) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | xercesImpl-2.8.0.jar | Transitive | N/A | &#10060; | | [CVE-2012-5783](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-5783) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-httpclient-3.1.jar | Transitive | 2.2.0.0 | &#9989; | | [CVE-2021-29425](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 4.8 | commons-io-2.2.jar | Transitive | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-1000031</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution <p>Publish Date: 2016-10-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p> <p>Release Date: 2016-10-25</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-2510</summary> ### Vulnerable Library - <b>bsh-core-2.0b4.jar</b></p> <p>BeanShell core</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh-core/2.0b4/bsh-core-2.0b4.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **bsh-core-2.0b4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. <p>Publish Date: 2016-04-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510>CVE-2016-2510</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p> <p>Release Date: 2016-04-07</p> <p>Fix Resolution: 2.0b6</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-3092</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string. <p>Publish Date: 2016-07-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-3092>CVE-2016-3092</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092</a></p> <p>Release Date: 2016-07-04</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2012-0881</summary> ### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p> <p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.</p> <p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xercesImpl-2.8.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions. <p>Publish Date: 2017-10-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-0881>CVE-2012-0881</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0881</a></p> <p>Release Date: 2017-10-30</p> <p>Fix Resolution: 2.12.0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2014-0034</summary> ### Vulnerable Library - <b>commons-fileupload-1.3.1.jar</b></p> <p>The Apache Commons FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Library home page: <a href="http://commons.apache.org/proper/commons-fileupload/">http://commons.apache.org/proper/commons-fileupload/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-fileupload/commons-fileupload/1.3.1/commons-fileupload-1.3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-fileupload-1.3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The class FileUploadBase in Apache Commons Fileupload before 1.4 has potential resource leak - InputStream not closed on exception. <p>Publish Date: 2014-02-17 <p>URL: <a href=https://commons.apache.org/proper/commons-fileupload/changes-report.html>WS-2014-0034</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2014-02-17</p> <p>Fix Resolution (commons-fileupload:commons-fileupload): 1.3.1-jenkins-1</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0107</summary> ### Vulnerable Library - <b>xalan-2.7.0.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xalan/xalan/2.7.0/xalan-2.7.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xalan-2.7.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The TransformerFactory in Apache Xalan-Java before 2.7.2 does not properly restrict access to certain properties when FEATURE_SECURE_PROCESSING is enabled, which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted (1) xalan:content-header, (2) xalan:entities, (3) xslt:content-header, or (4) xslt:entities property, or a Java property that is bound to the XSLT 1.0 system-property function. <p>Publish Date: 2014-04-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0107>CVE-2014-0107</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0107</a></p> <p>Release Date: 2014-04-15</p> <p>Fix Resolution (xalan:xalan): 2.7.1-NODEP</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.5.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10086</summary> ### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p> <p>The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.</p> <p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Apache Commons Beanutils 1.9.2, a special BeanIntrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all Java objects. We, however were not using this by default characteristic of the PropertyUtilsBean. <p>Publish Date: 2019-08-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10086>CVE-2019-10086</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-08-20</p> <p>Fix Resolution (commons-beanutils:commons-beanutils-core): 1.8.3-SONATYPE</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2014-0114</summary> ### Vulnerable Library - <b>commons-beanutils-core-1.8.3.jar</b></p> <p>The Apache Software Foundation provides support for the Apache community of open-source software projects. The Apache projects are characterized by a collaborative, consensus based development process, an open and pragmatic software license, and a desire to create high quality software that leads the way in its field. We consider ourselves not simply a group of projects sharing a server, but rather a community of developers and users.</p> <p>Library home page: <a href="http://commons.apache.org/beanutils/">http://commons.apache.org/beanutils/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-beanutils/commons-beanutils-core/1.8.3/commons-beanutils-core-1.8.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **commons-beanutils-core-1.8.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. <p>Publish Date: 2014-04-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-0114>CVE-2014-0114</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0114</a></p> <p>Release Date: 2014-04-30</p> <p>Fix Resolution: commons-beanutils:commons-beanutils:1.9.4;org.apache.struts:struts2-core:2.0.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2016-10006</summary> ### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p> <p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.</p> <p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **antisamy-1.5.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In OWASP AntiSamy before 1.5.5, by submitting a specially crafted input (a tag that supports style with active content), you could bypass the library protections and supply executable code. The impact is XSS. <p>Publish Date: 2016-12-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-10006>CVE-2016-10006</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10006</a></p> <p>Release Date: 2016-12-24</p> <p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.5</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2017-14735</summary> ### Vulnerable Library - <b>antisamy-1.5.3.jar</b></p> <p>The OWASP AntiSamy project is a collection of APIs for safely allowing users to supply their own HTML and CSS without exposing the site to XSS vulnerabilities.</p> <p>Library home page: <a href="http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project">http://www.owasp.org/index.php/Category:OWASP_AntiSamy_Project</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/owasp/antisamy/antisamy/1.5.3/antisamy-1.5.3.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - :x: **antisamy-1.5.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> OWASP AntiSamy before 1.5.7 allows XSS via HTML5 entities, as demonstrated by use of &colon; to construct a javascript: URL. <p>Publish Date: 2017-09-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-14735>CVE-2017-14735</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-14735</a></p> <p>Release Date: 2017-09-25</p> <p>Fix Resolution (org.owasp.antisamy:antisamy): 1.5.7</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2013-4002</summary> ### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p> <p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.</p> <p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xercesImpl-2.8.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, Java SE Embedded 7u40 and earlier, and possibly other products allows remote attackers to cause a denial of service via vectors related to XML attribute names. <p>Publish Date: 2013-07-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2013-4002>CVE-2013-4002</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4002</a></p> <p>Release Date: 2013-07-23</p> <p>Fix Resolution: xerces:xercesImpl:Xerces-J_2_12_0</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2009-2625</summary> ### Vulnerable Library - <b>xercesImpl-2.8.0.jar</b></p> <p>Xerces2 is the next generation of high performance, fully compliant XML parsers in the Apache Xerces family. This new version of Xerces introduces the Xerces Native Interface (XNI), a complete framework for building parser components and configurations that is extremely modular and easy to program.</p> <p>Library home page: <a href="http://xerces.apache.org/xerces2-j">http://xerces.apache.org/xerces2-j</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/xerces/xercesImpl/2.8.0/xercesImpl-2.8.0.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - xom-1.2.5.jar - :x: **xercesImpl-2.8.0.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework. <p>Publish Date: 2009-08-06 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2009-2625>CVE-2009-2625</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2009-2625">https://nvd.nist.gov/vuln/detail/CVE-2009-2625</a></p> <p>Release Date: 2009-08-06</p> <p>Fix Resolution: apache-xerces:xercesImpl - 2.9.1;xerces:xercesImpl - 2.9.1-NODEP,2.3.0,2.9.0;org.apache.servicemix.bundles:org.apache.servicemix.bundles.xerces - 2.10.0_1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2012-5783</summary> ### Vulnerable Library - <b>commons-httpclient-3.1.jar</b></p> <p>The HttpClient component supports the client-side of RFC 1945 (HTTP/1.0) and RFC 2616 (HTTP/1.1) , several related specifications (RFC 2109 (Cookies) , RFC 2617 (HTTP Authentication) , etc.), and provides a framework by which new request types (methods) or HTTP extensions can be created easily.</p> <p>Library home page: <a href="http://jakarta.apache.org/httpcomponents/httpclient-3.x/">http://jakarta.apache.org/httpcomponents/httpclient-3.x/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-httpclient/commons-httpclient/3.1/commons-httpclient-3.1.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - antisamy-1.5.3.jar - :x: **commons-httpclient-3.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. <p>Publish Date: 2012-11-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2012-5783>CVE-2012-5783</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2012-5783">https://nvd.nist.gov/vuln/detail/CVE-2012-5783</a></p> <p>Release Date: 2012-11-04</p> <p>Fix Resolution (commons-httpclient:commons-httpclient): 3.1-HTTPCLIENT-1265</p> <p>Direct dependency fix Resolution (org.owasp.esapi:esapi): 2.2.0.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-29425</summary> ### Vulnerable Library - <b>commons-io-2.2.jar</b></p> <p>The Commons IO library contains utility classes, stream implementations, file filters, file comparators, endian transformation classes, and much more.</p> <p>Library home page: <a href="http://commons.apache.org/io/">http://commons.apache.org/io/</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.2/commons-io-2.2.jar</p> <p> Dependency Hierarchy: - esapi-2.1.0.1.jar (Root Library) - commons-fileupload-1.3.1.jar - :x: **commons-io-2.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/easybuggy-12/commit/f73b332cff4b14eaedb777ef34c136f17639810b">f73b332cff4b14eaedb777ef34c136f17639810b</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value. <p>Publish Date: 2021-04-13 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29425>CVE-2021-29425</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>4.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p> <p>Release Date: 2021-04-13</p> <p>Fix Resolution: commons-io:commons-io:2.7</p> </p> <p></p> </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
esapi jar vulnerabilities highest severity is vulnerable library esapi jar path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high commons fileupload jar transitive high bsh core jar transitive n a high commons fileupload jar transitive high xercesimpl jar transitive n a high commons fileupload jar transitive high xalan jar transitive high commons beanutils core jar transitive high commons beanutils core jar transitive n a medium antisamy jar transitive medium antisamy jar transitive medium xercesimpl jar transitive n a medium xercesimpl jar transitive n a medium commons httpclient jar transitive medium commons io jar transitive n a details cve vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy esapi jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons fileupload before diskfileitem file manipulation remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons fileupload commons fileupload jenkins direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library bsh core jar beanshell core path to dependency file pom xml path to vulnerable library home wss scanner repository org beanshell bsh core bsh core jar dependency hierarchy esapi jar root library x bsh core jar vulnerable library found in head commit a href found in base branch master vulnerability details beanshell bsh before when included on the classpath by an application that uses java serialization or xstream allows remote attackers to execute arbitrary code via crafted serialized data related to xthis handler publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cve vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy esapi jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details the multipartstream class in apache commons fileupload before as used in apache tomcat x before x before x before and x before and other products allows remote attackers to cause a denial of service cpu consumption via a long boundary string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons fileupload commons fileupload jenkins direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library xercesimpl jar is the next generation of high performance fully compliant xml parsers in the apache xerces family this new version of xerces introduces the xerces native interface xni a complete framework for building parser components and configurations that is extremely modular and easy to program library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar dependency hierarchy esapi jar root library xom jar x xercesimpl jar vulnerable library found in head commit a href found in base branch master vulnerability details apache java parser before allows remote attackers to cause a denial of service cpu consumption via a crafted message to an xml service which triggers hash table collisions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ws vulnerable library commons fileupload jar the apache commons fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy esapi jar root library x commons fileupload jar vulnerable library found in head commit a href found in base branch master vulnerability details the class fileuploadbase in apache commons fileupload before has potential resource leak inputstream not closed on exception publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution commons fileupload commons fileupload jenkins direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library xalan jar path to dependency file pom xml path to vulnerable library home wss scanner repository xalan xalan xalan jar dependency hierarchy esapi jar root library xom jar x xalan jar vulnerable library found in head commit a href found in base branch master vulnerability details the transformerfactory in apache xalan java before does not properly restrict access to certain properties when feature secure processing is enabled which allows remote attackers to bypass expected restrictions and load arbitrary classes or access external resources via a crafted xalan content header xalan entities xslt content header or xslt entities property or a java property that is bound to the xslt system property function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution xalan xalan nodep direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons beanutils core jar the apache software foundation provides support for the apache community of open source software projects the apache projects are characterized by a collaborative consensus based development process an open and pragmatic software license and a desire to create high quality software that leads the way in its field we consider ourselves not simply a group of projects sharing a server but rather a community of developers and users library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons beanutils commons beanutils core commons beanutils core jar dependency hierarchy esapi jar root library x commons beanutils core jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache commons beanutils a special beanintrospector class was added which allows suppressing the ability for an attacker to access the classloader via the class property available on all java objects we however were not using this by default characteristic of the propertyutilsbean publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution commons beanutils commons beanutils core sonatype direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons beanutils core jar the apache software foundation provides support for the apache community of open source software projects the apache projects are characterized by a collaborative consensus based development process an open and pragmatic software license and a desire to create high quality software that leads the way in its field we consider ourselves not simply a group of projects sharing a server but rather a community of developers and users library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons beanutils commons beanutils core commons beanutils core jar dependency hierarchy esapi jar root library x commons beanutils core jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons beanutils as distributed in lib commons beanutils jar in apache struts x through and in other products requiring commons beanutils through does not suppress the class property which allows remote attackers to manipulate the classloader and execute arbitrary code via the class parameter as demonstrated by the passing of this parameter to the getclass method of the actionform object in struts publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons beanutils commons beanutils org apache struts core cve vulnerable library antisamy jar the owasp antisamy project is a collection of apis for safely allowing users to supply their own html and css without exposing the site to xss vulnerabilities library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org owasp antisamy antisamy antisamy jar dependency hierarchy esapi jar root library x antisamy jar vulnerable library found in head commit a href found in base branch master vulnerability details in owasp antisamy before by submitting a specially crafted input a tag that supports style with active content you could bypass the library protections and supply executable code the impact is xss publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org owasp antisamy antisamy direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library antisamy jar the owasp antisamy project is a collection of apis for safely allowing users to supply their own html and css without exposing the site to xss vulnerabilities library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org owasp antisamy antisamy antisamy jar dependency hierarchy esapi jar root library x antisamy jar vulnerable library found in head commit a href found in base branch master vulnerability details owasp antisamy before allows xss via entities as demonstrated by use of colon to construct a javascript url publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org owasp antisamy antisamy direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library xercesimpl jar is the next generation of high performance fully compliant xml parsers in the apache xerces family this new version of xerces introduces the xerces native interface xni a complete framework for building parser components and configurations that is extremely modular and easy to program library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar dependency hierarchy esapi jar root library xom jar x xercesimpl jar vulnerable library found in head commit a href found in base branch master vulnerability details xmlscanner java in apache java parser before as used in the java runtime environment jre in ibm java before before before and before as well as oracle java se and earlier java se and earlier java se and earlier jrockit and earlier jrockit and earlier java se embedded and earlier and possibly other products allows remote attackers to cause a denial of service via vectors related to xml attribute names publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution xerces xercesimpl xerces j cve vulnerable library xercesimpl jar is the next generation of high performance fully compliant xml parsers in the apache xerces family this new version of xerces introduces the xerces native interface xni a complete framework for building parser components and configurations that is extremely modular and easy to program library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository xerces xercesimpl xercesimpl jar dependency hierarchy esapi jar root library xom jar x xercesimpl jar vulnerable library found in head commit a href found in base branch master vulnerability details xmlscanner java in apache java as used in sun java runtime environment jre in jdk and jre before update and jdk and jre before update and in other products allows remote attackers to cause a denial of service infinite loop and application hang via malformed xml input as demonstrated by the codenomicon xml fuzzing framework publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution apache xerces xercesimpl xerces xercesimpl nodep org apache servicemix bundles org apache servicemix bundles xerces cve vulnerable library commons httpclient jar the httpclient component supports the client side of rfc http and rfc http several related specifications rfc cookies rfc http authentication etc and provides a framework by which new request types methods or http extensions can be created easily library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons httpclient commons httpclient commons httpclient jar dependency hierarchy esapi jar root library antisamy jar x commons httpclient jar vulnerable library found in head commit a href found in base branch master vulnerability details apache commons httpclient x as used in amazon flexible payments service fps merchant java sdk and other products does not verify that the server hostname matches a domain name in the subject s common name cn or subjectaltname field of the x certificate which allows man in the middle attackers to spoof ssl servers via an arbitrary valid certificate publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons httpclient commons httpclient httpclient direct dependency fix resolution org owasp esapi esapi rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons io jar the commons io library contains utility classes stream implementations file filters file comparators endian transformation classes and much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons io commons io commons io jar dependency hierarchy esapi jar root library commons fileupload jar x commons io jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache commons io before when invoking the method filenameutils normalize with an improper input string like foo or foo the result would be the same value thus possibly providing access to files in the parent directory but not further above thus limited path traversal if the calling code would use the result to construct a path value publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons io commons io rescue worker helmet automatic remediation is available for this issue
0
95,618
10,883,868,999
IssuesEvent
2019-11-18 06:36:27
patriciadevina/this-is-a-test-repo
https://api.github.com/repos/patriciadevina/this-is-a-test-repo
opened
Issue for
bug documentation duplicate enhancement good first issue help wanted
Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​TEST NOV 18 ​ ​151115111511151115111511151115111511151115111511
1.0
Issue for - Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​Issue for ​ ​TEST NOV 18 ​ ​151115111511151115111511151115111511151115111511
non_priority
issue for issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​issue for ​ ​test nov ​ ​
0
3,711
10,041,266,044
IssuesEvent
2019-07-18 22:14:29
Azure/azure-sdk
https://api.github.com/repos/Azure/azure-sdk
closed
Change Request: define "progressive concept disclosure" for all languages
architecture
## The Basics * Which design guideline is affected? The "Approachable" design principle [here](https://github.com/Azure/azure-sdk/blob/b31d1ae11ab1739344d5ab2991ded7fc3d370776/docs/design/general/DesignPrinciples.mdk#L24) * Which target languages are affected? All * Describe the change: Add a definition (or a link) for "progressive concept disclosure". ## Reasoning This is not a standard enough term to simply use it without explaining it. People reading the design guidelines will almost certainly need additional context here.
1.0
Change Request: define "progressive concept disclosure" for all languages - ## The Basics * Which design guideline is affected? The "Approachable" design principle [here](https://github.com/Azure/azure-sdk/blob/b31d1ae11ab1739344d5ab2991ded7fc3d370776/docs/design/general/DesignPrinciples.mdk#L24) * Which target languages are affected? All * Describe the change: Add a definition (or a link) for "progressive concept disclosure". ## Reasoning This is not a standard enough term to simply use it without explaining it. People reading the design guidelines will almost certainly need additional context here.
non_priority
change request define progressive concept disclosure for all languages the basics which design guideline is affected the approachable design principle which target languages are affected all describe the change add a definition or a link for progressive concept disclosure reasoning this is not a standard enough term to simply use it without explaining it people reading the design guidelines will almost certainly need additional context here
0
216,683
16,795,224,917
IssuesEvent
2021-06-16 01:52:44
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: dump roachtest goroutine stacks on SIGINT
A-testing C-enhancement X-stale no-issue-activity
Roachtest currently intercepts `SIGINT` and uses it to attempt to fail and cleanup running tests. For debugging roachtest itself, we should extend this to dumping the stacktraces of all running goroutines at the time `SIGINT` is received (i.e. before the cleanup is performed).
1.0
roachtest: dump roachtest goroutine stacks on SIGINT - Roachtest currently intercepts `SIGINT` and uses it to attempt to fail and cleanup running tests. For debugging roachtest itself, we should extend this to dumping the stacktraces of all running goroutines at the time `SIGINT` is received (i.e. before the cleanup is performed).
non_priority
roachtest dump roachtest goroutine stacks on sigint roachtest currently intercepts sigint and uses it to attempt to fail and cleanup running tests for debugging roachtest itself we should extend this to dumping the stacktraces of all running goroutines at the time sigint is received i e before the cleanup is performed
0
201,789
23,039,651,929
IssuesEvent
2022-07-23 01:08:31
turkdevops/snyk
https://api.github.com/repos/turkdevops/snyk
opened
CVE-2022-31090 (Medium) detected in guzzlehttp/guzzle-6.3.0
security vulnerability
## CVE-2022-31090 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guzzlehttp/guzzle-6.3.0</b></p></summary> <p>Guzzle, an extensible PHP HTTP client</p> <p> Dependency Hierarchy: - aws/aws-sdk-php-3.0.0 (Root Library) - :x: **guzzlehttp/guzzle-6.3.0** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/snyk/commit/9505f4ca92405cc9273dc3726c2d274ce28a4407">9505f4ca92405cc9273dc3726c2d274ce28a4407</a></p> <p>Found in base branch: <b>ALL_HANDS/major-secrets</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization` header to the new request. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle steam handler backend, rather than curl. <p>Publish Date: 2022-06-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-31090>CVE-2022-31090</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r">https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r</a></p> <p>Release Date: 2022-05-19</p> <p>Fix Resolution: 6.5.8,7.4.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-31090 (Medium) detected in guzzlehttp/guzzle-6.3.0 - ## CVE-2022-31090 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>guzzlehttp/guzzle-6.3.0</b></p></summary> <p>Guzzle, an extensible PHP HTTP client</p> <p> Dependency Hierarchy: - aws/aws-sdk-php-3.0.0 (Root Library) - :x: **guzzlehttp/guzzle-6.3.0** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/snyk/commit/9505f4ca92405cc9273dc3726c2d274ce28a4407">9505f4ca92405cc9273dc3726c2d274ce28a4407</a></p> <p>Found in base branch: <b>ALL_HANDS/major-secrets</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Guzzle, an extensible PHP HTTP client. `Authorization` headers on requests are sensitive information. In affected versions when using our Curl handler, it is possible to use the `CURLOPT_HTTPAUTH` option to specify an `Authorization` header. On making a request which responds with a redirect to a URI with a different origin (change in host, scheme or port), if we choose to follow it, we should remove the `CURLOPT_HTTPAUTH` option before continuing, stopping curl from appending the `Authorization` header to the new request. Affected Guzzle 7 users should upgrade to Guzzle 7.4.5 as soon as possible. Affected users using any earlier series of Guzzle should upgrade to Guzzle 6.5.8 or 7.4.5. Note that a partial fix was implemented in Guzzle 7.4.2, where a change in host would trigger removal of the curl-added Authorization header, however this earlier fix did not cover change in scheme or change in port. If you do not require or expect redirects to be followed, one should simply disable redirects all together. Alternatively, one can specify to use the Guzzle steam handler backend, rather than curl. <p>Publish Date: 2022-06-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-31090>CVE-2022-31090</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r">https://github.com/guzzle/guzzle/security/advisories/GHSA-25mq-v84q-4j7r</a></p> <p>Release Date: 2022-05-19</p> <p>Fix Resolution: 6.5.8,7.4.5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in guzzlehttp guzzle cve medium severity vulnerability vulnerable library guzzlehttp guzzle guzzle an extensible php http client dependency hierarchy aws aws sdk php root library x guzzlehttp guzzle vulnerable library found in head commit a href found in base branch all hands major secrets vulnerability details guzzle an extensible php http client authorization headers on requests are sensitive information in affected versions when using our curl handler it is possible to use the curlopt httpauth option to specify an authorization header on making a request which responds with a redirect to a uri with a different origin change in host scheme or port if we choose to follow it we should remove the curlopt httpauth option before continuing stopping curl from appending the authorization header to the new request affected guzzle users should upgrade to guzzle as soon as possible affected users using any earlier series of guzzle should upgrade to guzzle or note that a partial fix was implemented in guzzle where a change in host would trigger removal of the curl added authorization header however this earlier fix did not cover change in scheme or change in port if you do not require or expect redirects to be followed one should simply disable redirects all together alternatively one can specify to use the guzzle steam handler backend rather than curl publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
71,596
30,913,709,156
IssuesEvent
2023-08-05 02:41:13
Zahlungsmittel/Zahlungsmittel
https://api.github.com/repos/Zahlungsmittel/Zahlungsmittel
opened
[CLOSED] change getCustomRepository to createUser function
bug service: backend service: database imported
<a href="https://github.com/ogerly"><img src="https://avatars.githubusercontent.com/u/1324583?v=4" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [ogerly](https://github.com/ogerly)** _Tuesday Oct 26, 2021 at 15:49 GMT_ _Originally opened as https://github.com/gradido/gradido/pull/1046_ ---- ## 🍰 Pullrequest wenn ich einen neuen user anlege im localen bereich, wird dieser nach dem speichern nicht richtig übergeben. ich habe auf zeile 148 folgendes eingefügt > const userRepository = getCustomRepository(UserRepository) und auf zeile 149 folgendes geändert > userRepository.save(dbuser).catch(() => { ---- _**[ogerly](https://github.com/ogerly)** included the following code: https://github.com/gradido/gradido/pull/1046/commits_
2.0
[CLOSED] change getCustomRepository to createUser function - <a href="https://github.com/ogerly"><img src="https://avatars.githubusercontent.com/u/1324583?v=4" align="left" width="96" height="96" hspace="10"></img></a> **Issue by [ogerly](https://github.com/ogerly)** _Tuesday Oct 26, 2021 at 15:49 GMT_ _Originally opened as https://github.com/gradido/gradido/pull/1046_ ---- ## 🍰 Pullrequest wenn ich einen neuen user anlege im localen bereich, wird dieser nach dem speichern nicht richtig übergeben. ich habe auf zeile 148 folgendes eingefügt > const userRepository = getCustomRepository(UserRepository) und auf zeile 149 folgendes geändert > userRepository.save(dbuser).catch(() => { ---- _**[ogerly](https://github.com/ogerly)** included the following code: https://github.com/gradido/gradido/pull/1046/commits_
non_priority
change getcustomrepository to createuser function issue by tuesday oct at gmt originally opened as 🍰 pullrequest wenn ich einen neuen user anlege im localen bereich wird dieser nach dem speichern nicht richtig übergeben ich habe auf zeile folgendes eingefügt const userrepository getcustomrepository userrepository und auf zeile folgendes geändert userrepository save dbuser catch included the following code
0
42,960
23,057,096,173
IssuesEvent
2022-07-25 06:17:45
PavelBlend/blender-xray
https://api.github.com/repos/PavelBlend/blender-xray
opened
Выдавать предупреждения, если файлы и папки в настройках некорректны
convenience performance
Это нужно для того, что пользователь знал, что параметр `export path` и путь к текстурам может быть некорректным.
True
Выдавать предупреждения, если файлы и папки в настройках некорректны - Это нужно для того, что пользователь знал, что параметр `export path` и путь к текстурам может быть некорректным.
non_priority
выдавать предупреждения если файлы и папки в настройках некорректны это нужно для того что пользователь знал что параметр export path и путь к текстурам может быть некорректным
0
133,333
12,536,753,251
IssuesEvent
2020-06-05 01:08:28
MLH-Fellowship/0.0.1-API-Parser
https://api.github.com/repos/MLH-Fellowship/0.0.1-API-Parser
closed
Compare Repology API packages vs HomeBrew API packages
bug documentation help wanted
Compare the Repology packages to the HomeBrew packages. If Repology Version Number > HomeBrew Version Number then we will make that into a new .json file. The new .json file will allow us to see what packages on HomeBrew are outdated.
1.0
Compare Repology API packages vs HomeBrew API packages - Compare the Repology packages to the HomeBrew packages. If Repology Version Number > HomeBrew Version Number then we will make that into a new .json file. The new .json file will allow us to see what packages on HomeBrew are outdated.
non_priority
compare repology api packages vs homebrew api packages compare the repology packages to the homebrew packages if repology version number homebrew version number then we will make that into a new json file the new json file will allow us to see what packages on homebrew are outdated
0
47,119
13,204,167,923
IssuesEvent
2020-08-14 15:24:56
xinYG/bootstrap-timepicker
https://api.github.com/repos/xinYG/bootstrap-timepicker
opened
WS-2019-0064 (High) detected in handlebars-4.0.10.min.js, handlebars-4.0.10.js
security vulnerability
## WS-2019-0064 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>handlebars-4.0.10.min.js</b>, <b>handlebars-4.0.10.js</b></p></summary> <p> <details><summary><b>handlebars-4.0.10.min.js</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.min.js">https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.min.js</a></p> <p>Path to vulnerable library: /bootstrap-timepicker/node_modules/bower/lib/node_modules/handlebars/dist/handlebars.min.js</p> <p> Dependency Hierarchy: - :x: **handlebars-4.0.10.min.js** (Vulnerable Library) </details> <details><summary><b>handlebars-4.0.10.js</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.js">https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.js</a></p> <p>Path to vulnerable library: /bootstrap-timepicker/node_modules/bower/lib/node_modules/handlebars/dist/handlebars.js</p> <p> Dependency Hierarchy: - :x: **handlebars-4.0.10.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/xinYG/bootstrap-timepicker/commit/b011a55ee3bfce5d2fedf4fd780e4196d446c504">b011a55ee3bfce5d2fedf4fd780e4196d446c504</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. <p>Publish Date: 2019-01-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"handlebars.js","packageVersion":"4.0.10","isTransitiveDependency":false,"dependencyTree":"handlebars.js:4.0.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"},{"packageType":"JavaScript","packageName":"handlebars.js","packageVersion":"4.0.10","isTransitiveDependency":false,"dependencyTree":"handlebars.js:4.0.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"}],"vulnerabilityIdentifier":"WS-2019-0064","vulnerabilityDetails":"Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects\u0027 prototype, thus allowing an attacker to execute arbitrary code on the server.","vulnerabilityUrl":"https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> -->
True
WS-2019-0064 (High) detected in handlebars-4.0.10.min.js, handlebars-4.0.10.js - ## WS-2019-0064 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>handlebars-4.0.10.min.js</b>, <b>handlebars-4.0.10.js</b></p></summary> <p> <details><summary><b>handlebars-4.0.10.min.js</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.min.js">https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.min.js</a></p> <p>Path to vulnerable library: /bootstrap-timepicker/node_modules/bower/lib/node_modules/handlebars/dist/handlebars.min.js</p> <p> Dependency Hierarchy: - :x: **handlebars-4.0.10.min.js** (Vulnerable Library) </details> <details><summary><b>handlebars-4.0.10.js</b></p></summary> <p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.js">https://cdnjs.cloudflare.com/ajax/libs/handlebars.js/4.0.10/handlebars.js</a></p> <p>Path to vulnerable library: /bootstrap-timepicker/node_modules/bower/lib/node_modules/handlebars/dist/handlebars.js</p> <p> Dependency Hierarchy: - :x: **handlebars-4.0.10.js** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/xinYG/bootstrap-timepicker/commit/b011a55ee3bfce5d2fedf4fd780e4196d446c504">b011a55ee3bfce5d2fedf4fd780e4196d446c504</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server. <p>Publish Date: 2019-01-30 <p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"JavaScript","packageName":"handlebars.js","packageVersion":"4.0.10","isTransitiveDependency":false,"dependencyTree":"handlebars.js:4.0.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"},{"packageType":"JavaScript","packageName":"handlebars.js","packageVersion":"4.0.10","isTransitiveDependency":false,"dependencyTree":"handlebars.js:4.0.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.0.6-2,4.0.14,4.1.2"}],"vulnerabilityIdentifier":"WS-2019-0064","vulnerabilityDetails":"Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects\u0027 prototype, thus allowing an attacker to execute arbitrary code on the server.","vulnerabilityUrl":"https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2","cvss2Severity":"high","cvss2Score":"8.0","extraData":{}}</REMEDIATE> -->
non_priority
ws high detected in handlebars min js handlebars js ws high severity vulnerability vulnerable libraries handlebars min js handlebars js handlebars min js handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to vulnerable library bootstrap timepicker node modules bower lib node modules handlebars dist handlebars min js dependency hierarchy x handlebars min js vulnerable library handlebars js handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href path to vulnerable library bootstrap timepicker node modules bower lib node modules handlebars dist handlebars js dependency hierarchy x handlebars js vulnerable library found in head commit a href vulnerability details versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier ws vulnerabilitydetails versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server vulnerabilityurl
0
346,852
31,029,080,771
IssuesEvent
2023-08-10 11:11:41
status-im/status-mobile
https://api.github.com/repos/status-im/status-mobile
opened
e2e builds: can't invite user to closed community
e2e test blocker E:Mobile Bug MVP E:Mobile Communities MVP
# Bug Report ## Problem We need an ability to create communities on mobile for e2e tests. Currently we can't test closed community properly. That's not reproducible in https://github.com/status-im/status-mobile/pull/16806 where this feature was presented #### Expected behavior Community is shared #### Actual behavior [259719671-f04ea1b9-520a-4851-8521-cb6e34719bc7.webm](https://github.com/status-im/status-mobile/assets/29711298/10ee8399-9f1b-4f1e-9722-66a443c7965f) ### Reproduction 1. Create closed community 2. Click Invite people from contact list or Share community 3. Select contacts to invite 4. Click Invite button ### Additional Information - Status version: nightly e2e (x86) - Operating System: Android [comment]: # (Please, add logs/notes if necessary)
1.0
e2e builds: can't invite user to closed community - # Bug Report ## Problem We need an ability to create communities on mobile for e2e tests. Currently we can't test closed community properly. That's not reproducible in https://github.com/status-im/status-mobile/pull/16806 where this feature was presented #### Expected behavior Community is shared #### Actual behavior [259719671-f04ea1b9-520a-4851-8521-cb6e34719bc7.webm](https://github.com/status-im/status-mobile/assets/29711298/10ee8399-9f1b-4f1e-9722-66a443c7965f) ### Reproduction 1. Create closed community 2. Click Invite people from contact list or Share community 3. Select contacts to invite 4. Click Invite button ### Additional Information - Status version: nightly e2e (x86) - Operating System: Android [comment]: # (Please, add logs/notes if necessary)
non_priority
builds can t invite user to closed community bug report problem we need an ability to create communities on mobile for tests currently we can t test closed community properly that s not reproducible in where this feature was presented expected behavior community is shared actual behavior reproduction create closed community click invite people from contact list or share community select contacts to invite click invite button additional information status version nightly operating system android please add logs notes if necessary
0
13,980
3,371,153,051
IssuesEvent
2015-11-23 17:53:08
mozilla/123done
https://api.github.com/repos/mozilla/123done
closed
sign in button never shown if cookies are disabled
needs testcase waffle:backlog ★★★★
Just reporting this "for the record". I was checking an issue for 'requires cookies' screen in dialog and disabled cookies and loaded 123done.org. The sign in button stays as a spinner forever. This is obviously not a huge deal, since if the sign in were shown, clicking it would just say "you must enable cookies".
1.0
sign in button never shown if cookies are disabled - Just reporting this "for the record". I was checking an issue for 'requires cookies' screen in dialog and disabled cookies and loaded 123done.org. The sign in button stays as a spinner forever. This is obviously not a huge deal, since if the sign in were shown, clicking it would just say "you must enable cookies".
non_priority
sign in button never shown if cookies are disabled just reporting this for the record i was checking an issue for requires cookies screen in dialog and disabled cookies and loaded org the sign in button stays as a spinner forever this is obviously not a huge deal since if the sign in were shown clicking it would just say you must enable cookies
0
167,411
14,112,171,662
IssuesEvent
2020-11-07 03:42:10
AY2021S1-CS2103T-T09-1/tp
https://api.github.com/repos/AY2021S1-CS2103T-T09-1/tp
closed
DG: Tags feature
documentation type.Task
- Explain how tags work now with the new classes/implementations - Explain how `add`, `edit`, and `delete` now work with these new things - Maybe can explain how `tags` command lists all tags
1.0
DG: Tags feature - - Explain how tags work now with the new classes/implementations - Explain how `add`, `edit`, and `delete` now work with these new things - Maybe can explain how `tags` command lists all tags
non_priority
dg tags feature explain how tags work now with the new classes implementations explain how add edit and delete now work with these new things maybe can explain how tags command lists all tags
0
340,060
30,492,727,980
IssuesEvent
2023-07-18 08:48:12
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: kv/contention/nodes=4 failed
C-test-failure O-robot O-roachtest branch-master release-blocker T-kv
roachtest.kv/contention/nodes=4 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10950435?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10950435?buildTab=artifacts#/kv/contention/nodes=4) on master @ [7675ca4998134028f0623e04737b5cb69fcc33a9](https://github.com/cockroachdb/cockroach/commits/7675ca4998134028f0623e04737b5cb69fcc33a9): ``` (cluster.go:2180).Start: ~ COCKROACH_CONNECT_TIMEOUT=1200 ./cockroach sql --url 'postgres://root@localhost:26257?sslmode=disable' -e "CREATE SCHEDULE IF NOT EXISTS test_only_backup FOR BACKUP INTO 'gs://cockroach-backup-testing-private/roachprod-scheduled-backups/teamcity-10950435-1689659335-28-n5cpu4/1689664870831906498?AUTH=implicit' RECURRING '*/15 * * * *' FULL BACKUP '@hourly' WITH SCHEDULE OPTIONS first_run = 'now'" ERROR: unexpected error occurred when checking for existing backups in gs://cockroach-backup-testing-private/roachprod-scheduled-backups/teamcity-10950435-1689659335-28-n5cpu4/1689664870831906498?AUTH=implicit: unable to list files in gcs bucket: googleapi: Error 403: 21965078311-compute@developer.gserviceaccount.com does not have storage.objects.list access to the Google Cloud Storage bucket. Permission 'storage.objects.list' denied on resource (or it may not exist). SQLSTATE: 58030 Failed running "sql": COMMAND_PROBLEM: exit status 1 test artifacts and logs in: /artifacts/kv/contention/nodes=4/run_1 ``` <p>Parameters: <code>ROACHTEST_arch=amd64</code> , <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=4</code> , <code>ROACHTEST_encrypted=false</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/kv-triage <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*kv/contention/nodes=4.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-29853
2.0
roachtest: kv/contention/nodes=4 failed - roachtest.kv/contention/nodes=4 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10950435?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/10950435?buildTab=artifacts#/kv/contention/nodes=4) on master @ [7675ca4998134028f0623e04737b5cb69fcc33a9](https://github.com/cockroachdb/cockroach/commits/7675ca4998134028f0623e04737b5cb69fcc33a9): ``` (cluster.go:2180).Start: ~ COCKROACH_CONNECT_TIMEOUT=1200 ./cockroach sql --url 'postgres://root@localhost:26257?sslmode=disable' -e "CREATE SCHEDULE IF NOT EXISTS test_only_backup FOR BACKUP INTO 'gs://cockroach-backup-testing-private/roachprod-scheduled-backups/teamcity-10950435-1689659335-28-n5cpu4/1689664870831906498?AUTH=implicit' RECURRING '*/15 * * * *' FULL BACKUP '@hourly' WITH SCHEDULE OPTIONS first_run = 'now'" ERROR: unexpected error occurred when checking for existing backups in gs://cockroach-backup-testing-private/roachprod-scheduled-backups/teamcity-10950435-1689659335-28-n5cpu4/1689664870831906498?AUTH=implicit: unable to list files in gcs bucket: googleapi: Error 403: 21965078311-compute@developer.gserviceaccount.com does not have storage.objects.list access to the Google Cloud Storage bucket. Permission 'storage.objects.list' denied on resource (or it may not exist). SQLSTATE: 58030 Failed running "sql": COMMAND_PROBLEM: exit status 1 test artifacts and logs in: /artifacts/kv/contention/nodes=4/run_1 ``` <p>Parameters: <code>ROACHTEST_arch=amd64</code> , <code>ROACHTEST_cloud=gce</code> , <code>ROACHTEST_cpu=4</code> , <code>ROACHTEST_encrypted=false</code> , <code>ROACHTEST_ssd=0</code> </p> <details><summary>Help</summary> <p> See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md) See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7) </p> </details> /cc @cockroachdb/kv-triage <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*kv/contention/nodes=4.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub> Jira issue: CRDB-29853
non_priority
roachtest kv contention nodes failed roachtest kv contention nodes with on master cluster go start cockroach connect timeout cockroach sql url postgres root localhost sslmode disable e create schedule if not exists test only backup for backup into gs cockroach backup testing private roachprod scheduled backups teamcity auth implicit recurring full backup hourly with schedule options first run now error unexpected error occurred when checking for existing backups in gs cockroach backup testing private roachprod scheduled backups teamcity auth implicit unable to list files in gcs bucket googleapi error compute developer gserviceaccount com does not have storage objects list access to the google cloud storage bucket permission storage objects list denied on resource or it may not exist sqlstate failed running sql command problem exit status test artifacts and logs in artifacts kv contention nodes run parameters roachtest arch roachtest cloud gce roachtest cpu roachtest encrypted false roachtest ssd help see see cc cockroachdb kv triage jira issue crdb
0
17,016
23,445,012,481
IssuesEvent
2022-08-15 18:40:34
Luke100000/minecraft-comes-alive
https://api.github.com/repos/Luke100000/minecraft-comes-alive
closed
Villager Names are Not Names
mod compatibility
Short Issue, I'm not sure how to fix this but all the villagers in my villages spawn with names like this entity.mca.female_villager_cleric Any way to fix this?
True
Villager Names are Not Names - Short Issue, I'm not sure how to fix this but all the villagers in my villages spawn with names like this entity.mca.female_villager_cleric Any way to fix this?
non_priority
villager names are not names short issue i m not sure how to fix this but all the villagers in my villages spawn with names like this entity mca female villager cleric any way to fix this
0
57,952
11,810,581,735
IssuesEvent
2020-03-19 16:43:08
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
opened
Prefer sizeof over Marshal.SizeOf
api-suggestion area-System.Runtime.InteropServices code-analyzer
`sizeof` is much more efficient than `Marshal.SizeOf`. In cases where they'll produce the same answer, the former should be preferred (it'll generally require using `unsafe`, though, so this should only fire if `unsafe` is allowed in the project). **Category**: Performance
1.0
Prefer sizeof over Marshal.SizeOf - `sizeof` is much more efficient than `Marshal.SizeOf`. In cases where they'll produce the same answer, the former should be preferred (it'll generally require using `unsafe`, though, so this should only fire if `unsafe` is allowed in the project). **Category**: Performance
non_priority
prefer sizeof over marshal sizeof sizeof is much more efficient than marshal sizeof in cases where they ll produce the same answer the former should be preferred it ll generally require using unsafe though so this should only fire if unsafe is allowed in the project category performance
0
255,201
21,911,742,810
IssuesEvent
2022-05-21 06:34:22
hyperledger/iroha
https://api.github.com/repos/hyperledger/iroha
reopened
Fix Flaky tests
iroha2 CI Tests
Cargo nextest is the more permanent solution to flaky tests, specifically it has a method of remembering and re-running tests that have failed previously. https://nexte.st/index.html We should move to use it in our CI image, and potentially generate test coverage and run tests in one go.
1.0
Fix Flaky tests - Cargo nextest is the more permanent solution to flaky tests, specifically it has a method of remembering and re-running tests that have failed previously. https://nexte.st/index.html We should move to use it in our CI image, and potentially generate test coverage and run tests in one go.
non_priority
fix flaky tests cargo nextest is the more permanent solution to flaky tests specifically it has a method of remembering and re running tests that have failed previously we should move to use it in our ci image and potentially generate test coverage and run tests in one go
0
229,595
25,362,287,429
IssuesEvent
2022-11-21 01:03:43
AkshayMukkavilli/Tensorflow
https://api.github.com/repos/AkshayMukkavilli/Tensorflow
opened
CVE-2022-41891 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2022-41891 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /Tensorflow/src/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_5ea86033-7612-4210-97f3-8edb65806ddf/20190525011619_2843/20190525011537_depth_0/2/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. <p>Publish Date: 2022-11-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41891>CVE-2022-41891</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-41891">https://www.cve.org/CVERecord?id=CVE-2022-41891</a></p> <p>Release Date: 2022-11-18</p> <p>Fix Resolution: tensorflow - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-cpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-gpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-41891 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2022-41891 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /Tensorflow/src/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_5ea86033-7612-4210-97f3-8edb65806ddf/20190525011619_2843/20190525011537_depth_0/2/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> TensorFlow is an open source platform for machine learning. If `tf.raw_ops.TensorListConcat` is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. We have patched the issue in GitHub commit fc33f3dc4c14051a83eec6535b608abe1d355fde. The fix will be included in TensorFlow 2.11. We will also cherrypick this commit on TensorFlow 2.10.1, 2.9.3, and TensorFlow 2.8.4, as these are also affected and still in supported range. <p>Publish Date: 2022-11-18 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41891>CVE-2022-41891</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-41891">https://www.cve.org/CVERecord?id=CVE-2022-41891</a></p> <p>Release Date: 2022-11-18</p> <p>Fix Resolution: tensorflow - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-cpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0, tensorflow-gpu - 2.8.4, 2.9.3, 2.10.1, 2.11.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file tensorflow src requirements txt path to vulnerable library tesource archiveextractor depth tensorflow tensorflow data purelib tensorflow dependency hierarchy x tensorflow whl vulnerable library vulnerability details tensorflow is an open source platform for machine learning if tf raw ops tensorlistconcat is given element shape it results segmentation fault which can be used to trigger a denial of service attack we have patched the issue in github commit the fix will be included in tensorflow we will also cherrypick this commit on tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with mend
0
84,053
15,720,825,607
IssuesEvent
2021-03-29 01:19:56
jmacwhitesource/cloud-pipeline
https://api.github.com/repos/jmacwhitesource/cloud-pipeline
opened
CVE-2021-24122 (Medium) detected in tomcat-embed-core-8.5.31.jar, tomcat-embed-core-8.5.11.jar
security vulnerability
## CVE-2021-24122 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tomcat-embed-core-8.5.31.jar</b>, <b>tomcat-embed-core-8.5.11.jar</b></p></summary> <p> <details><summary><b>tomcat-embed-core-8.5.31.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p> <p>Path to dependency file: cloud-pipeline/billing-report-agent/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.5.31/f5adf7ed8c34aa005b22b6a2dc7b6796e10e9c79/tomcat-embed-core-8.5.31.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.0.2.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.0.2.RELEASE.jar - tomcat-embed-websocket-8.5.31.jar - :x: **tomcat-embed-core-8.5.31.jar** (Vulnerable Library) </details> <details><summary><b>tomcat-embed-core-8.5.11.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p> <p>Path to dependency file: cloud-pipeline/docker-comp-scan/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.5.11/72761f51fc7cef3ee19d4aafc7adc605df9f611f/tomcat-embed-core-8.5.11.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.5.2.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-1.5.2.RELEASE.jar - :x: **tomcat-embed-core-8.5.11.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. <p>Publish Date: 2021-01-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122>CVE-2021-24122</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122</a></p> <p>Release Date: 2021-01-14</p> <p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:7.0.107,8.5.60,9.0.40,10.0.0-M10;org.apache.tomcat:tomcat-catalina:7.0.107,8.5.60,9.0.40,10.0.0-M10</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.5.31","packageFilePaths":["/billing-report-agent/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:2.0.2.RELEASE;org.springframework.boot:spring-boot-starter-tomcat:2.0.2.RELEASE;org.apache.tomcat.embed:tomcat-embed-websocket:8.5.31;org.apache.tomcat.embed:tomcat-embed-core:8.5.31","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:7.0.107,8.5.60,9.0.40,10.0.0-M10;org.apache.tomcat:tomcat-catalina:7.0.107,8.5.60,9.0.40,10.0.0-M10"},{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.5.11","packageFilePaths":["/docker-comp-scan/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.5.2.RELEASE;org.springframework.boot:spring-boot-starter-tomcat:1.5.2.RELEASE;org.apache.tomcat.embed:tomcat-embed-core:8.5.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:7.0.107,8.5.60,9.0.40,10.0.0-M10;org.apache.tomcat:tomcat-catalina:7.0.107,8.5.60,9.0.40,10.0.0-M10"}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-24122","vulnerabilityDetails":"When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-24122 (Medium) detected in tomcat-embed-core-8.5.31.jar, tomcat-embed-core-8.5.11.jar - ## CVE-2021-24122 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>tomcat-embed-core-8.5.31.jar</b>, <b>tomcat-embed-core-8.5.11.jar</b></p></summary> <p> <details><summary><b>tomcat-embed-core-8.5.31.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p> <p>Path to dependency file: cloud-pipeline/billing-report-agent/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.5.31/f5adf7ed8c34aa005b22b6a2dc7b6796e10e9c79/tomcat-embed-core-8.5.31.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.0.2.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-2.0.2.RELEASE.jar - tomcat-embed-websocket-8.5.31.jar - :x: **tomcat-embed-core-8.5.31.jar** (Vulnerable Library) </details> <details><summary><b>tomcat-embed-core-8.5.11.jar</b></p></summary> <p>Core Tomcat implementation</p> <p>Library home page: <a href="http://tomcat.apache.org/">http://tomcat.apache.org/</a></p> <p>Path to dependency file: cloud-pipeline/docker-comp-scan/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.apache.tomcat.embed/tomcat-embed-core/8.5.11/72761f51fc7cef3ee19d4aafc7adc605df9f611f/tomcat-embed-core-8.5.11.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.5.2.RELEASE.jar (Root Library) - spring-boot-starter-tomcat-1.5.2.RELEASE.jar - :x: **tomcat-embed-core-8.5.11.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances. <p>Publish Date: 2021-01-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122>CVE-2021-24122</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24122</a></p> <p>Release Date: 2021-01-14</p> <p>Fix Resolution: org.apache.tomcat.embed:tomcat-embed-core:7.0.107,8.5.60,9.0.40,10.0.0-M10;org.apache.tomcat:tomcat-catalina:7.0.107,8.5.60,9.0.40,10.0.0-M10</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.5.31","packageFilePaths":["/billing-report-agent/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:2.0.2.RELEASE;org.springframework.boot:spring-boot-starter-tomcat:2.0.2.RELEASE;org.apache.tomcat.embed:tomcat-embed-websocket:8.5.31;org.apache.tomcat.embed:tomcat-embed-core:8.5.31","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:7.0.107,8.5.60,9.0.40,10.0.0-M10;org.apache.tomcat:tomcat-catalina:7.0.107,8.5.60,9.0.40,10.0.0-M10"},{"packageType":"Java","groupId":"org.apache.tomcat.embed","packageName":"tomcat-embed-core","packageVersion":"8.5.11","packageFilePaths":["/docker-comp-scan/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.5.2.RELEASE;org.springframework.boot:spring-boot-starter-tomcat:1.5.2.RELEASE;org.apache.tomcat.embed:tomcat-embed-core:8.5.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.tomcat.embed:tomcat-embed-core:7.0.107,8.5.60,9.0.40,10.0.0-M10;org.apache.tomcat:tomcat-catalina:7.0.107,8.5.60,9.0.40,10.0.0-M10"}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-24122","vulnerabilityDetails":"When serving resources from a network location using the NTFS file system, Apache Tomcat versions 10.0.0-M1 to 10.0.0-M9, 9.0.0.M1 to 9.0.39, 8.5.0 to 8.5.59 and 7.0.0 to 7.0.106 were susceptible to JSP source code disclosure in some configurations. The root cause was the unexpected behaviour of the JRE API File.getCanonicalPath() which in turn was caused by the inconsistent behaviour of the Windows API (FindFirstFileW) in some circumstances.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-24122","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in tomcat embed core jar tomcat embed core jar cve medium severity vulnerability vulnerable libraries tomcat embed core jar tomcat embed core jar tomcat embed core jar core tomcat implementation library home page a href path to dependency file cloud pipeline billing report agent build gradle path to vulnerable library home wss scanner gradle caches modules files org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy spring boot starter web release jar root library spring boot starter tomcat release jar tomcat embed websocket jar x tomcat embed core jar vulnerable library tomcat embed core jar core tomcat implementation library home page a href path to dependency file cloud pipeline docker comp scan build gradle path to vulnerable library home wss scanner gradle caches modules files org apache tomcat embed tomcat embed core tomcat embed core jar dependency hierarchy spring boot starter web release jar root library spring boot starter tomcat release jar x tomcat embed core jar vulnerable library found in base branch develop vulnerability details when serving resources from a network location using the ntfs file system apache tomcat versions to to to and to were susceptible to jsp source code disclosure in some configurations the root cause was the unexpected behaviour of the jre api file getcanonicalpath which in turn was caused by the inconsistent behaviour of the windows api findfirstfilew in some circumstances publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache tomcat embed tomcat embed core org apache tomcat tomcat catalina isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org springframework boot spring boot starter web release org springframework boot spring boot starter tomcat release org apache tomcat embed tomcat embed websocket org apache tomcat embed tomcat embed core isminimumfixversionavailable true minimumfixversion org apache tomcat embed tomcat embed core org apache tomcat tomcat catalina packagetype java groupid org apache tomcat embed packagename tomcat embed core packageversion packagefilepaths istransitivedependency true dependencytree org springframework boot spring boot starter web release org springframework boot spring boot starter tomcat release org apache tomcat embed tomcat embed core isminimumfixversionavailable true minimumfixversion org apache tomcat embed tomcat embed core org apache tomcat tomcat catalina basebranches vulnerabilityidentifier cve vulnerabilitydetails when serving resources from a network location using the ntfs file system apache tomcat versions to to to and to were susceptible to jsp source code disclosure in some configurations the root cause was the unexpected behaviour of the jre api file getcanonicalpath which in turn was caused by the inconsistent behaviour of the windows api findfirstfilew in some circumstances vulnerabilityurl
0
350,714
31,931,970,593
IssuesEvent
2023-09-19 08:03:27
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
reopened
Fix raw_ops.test_tensorflow_Angle
TensorFlow Frontend Sub Task Failing Test
| | | |---|---| |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a>
1.0
Fix raw_ops.test_tensorflow_Angle - | | | |---|---| |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/6221908008/job/16884781805"><img src=https://img.shields.io/badge/-failure-red></a>
non_priority
fix raw ops test tensorflow angle numpy a href src jax a href src tensorflow a href src torch a href src paddle a href src
0
169,198
26,760,487,486
IssuesEvent
2023-01-31 06:15:56
codestates-seb/seb41_main_028
https://api.github.com/repos/codestates-seb/seb41_main_028
closed
[FE] design: 버튼 한국어 패치
FE Design
## To do List <!--해당 Issue를 해결하기 위해 수행해야 할 To do list를 작성해주세요.--> - [x] 버튼 한국어 패치 - [ ] - [ ] - [ ] ## Deadline <!--작업 완료 기한을 입력해주세요. (e.g. 221219 / 15:00)--> ## Issue Checklist 아래 체크리스트를 확인해주세요. - [ ] Issue Title을 다음 예시와 같이 작성했습니다. (e.g. [FE] Feat: 회원가입 기능 구현 ) - [ ] 우측의 Assignees, Labels, Projects, Milestone을 적절하게 선택했습니다.
1.0
[FE] design: 버튼 한국어 패치 - ## To do List <!--해당 Issue를 해결하기 위해 수행해야 할 To do list를 작성해주세요.--> - [x] 버튼 한국어 패치 - [ ] - [ ] - [ ] ## Deadline <!--작업 완료 기한을 입력해주세요. (e.g. 221219 / 15:00)--> ## Issue Checklist 아래 체크리스트를 확인해주세요. - [ ] Issue Title을 다음 예시와 같이 작성했습니다. (e.g. [FE] Feat: 회원가입 기능 구현 ) - [ ] 우측의 Assignees, Labels, Projects, Milestone을 적절하게 선택했습니다.
non_priority
design 버튼 한국어 패치 to do list 버튼 한국어 패치 deadline issue checklist 아래 체크리스트를 확인해주세요 issue title을 다음 예시와 같이 작성했습니다 e g feat 회원가입 기능 구현 우측의 assignees labels projects milestone을 적절하게 선택했습니다
0
147,036
13,199,999,831
IssuesEvent
2020-08-14 07:18:50
DLR-RM/stable-baselines3
https://api.github.com/repos/DLR-RM/stable-baselines3
closed
Pre_Train in Stablebaselines3
documentation duplicate question
Is there a `pre_train` function in PPO of stablebaselines3? There is one in stablebaseline. If not, how to pretrain?
1.0
Pre_Train in Stablebaselines3 - Is there a `pre_train` function in PPO of stablebaselines3? There is one in stablebaseline. If not, how to pretrain?
non_priority
pre train in is there a pre train function in ppo of there is one in stablebaseline if not how to pretrain
0
190,389
15,229,491,647
IssuesEvent
2021-02-18 12:59:09
MozNeurons/ML-Workshop
https://api.github.com/repos/MozNeurons/ML-Workshop
closed
[Addition] SVM Documentation
documentation enhancement good first issue
Add documentation along with explanation and examples for Support Vector Machines(SVM).
1.0
[Addition] SVM Documentation - Add documentation along with explanation and examples for Support Vector Machines(SVM).
non_priority
svm documentation add documentation along with explanation and examples for support vector machines svm
0
155,405
12,254,419,634
IssuesEvent
2020-05-06 08:27:25
microsoft/PTVS
https://api.github.com/repos/microsoft/PTVS
closed
When debugged a second time, VS loses its response and restarts.
area:Debugger area:Debugger (VSC) area:Test Adapter bug regression upstream: vs
![image](https://user-images.githubusercontent.com/39871640/80357349-73b23500-88ad-11ea-871e-c39aa83e45aa.png) **Steps to Reproduce** 1.Add unit test test_1.py in python application 2.Typing code in test_1.py import unittest class Test_test_1(unittest.TestCase): def test_A(self): self.assertEqual(1,1) if __name__ == '__main__': unittest.main() 3.Set bk in the code 4.In TE, select the test and right-click to select Debug Selected tests 5.After the first successful debug, debug the current test again. **Expected behavior** The test can be debugged successfully **Actual behavior** When debugged a second time, VS loses its response and restarts. **Debug Adapter Host Log** ``` 1> DebugAdapterHost version: 16.7.40413.2 commit:b7937c15e33a949e648926944d211d657e3684f0 1> [DebugAdapter] <-- E (output): {"seq": 1, "type": "event", "event": "output", "body": {"category": "telemetry", "output": "ptvsd", "data": {"packageVersion": "1.0.0b5"}}} 1> [DebugAdapter] --> C (initialize-1): {"type":"request","command":"initialize","arguments":{"pathFormat":"path","clientID":"visualstudio","clientName":"Visual Studio","adapterID":null,"locale":"en-US","linesStartAt1":true,"columnsStartAt1":true,"supportsVariableType":true,"supportsRunInTerminalRequest":true,"supportsMemoryReferences":true,"supportsProgressReporting":true,"supportsHandshakeRequest":true},"seq":1} 1> [DebugAdapter] <-- E (output): {"seq": 2, "type": "event", "event": "output", "body": {"category": "telemetry", "output": "debugpy", "data": {"packageVersion": "1.0.0b5"}}} 1> [DebugAdapter] <-- R (initialize-1) [167 ms]: {"seq": 3, "type": "response", "request_seq": 1, "success": true, "command": "initialize", "body": {"supportsCompletionsRequest": true, "supportsConditionalBreakpoints": true, "supportsConfigurationDoneRequest": true, "supportsDebuggerProperties": true, "supportsDelayedStackTraceLoading": true, "supportsEvaluateForHovers": true, "supportsExceptionInfoRequest": true, "supportsExceptionOptions": true, "supportsHitConditionalBreakpoints": true, "supportsLogPoints": true, "supportsModulesRequest": true, "supportsSetExpression": true, "supportsSetVariable": true, "supportsValueFormattingOptions": true, "supportsTerminateDebuggee": true, "supportsGotoTargetsRequest": true, "exceptionBreakpointFilters": [{"filter": "raised", "label": "Raised Exceptions", "default": false}, {"filter": "uncaught", "label": "Uncaught Exceptions", "default": true}]}} 1> [DebugAdapter] --> C (attach-2): {"type":"request","command":"attach","arguments":{"host":"localhost","port":52468,"stopOnEntry":true,"promptBeforeRunningWithBuildError":true,"redirectOutput":true,"waitOnAbnormalExit":true,"waitOnNormalExit":true,"breakOnSystemExitZero":false,"debugStdLib":false,"showReturnValue":true,"rules":[{"path":"c:\\program files (x86)\\microsoft visual studio\\2019\\preview\\common7\\ide\\extensions\\microsoft\\python\\core\\","include":false}]},"seq":2} 1> [DebugAdapter] <-- E (debugpyWaitingForServer): {"seq": 4, "type": "event", "event": "debugpyWaitingForServer", "body": {"host": "127.0.0.1", "port": 52521}} 1> WARNING: No handler registered for event of type 'debugpyWaitingForServer'! 1> [DebugAdapter] <-- E (initialized): {"seq": 5, "type": "event", "event": "initialized"} 1> [DebugAdapter] --> C (debugpySystemInfo-3): {"type":"request","command":"debugpySystemInfo","arguments":{},"seq":3} 1> [DebugAdapter] <-- R (debugpySystemInfo-3) [16 ms]: {"seq": 6, "type": "response", "request_seq": 3, "success": true, "command": "debugpySystemInfo", "body": {"debugpy": {"version": "1.0.0b5"}, "python": {"version": "3.7.7final0", "implementation": {"name": "cpython", "version": "3.7.7final0", "description": "CPython"}}, "platform": {"name": "win32"}, "process": {"pid": 4668, "ppid": 6728, "executable": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\python.exe", "bitness": 64}, "pydevd": {"usingCython": false, "usingFrameEval": false}}} 1> [DebugAdapter] --> C (setDebuggerProperty-4): {"type":"request","command":"setDebuggerProperty","arguments":{"AllowOutOfProcessSymbols":1},"seq":4} 1> [DebugAdapter] --> C (setDebuggerProperty-5): {"type":"request","command":"setDebuggerProperty","arguments":{"DisableJITOptimization":0},"seq":5} 1> [DebugAdapter] --> C (setDebuggerProperty-6): {"type":"request","command":"setDebuggerProperty","arguments":{"EnableFastEvaluate":1},"seq":6} 1> [DebugAdapter] --> C (setDebuggerProperty-7): {"type":"request","command":"setDebuggerProperty","arguments":{"InterpreterOptions":1},"seq":7} 1> [DebugAdapter] --> C (setDebuggerProperty-8): {"type":"request","command":"setDebuggerProperty","arguments":{"JustMyCodeStepping":1},"seq":8} 1> [DebugAdapter] --> C (setDebuggerProperty-9): {"type":"request","command":"setDebuggerProperty","arguments":{"StopOnExceptionCrossingManagedBoundary":0},"seq":9} 1> [DebugAdapter] --> C (setDebuggerProperty-10): {"type":"request","command":"setDebuggerProperty","arguments":{"WarnIfNoUserCodeOnLaunch":1},"seq":10} 1> [DebugAdapter] --> C (setDebuggerProperty-11): {"type":"request","command":"setDebuggerProperty","arguments":{"EnableStepFiltering":true},"seq":11} 1> [DebugAdapter] <-- R (setDebuggerProperty-4) [6 ms]: {"seq": 7, "type": "response", "request_seq": 4, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-5) [6 ms]: {"seq": 8, "type": "response", "request_seq": 5, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-6) [6 ms]: {"seq": 9, "type": "response", "request_seq": 6, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-7) [7 ms]: {"seq": 10, "type": "response", "request_seq": 7, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-8) [7 ms]: {"seq": 11, "type": "response", "request_seq": 8, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-9) [8 ms]: {"seq": 12, "type": "response", "request_seq": 9, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-10) [9 ms]: {"seq": 13, "type": "response", "request_seq": 10, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-11) [10 ms]: {"seq": 14, "type": "response", "request_seq": 11, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] --> C (setBreakpoints-12): {"type":"request","command":"setBreakpoints","arguments":{"source":{"path":"c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_ut.py","sources":[],"checksums":[]},"breakpoints":[{"line":8,"column":1}],"lines":[8]},"seq":12} 1> [DebugAdapter] --> C (setBreakpoints-13): {"type":"request","command":"setBreakpoints","arguments":{"source":{"path":"c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_pta.py","sources":[],"checksums":[]},"breakpoints":[{"line":5,"column":1}],"lines":[5]},"seq":13} 1> [DebugAdapter] --> C (setBreakpoints-14): {"type":"request","command":"setBreakpoints","arguments":{"source":{"path":"c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py","sources":[],"checksums":[]},"breakpoints":[{"line":5,"column":1}],"lines":[5]},"seq":14} 1> [DebugAdapter] <-- R (setBreakpoints-12) [35 ms]: {"seq": 15, "type": "response", "request_seq": 12, "success": true, "command": "setBreakpoints", "body": {"breakpoints": [{"verified": true, "id": 0, "source": {"path": "c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_ut.py", "sources": [], "checksums": []}, "line": 8}]}} 1> [DebugAdapter] <-- R (setBreakpoints-13) [28 ms]: {"seq": 16, "type": "response", "request_seq": 13, "success": true, "command": "setBreakpoints", "body": {"breakpoints": [{"verified": true, "id": 1, "source": {"path": "c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_pta.py", "sources": [], "checksums": []}, "line": 5}]}} 1> [DebugAdapter] <-- R (setBreakpoints-14) [29 ms]: {"seq": 17, "type": "response", "request_seq": 14, "success": true, "command": "setBreakpoints", "body": {"breakpoints": [{"verified": true, "id": 2, "source": {"path": "c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sources": [], "checksums": []}, "line": 5}]}} 1> [DebugAdapter] --> C (setExceptionBreakpoints-15): {"type":"request","command":"setExceptionBreakpoints","arguments":{"filters":[],"exceptionOptions":[{"breakMode":"userUnhandled","path":[{"names":["Python Exceptions"]}]},{"breakMode":"unhandled","path":[{"names":["Python Exceptions"]},{"names":["GeneratorExit","IndexError","StopIteration","AttributeError","KeyError"]}]}]},"seq":15} 1> [DebugAdapter] <-- R (setExceptionBreakpoints-15) [20 ms]: {"seq": 18, "type": "response", "request_seq": 15, "success": true, "command": "setExceptionBreakpoints"} 1> [DebugAdapter] --> C (configurationDone-16): {"type":"request","command":"configurationDone","arguments":{},"seq":16} 1> [DebugAdapter] <-- R (configurationDone-16) [5 ms]: {"seq": 19, "type": "response", "request_seq": 16, "success": true, "command": "configurationDone"} 1> [DebugAdapter] <-- R (attach-2) [376 ms]: {"seq": 20, "type": "response", "request_seq": 2, "success": true, "command": "attach"} 1> [DebugAdapter] <-- E (process): {"seq": 21, "type": "event", "event": "process", "body": {"name": "C:\\PROGRAM FILES (X86)\\MICROSOFT VISUAL STUDIO\\2019\\PREVIEW\\COMMON7\\IDE\\EXTENSIONS\\MICROSOFT\\PYTHON\\CORE\\testlauncher.py", "systemProcessId": 4668, "isLocalProcess": true, "startMethod": "attach"}} 1> [DebugAdapter] <-- E (thread): {"seq": 22, "type": "event", "event": "thread", "body": {"reason": "started", "threadId": 1}} 1> [DebugAdapter] <-- E (output): {"seq": 23, "type": "event", "event": "output", "body": {"output": "============================= test session starts =============================", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 24, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 25, "type": "event", "event": "output", "body": {"output": "platform win32 -- Python 3.7.7, pytest-5.4.1, py-1.8.1, pluggy-0.13.1", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 26, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 27, "type": "event", "event": "output", "body": {"output": "rootdir: C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 28, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 29, "type": "event", "event": "output", "body": {"output": "collected 1 item", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 30, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 31, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 32, "type": "event", "event": "output", "body": {"output": "test_1.py ", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (stopped): {"seq": 33, "type": "event", "event": "stopped", "body": {"reason": "breakpoint", "threadId": 1, "preserveFocusHint": false, "allThreadsStopped": true}} 1> [DebugAdapter] --> C (threads-17): {"type":"request","command":"threads","arguments":{},"seq":17} 1> [DebugAdapter] <-- R (threads-17) [3 ms]: {"seq": 34, "type": "response", "request_seq": 17, "success": true, "command": "threads", "body": {"threads": [{"id": 1, "name": "MainThread"}]}} 1> [DebugAdapter] --> C (stackTrace-18): {"type":"request","command":"stackTrace","arguments":{"threadId":1,"startFrame":0,"levels":1,"format":{"includeAll":true}},"seq":18} 1> [DebugAdapter] <-- R (stackTrace-18) [18 ms]: {"seq": 35, "type": "response", "request_seq": 18, "success": true, "command": "stackTrace", "body": {"stackFrames": [{"id": 2, "name": "test_A", "line": 5, "column": 1, "source": {"path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sourceReference": 0}}], "totalFrames": 1}} 1> [DebugAdapter] <-- E (module): {"seq": 36, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 0, "name": "test_1", "path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py"}}} 1> [DebugAdapter] --> C (stackTrace-19): {"type":"request","command":"stackTrace","arguments":{"threadId":1,"startFrame":0,"levels":1000,"format":{"parameters":true,"parameterTypes":true,"parameterNames":true,"line":true,"module":true}},"seq":19} 1> [DebugAdapter] <-- E (module): {"seq": 37, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 1, "name": "_pytest.python", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\python.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 38, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 2, "name": "pluggy.callers", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\pluggy\\callers.py", "package": "pluggy"}}} 1> [DebugAdapter] <-- E (module): {"seq": 39, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 3, "name": "pluggy.manager", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\pluggy\\manager.py", "package": "pluggy"}}} 1> [DebugAdapter] <-- E (module): {"seq": 40, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 4, "name": "pluggy.hooks", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\pluggy\\hooks.py", "package": "pluggy"}}} 1> [DebugAdapter] <-- E (module): {"seq": 41, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 5, "name": "_pytest.unittest", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\unittest.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 42, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 6, "name": "unittest.case", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\unittest\\case.py", "package": "unittest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 43, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 7, "name": "_pytest.runner", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\runner.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 44, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 8, "name": "_pytest.main", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\main.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 45, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 9, "name": "_pytest.config", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\config\\__init__.py", "package": "_pytest.config"}}} 1> [DebugAdapter] <-- E (module): {"seq": 46, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 10, "name": "__main__", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\2019\\Preview\\Common7\\IDE\\Extensions\\Microsoft\\Python\\Core\\testlauncher.py", "package": "None"}}} 1> [DebugAdapter] <-- R (stackTrace-19) [7 ms]: {"seq": 47, "type": "response", "request_seq": 19, "success": true, "command": "stackTrace", "body": {"stackFrames": [{"id": 2, "name": "test_1.test_A : 5", "line": 5, "column": 1, "source": {"path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sourceReference": 0}}], "totalFrames": 1}} 1> [DebugAdapter] --> C (stackTrace-20): {"type":"request","command":"stackTrace","arguments":{"threadId":1,"startFrame":0,"levels":1,"format":{"includeAll":true}},"seq":20} 1> [DebugAdapter] <-- R (stackTrace-20) [2 ms]: {"seq": 48, "type": "response", "request_seq": 20, "success": true, "command": "stackTrace", "body": {"stackFrames": [{"id": 2, "name": "test_A", "line": 5, "column": 1, "source": {"path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sourceReference": 0}}], "totalFrames": 1}} 1> [DebugAdapter] --> C (evaluate-21): {"type":"request","command":"evaluate","arguments":{"context":"hover","expression":"test_A","frameId":2,"noSideEffects":true,"timeout":5000},"seq":21} 1> [DebugAdapter] --> C (evaluate-22): {"type":"request","command":"evaluate","arguments":{"context":"hover","expression":"Test_test_1","frameId":2,"noSideEffects":true,"timeout":5000},"seq":22} 1> [DebugAdapter] --> C (evaluate-23): {"type":"request","command":"evaluate","arguments":{"context":"hover","expression":"unittest.TestCase","frameId":2,"noSideEffects":true,"timeout":5000},"seq":23} 1> [DebugAdapter] <-- R (evaluate-21) [42 ms]: {"seq": 49, "type": "response", "request_seq": 21, "success": false, "command": "evaluate", "message": "Exception occurred during evaluation."} 1> [DebugAdapter] <-- R (evaluate-22) [45 ms]: {"seq": 50, "type": "response", "request_seq": 22, "success": true, "command": "evaluate", "body": {"result": "<class 'test_1.Test_test_1'>", "variablesReference": 3, "type": "type", "presentationHint": {}}} 1> [DebugAdapter] <-- R (evaluate-23) [32 ms]: {"seq": 51, "type": "response", "request_seq": 23, "success": true, "command": "evaluate", "body": {"result": "<class 'unittest.case.TestCase'>", "variablesReference": 4, "type": "type", "presentationHint": {}}} 1> [DebugAdapter] --> C (next-24): {"type":"request","command":"next","arguments":{"threadId":1},"seq":24} 1> [DebugAdapter] <-- R (next-24) [4 ms]: {"seq": 52, "type": "response", "request_seq": 24, "success": true, "command": "next"} 1> [DebugAdapter] <-- E (output): {"seq": 53, "type": "event", "event": "output", "body": {"output": ".", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 54, "type": "event", "event": "output", "body": {"output": " [100%]", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 55, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 56, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 57, "type": "event", "event": "output", "body": {"output": "- generated xml file: C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\TestResults\\junitresults_96063626-8e02-4a76-b063-c1d220785f39.xml -", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 58, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 59, "type": "event", "event": "output", "body": {"output": "============================== 1 passed in 1.43s ==============================", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 60, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (thread): {"seq": 61, "type": "event", "event": "thread", "body": {"reason": "exited", "threadId": 1}} 1> [DebugAdapter] <-- E (terminated): {"seq": 62, "type": "event", "event": "terminated"} 1> [DebugAdapter] --> C (disconnect-25): {"type":"request","command":"disconnect","arguments":{},"seq":25} 1> [DebugAdapter] <-- R (disconnect-25) [6 ms]: {"seq": 63, "type": "response", "request_seq": 25, "success": true, "command": "disconnect"} 1> Debug adapter process exited. 1> WARNING: Stopping due to fatal error: AggregateException: One or more errors occurred. 1> ERROR: Unexpected error AggregateException: One or more errors occurred. System.Threading.Tasks.Task.ThrowIfExceptional(Boolean includeTaskCanceledExceptions) System.Threading.Tasks.Task`1.GetResultCore(Boolean waitCompletionNotification) System.Threading.Tasks.Task`1.get_Result() Microsoft.VisualStudio.Shared.VSCodeDebugProtocol.Protocol.DebugProtocol.ReaderThreadProc() Aggregate exception: IOException: Unable to read data from the transport connection: A blocking operation was interrupted by a call to WSACancelBlockingCall. Inner Exception: SocketException: A blocking operation was interrupted by a call to WSACancelBlockingCall Inner Exception: IOException: Unable to read data from the transport connection: A blocking operation was interrupted by a call to WSACancelBlockingCall. System.Net.Sockets.NetworkStream.Read(Byte[] buffer, Int32 offset, Int32 size) Microsoft.PythonTools.Debugger.DebugRemoteAdapterProcessStream.Read(Byte[] buffer, Int32 offset, Int32 count) System.IO.Stream.<>c.<BeginReadInternal>b__39_0(Object <p0>) System.Threading.Tasks.Task`1.InnerInvoke() System.Threading.Tasks.Task.Execute() --- End of stack trace from previous location where exception was thrown --- System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) System.IO.Stream.EndRead(IAsyncResult asyncResult) System.IO.Stream.<>c.<BeginEndReadAsync>b__43_1(Stream stream, IAsyncResult asyncResult) System.Threading.Tasks.TaskFactory`1.FromAsyncTrimPromise`1.Complete(TInstance thisRef, Func`3 endMethod, IAsyncResult asyncResult, Boolean requiresSynchronization) Inner Exception: SocketException: A blocking operation was interrupted by a call to WSACancelBlockingCall System.Net.Sockets.Socket.Receive(Byte[] buffer, Int32 offset, Int32 size, SocketFlags socketFlags) System.Net.Sockets.NetworkStream.Read(Byte[] buffer, Int32 offset, Int32 size) 1> ERROR: One or more errors occurred. Unable to read data from the transport connection: A blocking operation was interrupted by a call to WSACancelBlockingCall. A blocking operation was interrupted by a call to WSACancelBlockingCall 1> ERROR: Exception while reporting error. NullReferenceException: Object reference not set to an instance of an object. Microsoft.VisualStudio.Debugger.VSCodeDebuggerHost.AD7.Implementation.EngineCallback.Send(IAD7DebugEvent eventObject, IDebugThread2 thread) Microsoft.VisualStudio.Debugger.VSCodeDebuggerHost.AD7.Implementation.EngineCallback.OnError(String errorMessage) ```
1.0
When debugged a second time, VS loses its response and restarts. - ![image](https://user-images.githubusercontent.com/39871640/80357349-73b23500-88ad-11ea-871e-c39aa83e45aa.png) **Steps to Reproduce** 1.Add unit test test_1.py in python application 2.Typing code in test_1.py import unittest class Test_test_1(unittest.TestCase): def test_A(self): self.assertEqual(1,1) if __name__ == '__main__': unittest.main() 3.Set bk in the code 4.In TE, select the test and right-click to select Debug Selected tests 5.After the first successful debug, debug the current test again. **Expected behavior** The test can be debugged successfully **Actual behavior** When debugged a second time, VS loses its response and restarts. **Debug Adapter Host Log** ``` 1> DebugAdapterHost version: 16.7.40413.2 commit:b7937c15e33a949e648926944d211d657e3684f0 1> [DebugAdapter] <-- E (output): {"seq": 1, "type": "event", "event": "output", "body": {"category": "telemetry", "output": "ptvsd", "data": {"packageVersion": "1.0.0b5"}}} 1> [DebugAdapter] --> C (initialize-1): {"type":"request","command":"initialize","arguments":{"pathFormat":"path","clientID":"visualstudio","clientName":"Visual Studio","adapterID":null,"locale":"en-US","linesStartAt1":true,"columnsStartAt1":true,"supportsVariableType":true,"supportsRunInTerminalRequest":true,"supportsMemoryReferences":true,"supportsProgressReporting":true,"supportsHandshakeRequest":true},"seq":1} 1> [DebugAdapter] <-- E (output): {"seq": 2, "type": "event", "event": "output", "body": {"category": "telemetry", "output": "debugpy", "data": {"packageVersion": "1.0.0b5"}}} 1> [DebugAdapter] <-- R (initialize-1) [167 ms]: {"seq": 3, "type": "response", "request_seq": 1, "success": true, "command": "initialize", "body": {"supportsCompletionsRequest": true, "supportsConditionalBreakpoints": true, "supportsConfigurationDoneRequest": true, "supportsDebuggerProperties": true, "supportsDelayedStackTraceLoading": true, "supportsEvaluateForHovers": true, "supportsExceptionInfoRequest": true, "supportsExceptionOptions": true, "supportsHitConditionalBreakpoints": true, "supportsLogPoints": true, "supportsModulesRequest": true, "supportsSetExpression": true, "supportsSetVariable": true, "supportsValueFormattingOptions": true, "supportsTerminateDebuggee": true, "supportsGotoTargetsRequest": true, "exceptionBreakpointFilters": [{"filter": "raised", "label": "Raised Exceptions", "default": false}, {"filter": "uncaught", "label": "Uncaught Exceptions", "default": true}]}} 1> [DebugAdapter] --> C (attach-2): {"type":"request","command":"attach","arguments":{"host":"localhost","port":52468,"stopOnEntry":true,"promptBeforeRunningWithBuildError":true,"redirectOutput":true,"waitOnAbnormalExit":true,"waitOnNormalExit":true,"breakOnSystemExitZero":false,"debugStdLib":false,"showReturnValue":true,"rules":[{"path":"c:\\program files (x86)\\microsoft visual studio\\2019\\preview\\common7\\ide\\extensions\\microsoft\\python\\core\\","include":false}]},"seq":2} 1> [DebugAdapter] <-- E (debugpyWaitingForServer): {"seq": 4, "type": "event", "event": "debugpyWaitingForServer", "body": {"host": "127.0.0.1", "port": 52521}} 1> WARNING: No handler registered for event of type 'debugpyWaitingForServer'! 1> [DebugAdapter] <-- E (initialized): {"seq": 5, "type": "event", "event": "initialized"} 1> [DebugAdapter] --> C (debugpySystemInfo-3): {"type":"request","command":"debugpySystemInfo","arguments":{},"seq":3} 1> [DebugAdapter] <-- R (debugpySystemInfo-3) [16 ms]: {"seq": 6, "type": "response", "request_seq": 3, "success": true, "command": "debugpySystemInfo", "body": {"debugpy": {"version": "1.0.0b5"}, "python": {"version": "3.7.7final0", "implementation": {"name": "cpython", "version": "3.7.7final0", "description": "CPython"}}, "platform": {"name": "win32"}, "process": {"pid": 4668, "ppid": 6728, "executable": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\python.exe", "bitness": 64}, "pydevd": {"usingCython": false, "usingFrameEval": false}}} 1> [DebugAdapter] --> C (setDebuggerProperty-4): {"type":"request","command":"setDebuggerProperty","arguments":{"AllowOutOfProcessSymbols":1},"seq":4} 1> [DebugAdapter] --> C (setDebuggerProperty-5): {"type":"request","command":"setDebuggerProperty","arguments":{"DisableJITOptimization":0},"seq":5} 1> [DebugAdapter] --> C (setDebuggerProperty-6): {"type":"request","command":"setDebuggerProperty","arguments":{"EnableFastEvaluate":1},"seq":6} 1> [DebugAdapter] --> C (setDebuggerProperty-7): {"type":"request","command":"setDebuggerProperty","arguments":{"InterpreterOptions":1},"seq":7} 1> [DebugAdapter] --> C (setDebuggerProperty-8): {"type":"request","command":"setDebuggerProperty","arguments":{"JustMyCodeStepping":1},"seq":8} 1> [DebugAdapter] --> C (setDebuggerProperty-9): {"type":"request","command":"setDebuggerProperty","arguments":{"StopOnExceptionCrossingManagedBoundary":0},"seq":9} 1> [DebugAdapter] --> C (setDebuggerProperty-10): {"type":"request","command":"setDebuggerProperty","arguments":{"WarnIfNoUserCodeOnLaunch":1},"seq":10} 1> [DebugAdapter] --> C (setDebuggerProperty-11): {"type":"request","command":"setDebuggerProperty","arguments":{"EnableStepFiltering":true},"seq":11} 1> [DebugAdapter] <-- R (setDebuggerProperty-4) [6 ms]: {"seq": 7, "type": "response", "request_seq": 4, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-5) [6 ms]: {"seq": 8, "type": "response", "request_seq": 5, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-6) [6 ms]: {"seq": 9, "type": "response", "request_seq": 6, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-7) [7 ms]: {"seq": 10, "type": "response", "request_seq": 7, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-8) [7 ms]: {"seq": 11, "type": "response", "request_seq": 8, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-9) [8 ms]: {"seq": 12, "type": "response", "request_seq": 9, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-10) [9 ms]: {"seq": 13, "type": "response", "request_seq": 10, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] <-- R (setDebuggerProperty-11) [10 ms]: {"seq": 14, "type": "response", "request_seq": 11, "success": true, "command": "setDebuggerProperty"} 1> [DebugAdapter] --> C (setBreakpoints-12): {"type":"request","command":"setBreakpoints","arguments":{"source":{"path":"c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_ut.py","sources":[],"checksums":[]},"breakpoints":[{"line":8,"column":1}],"lines":[8]},"seq":12} 1> [DebugAdapter] --> C (setBreakpoints-13): {"type":"request","command":"setBreakpoints","arguments":{"source":{"path":"c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_pta.py","sources":[],"checksums":[]},"breakpoints":[{"line":5,"column":1}],"lines":[5]},"seq":13} 1> [DebugAdapter] --> C (setBreakpoints-14): {"type":"request","command":"setBreakpoints","arguments":{"source":{"path":"c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py","sources":[],"checksums":[]},"breakpoints":[{"line":5,"column":1}],"lines":[5]},"seq":14} 1> [DebugAdapter] <-- R (setBreakpoints-12) [35 ms]: {"seq": 15, "type": "response", "request_seq": 12, "success": true, "command": "setBreakpoints", "body": {"breakpoints": [{"verified": true, "id": 0, "source": {"path": "c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_ut.py", "sources": [], "checksums": []}, "line": 8}]}} 1> [DebugAdapter] <-- R (setBreakpoints-13) [28 ms]: {"seq": 16, "type": "response", "request_seq": 13, "success": true, "command": "setBreakpoints", "body": {"breakpoints": [{"verified": true, "id": 1, "source": {"path": "c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\Test_a\\test_pta.py", "sources": [], "checksums": []}, "line": 5}]}} 1> [DebugAdapter] <-- R (setBreakpoints-14) [29 ms]: {"seq": 17, "type": "response", "request_seq": 14, "success": true, "command": "setBreakpoints", "body": {"breakpoints": [{"verified": true, "id": 2, "source": {"path": "c:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sources": [], "checksums": []}, "line": 5}]}} 1> [DebugAdapter] --> C (setExceptionBreakpoints-15): {"type":"request","command":"setExceptionBreakpoints","arguments":{"filters":[],"exceptionOptions":[{"breakMode":"userUnhandled","path":[{"names":["Python Exceptions"]}]},{"breakMode":"unhandled","path":[{"names":["Python Exceptions"]},{"names":["GeneratorExit","IndexError","StopIteration","AttributeError","KeyError"]}]}]},"seq":15} 1> [DebugAdapter] <-- R (setExceptionBreakpoints-15) [20 ms]: {"seq": 18, "type": "response", "request_seq": 15, "success": true, "command": "setExceptionBreakpoints"} 1> [DebugAdapter] --> C (configurationDone-16): {"type":"request","command":"configurationDone","arguments":{},"seq":16} 1> [DebugAdapter] <-- R (configurationDone-16) [5 ms]: {"seq": 19, "type": "response", "request_seq": 16, "success": true, "command": "configurationDone"} 1> [DebugAdapter] <-- R (attach-2) [376 ms]: {"seq": 20, "type": "response", "request_seq": 2, "success": true, "command": "attach"} 1> [DebugAdapter] <-- E (process): {"seq": 21, "type": "event", "event": "process", "body": {"name": "C:\\PROGRAM FILES (X86)\\MICROSOFT VISUAL STUDIO\\2019\\PREVIEW\\COMMON7\\IDE\\EXTENSIONS\\MICROSOFT\\PYTHON\\CORE\\testlauncher.py", "systemProcessId": 4668, "isLocalProcess": true, "startMethod": "attach"}} 1> [DebugAdapter] <-- E (thread): {"seq": 22, "type": "event", "event": "thread", "body": {"reason": "started", "threadId": 1}} 1> [DebugAdapter] <-- E (output): {"seq": 23, "type": "event", "event": "output", "body": {"output": "============================= test session starts =============================", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 24, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 25, "type": "event", "event": "output", "body": {"output": "platform win32 -- Python 3.7.7, pytest-5.4.1, py-1.8.1, pluggy-0.13.1", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 26, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 27, "type": "event", "event": "output", "body": {"output": "rootdir: C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 28, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 29, "type": "event", "event": "output", "body": {"output": "collected 1 item", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 30, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 31, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 32, "type": "event", "event": "output", "body": {"output": "test_1.py ", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (stopped): {"seq": 33, "type": "event", "event": "stopped", "body": {"reason": "breakpoint", "threadId": 1, "preserveFocusHint": false, "allThreadsStopped": true}} 1> [DebugAdapter] --> C (threads-17): {"type":"request","command":"threads","arguments":{},"seq":17} 1> [DebugAdapter] <-- R (threads-17) [3 ms]: {"seq": 34, "type": "response", "request_seq": 17, "success": true, "command": "threads", "body": {"threads": [{"id": 1, "name": "MainThread"}]}} 1> [DebugAdapter] --> C (stackTrace-18): {"type":"request","command":"stackTrace","arguments":{"threadId":1,"startFrame":0,"levels":1,"format":{"includeAll":true}},"seq":18} 1> [DebugAdapter] <-- R (stackTrace-18) [18 ms]: {"seq": 35, "type": "response", "request_seq": 18, "success": true, "command": "stackTrace", "body": {"stackFrames": [{"id": 2, "name": "test_A", "line": 5, "column": 1, "source": {"path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sourceReference": 0}}], "totalFrames": 1}} 1> [DebugAdapter] <-- E (module): {"seq": 36, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 0, "name": "test_1", "path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py"}}} 1> [DebugAdapter] --> C (stackTrace-19): {"type":"request","command":"stackTrace","arguments":{"threadId":1,"startFrame":0,"levels":1000,"format":{"parameters":true,"parameterTypes":true,"parameterNames":true,"line":true,"module":true}},"seq":19} 1> [DebugAdapter] <-- E (module): {"seq": 37, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 1, "name": "_pytest.python", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\python.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 38, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 2, "name": "pluggy.callers", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\pluggy\\callers.py", "package": "pluggy"}}} 1> [DebugAdapter] <-- E (module): {"seq": 39, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 3, "name": "pluggy.manager", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\pluggy\\manager.py", "package": "pluggy"}}} 1> [DebugAdapter] <-- E (module): {"seq": 40, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 4, "name": "pluggy.hooks", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\pluggy\\hooks.py", "package": "pluggy"}}} 1> [DebugAdapter] <-- E (module): {"seq": 41, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 5, "name": "_pytest.unittest", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\unittest.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 42, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 6, "name": "unittest.case", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\unittest\\case.py", "package": "unittest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 43, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 7, "name": "_pytest.runner", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\runner.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 44, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 8, "name": "_pytest.main", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\main.py", "package": "_pytest"}}} 1> [DebugAdapter] <-- E (module): {"seq": 45, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 9, "name": "_pytest.config", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\Shared\\Python37_64\\Lib\\site-packages\\_pytest\\config\\__init__.py", "package": "_pytest.config"}}} 1> [DebugAdapter] <-- E (module): {"seq": 46, "type": "event", "event": "module", "body": {"reason": "new", "module": {"id": 10, "name": "__main__", "path": "C:\\Program Files (x86)\\Microsoft Visual Studio\\2019\\Preview\\Common7\\IDE\\Extensions\\Microsoft\\Python\\Core\\testlauncher.py", "package": "None"}}} 1> [DebugAdapter] <-- R (stackTrace-19) [7 ms]: {"seq": 47, "type": "response", "request_seq": 19, "success": true, "command": "stackTrace", "body": {"stackFrames": [{"id": 2, "name": "test_1.test_A : 5", "line": 5, "column": 1, "source": {"path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sourceReference": 0}}], "totalFrames": 1}} 1> [DebugAdapter] --> C (stackTrace-20): {"type":"request","command":"stackTrace","arguments":{"threadId":1,"startFrame":0,"levels":1,"format":{"includeAll":true}},"seq":20} 1> [DebugAdapter] <-- R (stackTrace-20) [2 ms]: {"seq": 48, "type": "response", "request_seq": 20, "success": true, "command": "stackTrace", "body": {"stackFrames": [{"id": 2, "name": "test_A", "line": 5, "column": 1, "source": {"path": "C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\PythonApplication1\\test_1.py", "sourceReference": 0}}], "totalFrames": 1}} 1> [DebugAdapter] --> C (evaluate-21): {"type":"request","command":"evaluate","arguments":{"context":"hover","expression":"test_A","frameId":2,"noSideEffects":true,"timeout":5000},"seq":21} 1> [DebugAdapter] --> C (evaluate-22): {"type":"request","command":"evaluate","arguments":{"context":"hover","expression":"Test_test_1","frameId":2,"noSideEffects":true,"timeout":5000},"seq":22} 1> [DebugAdapter] --> C (evaluate-23): {"type":"request","command":"evaluate","arguments":{"context":"hover","expression":"unittest.TestCase","frameId":2,"noSideEffects":true,"timeout":5000},"seq":23} 1> [DebugAdapter] <-- R (evaluate-21) [42 ms]: {"seq": 49, "type": "response", "request_seq": 21, "success": false, "command": "evaluate", "message": "Exception occurred during evaluation."} 1> [DebugAdapter] <-- R (evaluate-22) [45 ms]: {"seq": 50, "type": "response", "request_seq": 22, "success": true, "command": "evaluate", "body": {"result": "<class 'test_1.Test_test_1'>", "variablesReference": 3, "type": "type", "presentationHint": {}}} 1> [DebugAdapter] <-- R (evaluate-23) [32 ms]: {"seq": 51, "type": "response", "request_seq": 23, "success": true, "command": "evaluate", "body": {"result": "<class 'unittest.case.TestCase'>", "variablesReference": 4, "type": "type", "presentationHint": {}}} 1> [DebugAdapter] --> C (next-24): {"type":"request","command":"next","arguments":{"threadId":1},"seq":24} 1> [DebugAdapter] <-- R (next-24) [4 ms]: {"seq": 52, "type": "response", "request_seq": 24, "success": true, "command": "next"} 1> [DebugAdapter] <-- E (output): {"seq": 53, "type": "event", "event": "output", "body": {"output": ".", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 54, "type": "event", "event": "output", "body": {"output": " [100%]", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 55, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 56, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 57, "type": "event", "event": "output", "body": {"output": "- generated xml file: C:\\Users\\vwazho\\source\\repos\\PythonApplication1\\TestResults\\junitresults_96063626-8e02-4a76-b063-c1d220785f39.xml -", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 58, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 59, "type": "event", "event": "output", "body": {"output": "============================== 1 passed in 1.43s ==============================", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (output): {"seq": 60, "type": "event", "event": "output", "body": {"output": "\n", "category": "stdout", "source": {}}} 1> [DebugAdapter] <-- E (thread): {"seq": 61, "type": "event", "event": "thread", "body": {"reason": "exited", "threadId": 1}} 1> [DebugAdapter] <-- E (terminated): {"seq": 62, "type": "event", "event": "terminated"} 1> [DebugAdapter] --> C (disconnect-25): {"type":"request","command":"disconnect","arguments":{},"seq":25} 1> [DebugAdapter] <-- R (disconnect-25) [6 ms]: {"seq": 63, "type": "response", "request_seq": 25, "success": true, "command": "disconnect"} 1> Debug adapter process exited. 1> WARNING: Stopping due to fatal error: AggregateException: One or more errors occurred. 1> ERROR: Unexpected error AggregateException: One or more errors occurred. System.Threading.Tasks.Task.ThrowIfExceptional(Boolean includeTaskCanceledExceptions) System.Threading.Tasks.Task`1.GetResultCore(Boolean waitCompletionNotification) System.Threading.Tasks.Task`1.get_Result() Microsoft.VisualStudio.Shared.VSCodeDebugProtocol.Protocol.DebugProtocol.ReaderThreadProc() Aggregate exception: IOException: Unable to read data from the transport connection: A blocking operation was interrupted by a call to WSACancelBlockingCall. Inner Exception: SocketException: A blocking operation was interrupted by a call to WSACancelBlockingCall Inner Exception: IOException: Unable to read data from the transport connection: A blocking operation was interrupted by a call to WSACancelBlockingCall. System.Net.Sockets.NetworkStream.Read(Byte[] buffer, Int32 offset, Int32 size) Microsoft.PythonTools.Debugger.DebugRemoteAdapterProcessStream.Read(Byte[] buffer, Int32 offset, Int32 count) System.IO.Stream.<>c.<BeginReadInternal>b__39_0(Object <p0>) System.Threading.Tasks.Task`1.InnerInvoke() System.Threading.Tasks.Task.Execute() --- End of stack trace from previous location where exception was thrown --- System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task) System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task) System.IO.Stream.EndRead(IAsyncResult asyncResult) System.IO.Stream.<>c.<BeginEndReadAsync>b__43_1(Stream stream, IAsyncResult asyncResult) System.Threading.Tasks.TaskFactory`1.FromAsyncTrimPromise`1.Complete(TInstance thisRef, Func`3 endMethod, IAsyncResult asyncResult, Boolean requiresSynchronization) Inner Exception: SocketException: A blocking operation was interrupted by a call to WSACancelBlockingCall System.Net.Sockets.Socket.Receive(Byte[] buffer, Int32 offset, Int32 size, SocketFlags socketFlags) System.Net.Sockets.NetworkStream.Read(Byte[] buffer, Int32 offset, Int32 size) 1> ERROR: One or more errors occurred. Unable to read data from the transport connection: A blocking operation was interrupted by a call to WSACancelBlockingCall. A blocking operation was interrupted by a call to WSACancelBlockingCall 1> ERROR: Exception while reporting error. NullReferenceException: Object reference not set to an instance of an object. Microsoft.VisualStudio.Debugger.VSCodeDebuggerHost.AD7.Implementation.EngineCallback.Send(IAD7DebugEvent eventObject, IDebugThread2 thread) Microsoft.VisualStudio.Debugger.VSCodeDebuggerHost.AD7.Implementation.EngineCallback.OnError(String errorMessage) ```
non_priority
when debugged a second time vs loses its response and restarts steps to reproduce add unit test test py in python application typing code in test py import unittest class test test unittest testcase def test a self self assertequal if name main unittest main set bk in the code in te select the test and right click to select debug selected tests after the first successful debug debug the current test again expected behavior the test can be debugged successfully actual behavior when debugged a second time vs loses its response and restarts debug adapter host log debugadapterhost version commit e output seq type event event output body category telemetry output ptvsd data packageversion c initialize type request command initialize arguments pathformat path clientid visualstudio clientname visual studio adapterid null locale en us true true supportsvariabletype true supportsruninterminalrequest true supportsmemoryreferences true supportsprogressreporting true supportshandshakerequest true seq e output seq type event event output body category telemetry output debugpy data packageversion r initialize seq type response request seq success true command initialize body supportscompletionsrequest true supportsconditionalbreakpoints true supportsconfigurationdonerequest true supportsdebuggerproperties true supportsdelayedstacktraceloading true supportsevaluateforhovers true supportsexceptioninforequest true supportsexceptionoptions true supportshitconditionalbreakpoints true supportslogpoints true supportsmodulesrequest true supportssetexpression true supportssetvariable true supportsvalueformattingoptions true supportsterminatedebuggee true supportsgototargetsrequest true exceptionbreakpointfilters c attach type request command attach arguments host localhost port stoponentry true promptbeforerunningwithbuilderror true redirectoutput true waitonabnormalexit true waitonnormalexit true breakonsystemexitzero false debugstdlib false showreturnvalue true rules seq e debugpywaitingforserver seq type event event debugpywaitingforserver body host port warning no handler registered for event of type debugpywaitingforserver e initialized seq type event event initialized c debugpysysteminfo type request command debugpysysteminfo arguments seq r debugpysysteminfo seq type response request seq success true command debugpysysteminfo body debugpy version python version implementation name cpython version description cpython platform name process pid ppid executable c program files microsoft visual studio shared python exe bitness pydevd usingcython false usingframeeval false c setdebuggerproperty type request command setdebuggerproperty arguments allowoutofprocesssymbols seq c setdebuggerproperty type request command setdebuggerproperty arguments disablejitoptimization seq c setdebuggerproperty type request command setdebuggerproperty arguments enablefastevaluate seq c setdebuggerproperty type request command setdebuggerproperty arguments interpreteroptions seq c setdebuggerproperty type request command setdebuggerproperty arguments justmycodestepping seq c setdebuggerproperty type request command setdebuggerproperty arguments stoponexceptioncrossingmanagedboundary seq c setdebuggerproperty type request command setdebuggerproperty arguments warnifnousercodeonlaunch seq c setdebuggerproperty type request command setdebuggerproperty arguments enablestepfiltering true seq r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty r setdebuggerproperty seq type response request seq success true command setdebuggerproperty c setbreakpoints type request command setbreakpoints arguments source path c users vwazho source repos test a test ut py sources checksums breakpoints lines seq c setbreakpoints type request command setbreakpoints arguments source path c users vwazho source repos test a test pta py sources checksums breakpoints lines seq c setbreakpoints type request command setbreakpoints arguments source path c users vwazho source repos test py sources checksums breakpoints lines seq r setbreakpoints seq type response request seq success true command setbreakpoints body breakpoints checksums line r setbreakpoints seq type response request seq success true command setbreakpoints body breakpoints checksums line r setbreakpoints seq type response request seq success true command setbreakpoints body breakpoints checksums line c setexceptionbreakpoints type request command setexceptionbreakpoints arguments filters exceptionoptions breakmode unhandled path names seq r setexceptionbreakpoints seq type response request seq success true command setexceptionbreakpoints c configurationdone type request command configurationdone arguments seq r configurationdone seq type response request seq success true command configurationdone r attach seq type response request seq success true command attach e process seq type event event process body name c program files microsoft visual studio preview ide extensions microsoft python core testlauncher py systemprocessid islocalprocess true startmethod attach e thread seq type event event thread body reason started threadid e output seq type event event output body output test session starts category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output platform python pytest py pluggy category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output rootdir c users vwazho source repos category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output collected item category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output test py category stdout source e stopped seq type event event stopped body reason breakpoint threadid preservefocushint false allthreadsstopped true c threads type request command threads arguments seq r threads seq type response request seq success true command threads body threads c stacktrace type request command stacktrace arguments threadid startframe levels format includeall true seq r stacktrace seq type response request seq success true command stacktrace body stackframes totalframes e module seq type event event module body reason new module id name test path c users vwazho source repos test py c stacktrace type request command stacktrace arguments threadid startframe levels format parameters true parametertypes true parameternames true line true module true seq e module seq type event event module body reason new module id name pytest python path c program files microsoft visual studio shared lib site packages pytest python py package pytest e module seq type event event module body reason new module id name pluggy callers path c program files microsoft visual studio shared lib site packages pluggy callers py package pluggy e module seq type event event module body reason new module id name pluggy manager path c program files microsoft visual studio shared lib site packages pluggy manager py package pluggy e module seq type event event module body reason new module id name pluggy hooks path c program files microsoft visual studio shared lib site packages pluggy hooks py package pluggy e module seq type event event module body reason new module id name pytest unittest path c program files microsoft visual studio shared lib site packages pytest unittest py package pytest e module seq type event event module body reason new module id name unittest case path c program files microsoft visual studio shared lib unittest case py package unittest e module seq type event event module body reason new module id name pytest runner path c program files microsoft visual studio shared lib site packages pytest runner py package pytest e module seq type event event module body reason new module id name pytest main path c program files microsoft visual studio shared lib site packages pytest main py package pytest e module seq type event event module body reason new module id name pytest config path c program files microsoft visual studio shared lib site packages pytest config init py package pytest config e module seq type event event module body reason new module id name main path c program files microsoft visual studio preview ide extensions microsoft python core testlauncher py package none r stacktrace seq type response request seq success true command stacktrace body stackframes totalframes c stacktrace type request command stacktrace arguments threadid startframe levels format includeall true seq r stacktrace seq type response request seq success true command stacktrace body stackframes totalframes c evaluate type request command evaluate arguments context hover expression test a frameid nosideeffects true timeout seq c evaluate type request command evaluate arguments context hover expression test test frameid nosideeffects true timeout seq c evaluate type request command evaluate arguments context hover expression unittest testcase frameid nosideeffects true timeout seq r evaluate seq type response request seq success false command evaluate message exception occurred during evaluation variablesreference type type presentationhint variablesreference type type presentationhint c next type request command next arguments threadid seq r next seq type response request seq success true command next e output seq type event event output body output category stdout source e output seq type event event output body output category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output generated xml file c users vwazho source repos testresults junitresults xml category stdout source e output seq type event event output body output n category stdout source e output seq type event event output body output passed in category stdout source e output seq type event event output body output n category stdout source e thread seq type event event thread body reason exited threadid e terminated seq type event event terminated c disconnect type request command disconnect arguments seq r disconnect seq type response request seq success true command disconnect debug adapter process exited warning stopping due to fatal error aggregateexception one or more errors occurred error unexpected error aggregateexception one or more errors occurred system threading tasks task throwifexceptional boolean includetaskcanceledexceptions system threading tasks task getresultcore boolean waitcompletionnotification system threading tasks task get result microsoft visualstudio shared vscodedebugprotocol protocol debugprotocol readerthreadproc aggregate exception ioexception unable to read data from the transport connection a blocking operation was interrupted by a call to wsacancelblockingcall inner exception socketexception a blocking operation was interrupted by a call to wsacancelblockingcall inner exception ioexception unable to read data from the transport connection a blocking operation was interrupted by a call to wsacancelblockingcall system net sockets networkstream read byte buffer offset size microsoft pythontools debugger debugremoteadapterprocessstream read byte buffer offset count system io stream c b object system threading tasks task innerinvoke system threading tasks task execute end of stack trace from previous location where exception was thrown system runtime compilerservices taskawaiter throwfornonsuccess task task system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task system io stream endread iasyncresult asyncresult system io stream c b stream stream iasyncresult asyncresult system threading tasks taskfactory fromasynctrimpromise complete tinstance thisref func endmethod iasyncresult asyncresult boolean requiressynchronization inner exception socketexception a blocking operation was interrupted by a call to wsacancelblockingcall system net sockets socket receive byte buffer offset size socketflags socketflags system net sockets networkstream read byte buffer offset size error one or more errors occurred unable to read data from the transport connection a blocking operation was interrupted by a call to wsacancelblockingcall a blocking operation was interrupted by a call to wsacancelblockingcall error exception while reporting error nullreferenceexception object reference not set to an instance of an object microsoft visualstudio debugger vscodedebuggerhost implementation enginecallback send eventobject thread microsoft visualstudio debugger vscodedebuggerhost implementation enginecallback onerror string errormessage
0
41,733
5,394,875,451
IssuesEvent
2017-02-27 06:00:20
OpenDICOMweb/sdk
https://api.github.com/repos/OpenDICOMweb/sdk
closed
Test Tag Validators in tag/tag.dart
dictionary P0 Urgent Test - unit
isValidValues isValidLength isValidWidth isValidVFLength isValidPrivateDataTag
1.0
Test Tag Validators in tag/tag.dart - isValidValues isValidLength isValidWidth isValidVFLength isValidPrivateDataTag
non_priority
test tag validators in tag tag dart isvalidvalues isvalidlength isvalidwidth isvalidvflength isvalidprivatedatatag
0
330,034
24,243,852,494
IssuesEvent
2022-09-27 08:58:35
spring-projects/spring-data-commons
https://api.github.com/repos/spring-projects/spring-data-commons
closed
Prefer Java configuration over XML
type: documentation
While XML configuration is still supported for the time being, we typically don't add new features to it. We should reflect that in the documentation by: * Adding Java configuration variants where XML is used. * Allow for toggling between Java and XML where we have samples for both. * Default to showing the Java variant.
1.0
Prefer Java configuration over XML - While XML configuration is still supported for the time being, we typically don't add new features to it. We should reflect that in the documentation by: * Adding Java configuration variants where XML is used. * Allow for toggling between Java and XML where we have samples for both. * Default to showing the Java variant.
non_priority
prefer java configuration over xml while xml configuration is still supported for the time being we typically don t add new features to it we should reflect that in the documentation by adding java configuration variants where xml is used allow for toggling between java and xml where we have samples for both default to showing the java variant
0
134,595
30,085,429,326
IssuesEvent
2023-06-29 08:17:01
raycast/extensions
https://api.github.com/repos/raycast/extensions
closed
[Visual Studio Code] Issue to open with VSCode Insiders
bug extension extension: visual-studio-code
### Extension https://www.raycast.com/thomas/visual-studio-code ### Description #### Error: ``` Error: The database does not exist Z6:index.tsx:30:30 --- 27: import { getBuildScheme } from "./lib/vscode" ### Steps To Reproduce I use only VSCode Insiders, and I haven't access to all features of the extensions. For instance, I can't use "Search Recent Projects" and "Open with Visual Studio Code". ### Current Behaviour Error page ### Expected Behaviour Do the expected things in VSCode Insiders
1.0
[Visual Studio Code] Issue to open with VSCode Insiders - ### Extension https://www.raycast.com/thomas/visual-studio-code ### Description #### Error: ``` Error: The database does not exist Z6:index.tsx:30:30 --- 27: import { getBuildScheme } from "./lib/vscode" ### Steps To Reproduce I use only VSCode Insiders, and I haven't access to all features of the extensions. For instance, I can't use "Search Recent Projects" and "Open with Visual Studio Code". ### Current Behaviour Error page ### Expected Behaviour Do the expected things in VSCode Insiders
non_priority
issue to open with vscode insiders extension description error error the database does not exist index tsx import getbuildscheme from lib vscode steps to reproduce i use only vscode insiders and i haven t access to all features of the extensions for instance i can t use search recent projects and open with visual studio code current behaviour error page expected behaviour do the expected things in vscode insiders
0
308,683
23,261,222,714
IssuesEvent
2022-08-04 13:39:42
MarketSquare/robotframework-tidy
https://api.github.com/repos/MarketSquare/robotframework-tidy
closed
Doc typo: NormalizeSeparators page - Ignored sections example typo
bug documentation
Doc uses '**sections**' but example incorrectly uses '**section**': ### Ignored sections You can decide which sections should be transformed by configuring **sections** = comments,settings,variables,keywords,testcases param: robotidy --configure NormalizeSeparators:**section**=variables src .....................................................................^^^^
1.0
Doc typo: NormalizeSeparators page - Ignored sections example typo - Doc uses '**sections**' but example incorrectly uses '**section**': ### Ignored sections You can decide which sections should be transformed by configuring **sections** = comments,settings,variables,keywords,testcases param: robotidy --configure NormalizeSeparators:**section**=variables src .....................................................................^^^^
non_priority
doc typo normalizeseparators page ignored sections example typo doc uses sections but example incorrectly uses section ignored sections you can decide which sections should be transformed by configuring sections comments settings variables keywords testcases param robotidy configure normalizeseparators section variables src
0
157,016
19,911,683,548
IssuesEvent
2022-01-25 17:47:47
vlaship/case-coding-test
https://api.github.com/repos/vlaship/case-coding-test
opened
CVE-2021-23463 (High) detected in h2-1.4.200.jar
security vulnerability
## CVE-2021-23463 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>h2-1.4.200.jar</b></p></summary> <p>H2 Database Engine</p> <p>Library home page: <a href="https://h2database.com">https://h2database.com</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /ches/modules-2/files-2.1/com.h2database/h2/1.4.200/f7533fe7cb8e99c87a43d325a77b4b678ad9031a/h2-1.4.200.jar</p> <p> Dependency Hierarchy: - :x: **h2-1.4.200.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vlaship/case-coding-test/commit/b3c9d839b725e3d71d46642e2f32e7b11a28f87b">b3c9d839b725e3d71d46642e2f32e7b11a28f87b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability. <p>Publish Date: 2021-12-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23463>CVE-2021-23463</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23463">https://nvd.nist.gov/vuln/detail/CVE-2021-23463</a></p> <p>Release Date: 2021-12-10</p> <p>Fix Resolution: com.h2database:h2:2.0.202</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23463 (High) detected in h2-1.4.200.jar - ## CVE-2021-23463 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>h2-1.4.200.jar</b></p></summary> <p>H2 Database Engine</p> <p>Library home page: <a href="https://h2database.com">https://h2database.com</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /ches/modules-2/files-2.1/com.h2database/h2/1.4.200/f7533fe7cb8e99c87a43d325a77b4b678ad9031a/h2-1.4.200.jar</p> <p> Dependency Hierarchy: - :x: **h2-1.4.200.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vlaship/case-coding-test/commit/b3c9d839b725e3d71d46642e2f32e7b11a28f87b">b3c9d839b725e3d71d46642e2f32e7b11a28f87b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The package com.h2database:h2 from 1.4.198 and before 2.0.202 are vulnerable to XML External Entity (XXE) Injection via the org.h2.jdbc.JdbcSQLXML class object, when it receives parsed string data from org.h2.jdbc.JdbcResultSet.getSQLXML() method. If it executes the getSource() method when the parameter is DOMSource.class it will trigger the vulnerability. <p>Publish Date: 2021-12-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23463>CVE-2021-23463</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2021-23463">https://nvd.nist.gov/vuln/detail/CVE-2021-23463</a></p> <p>Release Date: 2021-12-10</p> <p>Fix Resolution: com.h2database:h2:2.0.202</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jar cve high severity vulnerability vulnerable library jar database engine library home page a href path to dependency file build gradle path to vulnerable library ches modules files com jar dependency hierarchy x jar vulnerable library found in head commit a href found in base branch master vulnerability details the package com from and before are vulnerable to xml external entity xxe injection via the org jdbc jdbcsqlxml class object when it receives parsed string data from org jdbc jdbcresultset getsqlxml method if it executes the getsource method when the parameter is domsource class it will trigger the vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com step up your open source security game with whitesource
0
143,108
19,142,910,241
IssuesEvent
2021-12-02 02:19:07
arohablue/BlockDockServer
https://api.github.com/repos/arohablue/BlockDockServer
opened
CVE-2021-22096 (Medium) detected in spring-web-4.3.9.RELEASE.jar
security vulnerability
## CVE-2021-22096 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p></summary> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /BlockDockServer/build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/4.3.9.RELEASE/91dae64c4280093ad5fb4736a10913c9233479c1/spring-web-4.3.9.RELEASE.jar</p> <p> Dependency Hierarchy: - grails-core-3.3.0.jar (Root Library) - grails-spring-3.3.0.jar - :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. <p>Publish Date: 2021-10-28 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22096>CVE-2021-22096</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2021-22096">https://tanzu.vmware.com/security/cve-2021-22096</a></p> <p>Release Date: 2021-10-28</p> <p>Fix Resolution: org.springframework:spring:5.2.18.RELEASE,5.3.12</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-22096 (Medium) detected in spring-web-4.3.9.RELEASE.jar - ## CVE-2021-22096 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.3.9.RELEASE.jar</b></p></summary> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /BlockDockServer/build.gradle</p> <p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/org.springframework/spring-web/4.3.9.RELEASE/91dae64c4280093ad5fb4736a10913c9233479c1/spring-web-4.3.9.RELEASE.jar</p> <p> Dependency Hierarchy: - grails-core-3.3.0.jar (Root Library) - grails-spring-3.3.0.jar - :x: **spring-web-4.3.9.RELEASE.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework versions 5.3.0 - 5.3.10, 5.2.0 - 5.2.17, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. <p>Publish Date: 2021-10-28 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22096>CVE-2021-22096</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2021-22096">https://tanzu.vmware.com/security/cve-2021-22096</a></p> <p>Release Date: 2021-10-28</p> <p>Fix Resolution: org.springframework:spring:5.2.18.RELEASE,5.3.12</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in spring web release jar cve medium severity vulnerability vulnerable library spring web release jar spring web library home page a href path to dependency file blockdockserver build gradle path to vulnerable library root gradle caches modules files org springframework spring web release spring web release jar dependency hierarchy grails core jar root library grails spring jar x spring web release jar vulnerable library vulnerability details in spring framework versions and older unsupported versions it is possible for a user to provide malicious input to cause the insertion of additional log entries publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring release step up your open source security game with whitesource
0
44,499
23,655,793,114
IssuesEvent
2022-08-26 11:05:08
datafuselabs/databend
https://api.github.com/repos/datafuselabs/databend
opened
performance: subquery is slow
C-performance
**Summary** query: ``` sql: WITH -- latest 6hours latest AS ( SELECT min(number) FROM blocks WHERE timestamp > ( SELECT subtract_hours(to_datetime(timestamp), 6) FROM blocks ORDER BY timestamp DESC limit 1 )) SELECT token_address, count(*) AS c FROM token_transfers WHERE block_number> ( SELECT * FROM latest) GROUP BY token_address ORDER BY c desc; ``` explain: ``` Project: [token_address (#39),c (#48)] └── Sort: [c (#48) DESC] └── EvalScalar: [COUNT(*) (#50)] └── Aggregate(Final): group items: [token_transfers.token_address (#39)], aggregate functions: [COUNT(*)] └── Aggregate(Partial): group items: [token_transfers.token_address (#39)], aggregate functions: [COUNT(*)] └── Filter: [token_transfers.block_number (#47) > scalar_subquery_37 (#37)] └── HashJoin: SINGLE, build keys: [], probe keys: [], join filters: [] ├── Scan: default.eth.token_transfers, filters: [] └── Project: [min(number) (#37)] └── EvalScalar: [min(number) (#38)] └── Aggregate(Final): group items: [], aggregate functions: [min(number)] └── Aggregate(Partial): group items: [], aggregate functions: [min(number)] └── Filter: [blocks.timestamp (#15) > scalar_subquery_36 (#36)] └── HashJoin: SINGLE, build keys: [], probe keys: [], join filters: [] ├── Scan: default.eth.blocks, filters: [] └── Limit: [1], Offset: [0] └── Project: [subtract_hours(to_datetime(timestamp), 6) (#36)] └── EvalScalar: [subtract_hours(to_datetime(blocks.timestamp (#33)), 6)] └── Sort: [timestamp (#33) DESC] └── Scan: default.eth.blocks, filters: [] ``` The query is very slow, it looks like do a full table scan: ![s9bBFAIp3A](https://user-images.githubusercontent.com/172204/186890284-1dc88bb7-c1af-4c4c-919f-bc12596cd267.jpg) The subquery result is `15388455`: ``` SELECT min(number) FROM blocks WHERE timestamp > ( SELECT subtract_hours(to_datetime(timestamp), 6) FROM blocks ORDER BY timestamp DESC limit 1 )) ``` Rewrite the query to the follow is very fast: ``` SELECT token_address, count(*) AS c FROM token_transfers WHERE block_number>15388455 GROUP BY token_address ORDER BY c desc; ``` ![image](https://user-images.githubusercontent.com/172204/186890167-5aff87b2-ac28-4997-a2de-a61980c85abc.png)
True
performance: subquery is slow - **Summary** query: ``` sql: WITH -- latest 6hours latest AS ( SELECT min(number) FROM blocks WHERE timestamp > ( SELECT subtract_hours(to_datetime(timestamp), 6) FROM blocks ORDER BY timestamp DESC limit 1 )) SELECT token_address, count(*) AS c FROM token_transfers WHERE block_number> ( SELECT * FROM latest) GROUP BY token_address ORDER BY c desc; ``` explain: ``` Project: [token_address (#39),c (#48)] └── Sort: [c (#48) DESC] └── EvalScalar: [COUNT(*) (#50)] └── Aggregate(Final): group items: [token_transfers.token_address (#39)], aggregate functions: [COUNT(*)] └── Aggregate(Partial): group items: [token_transfers.token_address (#39)], aggregate functions: [COUNT(*)] └── Filter: [token_transfers.block_number (#47) > scalar_subquery_37 (#37)] └── HashJoin: SINGLE, build keys: [], probe keys: [], join filters: [] ├── Scan: default.eth.token_transfers, filters: [] └── Project: [min(number) (#37)] └── EvalScalar: [min(number) (#38)] └── Aggregate(Final): group items: [], aggregate functions: [min(number)] └── Aggregate(Partial): group items: [], aggregate functions: [min(number)] └── Filter: [blocks.timestamp (#15) > scalar_subquery_36 (#36)] └── HashJoin: SINGLE, build keys: [], probe keys: [], join filters: [] ├── Scan: default.eth.blocks, filters: [] └── Limit: [1], Offset: [0] └── Project: [subtract_hours(to_datetime(timestamp), 6) (#36)] └── EvalScalar: [subtract_hours(to_datetime(blocks.timestamp (#33)), 6)] └── Sort: [timestamp (#33) DESC] └── Scan: default.eth.blocks, filters: [] ``` The query is very slow, it looks like do a full table scan: ![s9bBFAIp3A](https://user-images.githubusercontent.com/172204/186890284-1dc88bb7-c1af-4c4c-919f-bc12596cd267.jpg) The subquery result is `15388455`: ``` SELECT min(number) FROM blocks WHERE timestamp > ( SELECT subtract_hours(to_datetime(timestamp), 6) FROM blocks ORDER BY timestamp DESC limit 1 )) ``` Rewrite the query to the follow is very fast: ``` SELECT token_address, count(*) AS c FROM token_transfers WHERE block_number>15388455 GROUP BY token_address ORDER BY c desc; ``` ![image](https://user-images.githubusercontent.com/172204/186890167-5aff87b2-ac28-4997-a2de-a61980c85abc.png)
non_priority
performance subquery is slow summary query sql with latest latest as select min number from blocks where timestamp select subtract hours to datetime timestamp from blocks order by timestamp desc limit select token address count as c from token transfers where block number select from latest group by token address order by c desc explain project └── sort └── evalscalar └── aggregate final group items aggregate functions └── aggregate partial group items aggregate functions └── filter └── hashjoin single build keys probe keys join filters ├── scan default eth token transfers filters └── project └── evalscalar └── aggregate final group items aggregate functions └── aggregate partial group items aggregate functions └── filter └── hashjoin single build keys probe keys join filters ├── scan default eth blocks filters └── limit offset └── project └── evalscalar └── sort └── scan default eth blocks filters the query is very slow it looks like do a full table scan the subquery result is select min number from blocks where timestamp select subtract hours to datetime timestamp from blocks order by timestamp desc limit rewrite the query to the follow is very fast select token address count as c from token transfers where block number group by token address order by c desc
0
311,433
26,791,769,224
IssuesEvent
2023-02-01 09:03:35
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
opened
kv/kvserver: TestSnapshotAfterTruncation failed
C-test-failure O-robot branch-master
kv/kvserver.TestSnapshotAfterTruncation [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8536064?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8536064?buildTab=artifacts#/) on master @ [da247ff22039f4579e2b043656ba561e71876115](https://github.com/cockroachdb/cockroach/commits/da247ff22039f4579e2b043656ba561e71876115): ``` === RUN TestSnapshotAfterTruncation/differentTerm client_raft_test.go:757: Error Trace: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/2900/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-fastbuild/bin/pkg/kv/kvserver/kvserver_test_/kvserver_test.runfiles/com_github_cockroachdb_cockroach/pkg/kv/kvserver/client_raft_test.go:757 Error: Received unexpected error: migration-job-find-already-completed: unexpected value: raw_bytes:"N\022n\316\n" timestamp:<wall_time:1675240624532525057 > (1) attached stack trace -- stack trace: | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).execInternal.func1.1 | github.com/cockroachdb/cockroach/pkg/sql/internal.go:844 | github.com/cockroachdb/cockroach/pkg/sql.(*rowsIterator).Next.func1 | github.com/cockroachdb/cockroach/pkg/sql/internal.go:424 | github.com/cockroachdb/cockroach/pkg/sql.(*rowsIterator).Next | github.com/cockroachdb/cockroach/pkg/sql/internal.go:475 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).queryInternalBuffered | github.com/cockroachdb/cockroach/pkg/sql/internal.go:585 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).QueryRowExWithCols | github.com/cockroachdb/cockroach/pkg/sql/internal.go:637 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).QueryRowEx | github.com/cockroachdb/cockroach/pkg/sql/internal.go:623 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).QueryRow | github.com/cockroachdb/cockroach/pkg/sql/internal.go:607 | github.com/cockroachdb/cockroach/pkg/upgrade/migrationstable.CheckIfMigrationCompleted | github.com/cockroachdb/cockroach/pkg/upgrade/migrationstable/migrations_table.go:118 | github.com/cockroachdb/cockroach/pkg/upgrade/upgrademanager.(*Manager).RunPermanentUpgrades | github.com/cockroachdb/cockroach/pkg/upgrade/upgrademanager/manager.go:210 | github.com/cockroachdb/cockroach/pkg/server.(*SQLServer).preStart | github.com/cockroachdb/cockroach/pkg/server/server_sql.go:1515 | github.com/cockroachdb/cockroach/pkg/server.(*Server).PreStart | github.com/cockroachdb/cockroach/pkg/server/server.go:1833 | github.com/cockroachdb/cockroach/pkg/server.(*Server).Start | github.com/cockroachdb/cockroach/pkg/server/server.go:1186 | github.com/cockroachdb/cockroach/pkg/server.(*TestServer).Start | github.com/cockroachdb/cockroach/pkg/server/testserver.go:598 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster.(*TestCluster).RestartServerWithInspect.func1 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:1594 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster.(*TestCluster).RestartServerWithInspect | github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:1605 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster.(*TestCluster).RestartServer | github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:1535 | github.com/cockroachdb/cockroach/pkg/kv/kvserver_test.TestSnapshotAfterTruncation.func1 | github.com/cockroachdb/cockroach/pkg/kv/kvserver_test/pkg/kv/kvserver/client_raft_test.go:757 | testing.tRunner | GOROOT/src/testing/testing.go:1446 | runtime.goexit | src/runtime/asm_amd64.s:1594 Wraps: (2) migration-job-find-already-completed Wraps: (3) unexpected value: raw_bytes:"N\022n\316\n" timestamp:<wall_time:1675240624532525057 > Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *roachpb.ConditionFailedError Test: TestSnapshotAfterTruncation/differentTerm --- FAIL: TestSnapshotAfterTruncation/differentTerm (9.17s) ``` <p>Parameters: <code>TAGS=bazel,gss,race</code> </p> <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> /cc @cockroachdb/replication <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSnapshotAfterTruncation.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
1.0
kv/kvserver: TestSnapshotAfterTruncation failed - kv/kvserver.TestSnapshotAfterTruncation [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8536064?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_StressBazel/8536064?buildTab=artifacts#/) on master @ [da247ff22039f4579e2b043656ba561e71876115](https://github.com/cockroachdb/cockroach/commits/da247ff22039f4579e2b043656ba561e71876115): ``` === RUN TestSnapshotAfterTruncation/differentTerm client_raft_test.go:757: Error Trace: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/2900/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-fastbuild/bin/pkg/kv/kvserver/kvserver_test_/kvserver_test.runfiles/com_github_cockroachdb_cockroach/pkg/kv/kvserver/client_raft_test.go:757 Error: Received unexpected error: migration-job-find-already-completed: unexpected value: raw_bytes:"N\022n\316\n" timestamp:<wall_time:1675240624532525057 > (1) attached stack trace -- stack trace: | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).execInternal.func1.1 | github.com/cockroachdb/cockroach/pkg/sql/internal.go:844 | github.com/cockroachdb/cockroach/pkg/sql.(*rowsIterator).Next.func1 | github.com/cockroachdb/cockroach/pkg/sql/internal.go:424 | github.com/cockroachdb/cockroach/pkg/sql.(*rowsIterator).Next | github.com/cockroachdb/cockroach/pkg/sql/internal.go:475 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).queryInternalBuffered | github.com/cockroachdb/cockroach/pkg/sql/internal.go:585 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).QueryRowExWithCols | github.com/cockroachdb/cockroach/pkg/sql/internal.go:637 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).QueryRowEx | github.com/cockroachdb/cockroach/pkg/sql/internal.go:623 | github.com/cockroachdb/cockroach/pkg/sql.(*InternalExecutor).QueryRow | github.com/cockroachdb/cockroach/pkg/sql/internal.go:607 | github.com/cockroachdb/cockroach/pkg/upgrade/migrationstable.CheckIfMigrationCompleted | github.com/cockroachdb/cockroach/pkg/upgrade/migrationstable/migrations_table.go:118 | github.com/cockroachdb/cockroach/pkg/upgrade/upgrademanager.(*Manager).RunPermanentUpgrades | github.com/cockroachdb/cockroach/pkg/upgrade/upgrademanager/manager.go:210 | github.com/cockroachdb/cockroach/pkg/server.(*SQLServer).preStart | github.com/cockroachdb/cockroach/pkg/server/server_sql.go:1515 | github.com/cockroachdb/cockroach/pkg/server.(*Server).PreStart | github.com/cockroachdb/cockroach/pkg/server/server.go:1833 | github.com/cockroachdb/cockroach/pkg/server.(*Server).Start | github.com/cockroachdb/cockroach/pkg/server/server.go:1186 | github.com/cockroachdb/cockroach/pkg/server.(*TestServer).Start | github.com/cockroachdb/cockroach/pkg/server/testserver.go:598 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster.(*TestCluster).RestartServerWithInspect.func1 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:1594 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster.(*TestCluster).RestartServerWithInspect | github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:1605 | github.com/cockroachdb/cockroach/pkg/testutils/testcluster.(*TestCluster).RestartServer | github.com/cockroachdb/cockroach/pkg/testutils/testcluster/testcluster.go:1535 | github.com/cockroachdb/cockroach/pkg/kv/kvserver_test.TestSnapshotAfterTruncation.func1 | github.com/cockroachdb/cockroach/pkg/kv/kvserver_test/pkg/kv/kvserver/client_raft_test.go:757 | testing.tRunner | GOROOT/src/testing/testing.go:1446 | runtime.goexit | src/runtime/asm_amd64.s:1594 Wraps: (2) migration-job-find-already-completed Wraps: (3) unexpected value: raw_bytes:"N\022n\316\n" timestamp:<wall_time:1675240624532525057 > Error types: (1) *withstack.withStack (2) *errutil.withPrefix (3) *roachpb.ConditionFailedError Test: TestSnapshotAfterTruncation/differentTerm --- FAIL: TestSnapshotAfterTruncation/differentTerm (9.17s) ``` <p>Parameters: <code>TAGS=bazel,gss,race</code> </p> <details><summary>Help</summary> <p> See also: [How To Investigate a Go Test Failure \(internal\)](https://cockroachlabs.atlassian.net/l/c/HgfXfJgM) </p> </details> /cc @cockroachdb/replication <sub> [This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*TestSnapshotAfterTruncation.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues) </sub>
non_priority
kv kvserver testsnapshotaftertruncation failed kv kvserver testsnapshotaftertruncation with on master run testsnapshotaftertruncation differentterm client raft test go error trace home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out fastbuild bin pkg kv kvserver kvserver test kvserver test runfiles com github cockroachdb cockroach pkg kv kvserver client raft test go error received unexpected error migration job find already completed unexpected value raw bytes n n timestamp attached stack trace stack trace github com cockroachdb cockroach pkg sql internalexecutor execinternal github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg sql rowsiterator next github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg sql rowsiterator next github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg sql internalexecutor queryinternalbuffered github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg sql internalexecutor queryrowexwithcols github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg sql internalexecutor queryrowex github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg sql internalexecutor queryrow github com cockroachdb cockroach pkg sql internal go github com cockroachdb cockroach pkg upgrade migrationstable checkifmigrationcompleted github com cockroachdb cockroach pkg upgrade migrationstable migrations table go github com cockroachdb cockroach pkg upgrade upgrademanager manager runpermanentupgrades github com cockroachdb cockroach pkg upgrade upgrademanager manager go github com cockroachdb cockroach pkg server sqlserver prestart github com cockroachdb cockroach pkg server server sql go github com cockroachdb cockroach pkg server server prestart github com cockroachdb cockroach pkg server server go github com cockroachdb cockroach pkg server server start github com cockroachdb cockroach pkg server server go github com cockroachdb cockroach pkg server testserver start github com cockroachdb cockroach pkg server testserver go github com cockroachdb cockroach pkg testutils testcluster testcluster restartserverwithinspect github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg testutils testcluster testcluster restartserverwithinspect github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg testutils testcluster testcluster restartserver github com cockroachdb cockroach pkg testutils testcluster testcluster go github com cockroachdb cockroach pkg kv kvserver test testsnapshotaftertruncation github com cockroachdb cockroach pkg kv kvserver test pkg kv kvserver client raft test go testing trunner goroot src testing testing go runtime goexit src runtime asm s wraps migration job find already completed wraps unexpected value raw bytes n n timestamp error types withstack withstack errutil withprefix roachpb conditionfailederror test testsnapshotaftertruncation differentterm fail testsnapshotaftertruncation differentterm parameters tags bazel gss race help see also cc cockroachdb replication
0
417,437
28,110,487,846
IssuesEvent
2023-03-31 06:43:28
NoyaRoeT/ped
https://api.github.com/repos/NoyaRoeT/ped
opened
Explanation of filter command is a bit brief
type.DocumentationBug severity.Low
It seems that when filtering by tags, the matching of tags is case-sensitive. Perhaps it would be better to explain these sort of details. <!--session: 1680242665641-1b491de0-615b-40bf-af0d-409ed132ea12--> <!--Version: Web v3.4.7-->
1.0
Explanation of filter command is a bit brief - It seems that when filtering by tags, the matching of tags is case-sensitive. Perhaps it would be better to explain these sort of details. <!--session: 1680242665641-1b491de0-615b-40bf-af0d-409ed132ea12--> <!--Version: Web v3.4.7-->
non_priority
explanation of filter command is a bit brief it seems that when filtering by tags the matching of tags is case sensitive perhaps it would be better to explain these sort of details
0
112,389
9,564,143,384
IssuesEvent
2019-05-05 00:22:09
KingAkeem/TorBotApp
https://api.github.com/repos/KingAkeem/TorBotApp
opened
Design method of testing GetLinks and GetEmails functions
enhancement test added test improvement
I'm not sure how to accurately test these methods since we have to be able to generate HTML that can be parsed by the [HTML parsing library](https://godoc.org/golang.org/x/net/html) being used.
2.0
Design method of testing GetLinks and GetEmails functions - I'm not sure how to accurately test these methods since we have to be able to generate HTML that can be parsed by the [HTML parsing library](https://godoc.org/golang.org/x/net/html) being used.
non_priority
design method of testing getlinks and getemails functions i m not sure how to accurately test these methods since we have to be able to generate html that can be parsed by the being used
0
14,330
3,828,050,744
IssuesEvent
2016-03-31 02:37:58
studentinsights/studentinsights
https://api.github.com/repos/studentinsights/studentinsights
closed
3/29 Code for Boston agenda
documentation
Last week: #208 (comment). **Review priorities (umbrella issues):** * current: finish Student profile improvements * ??? * next: Productionize visualizations of STAR academic progress * after: SPED referral form **Help finish what's in progress:** * Finish any work-in-progress you own * Help anyone else with work-in-progress if you can (keeping in mind that sometimes piling on more people doesn't help) * Check out work that's left over from last week. * Check open pull requests * Umbrella issues - see if there's a clear piece you can get done on one of the open issues **Start some new work:** * Fix an Open bug * Start on a help wanted issue * Start a brand new feature * Talk it out with Kevin if you have questions or if you're stuck **Help new folks pitch in:** * Coordinating tonight: @erose * Talk about any questions from the project overview * Help them set up development environment * Show them the agenda issue and our workflow
1.0
3/29 Code for Boston agenda - Last week: #208 (comment). **Review priorities (umbrella issues):** * current: finish Student profile improvements * ??? * next: Productionize visualizations of STAR academic progress * after: SPED referral form **Help finish what's in progress:** * Finish any work-in-progress you own * Help anyone else with work-in-progress if you can (keeping in mind that sometimes piling on more people doesn't help) * Check out work that's left over from last week. * Check open pull requests * Umbrella issues - see if there's a clear piece you can get done on one of the open issues **Start some new work:** * Fix an Open bug * Start on a help wanted issue * Start a brand new feature * Talk it out with Kevin if you have questions or if you're stuck **Help new folks pitch in:** * Coordinating tonight: @erose * Talk about any questions from the project overview * Help them set up development environment * Show them the agenda issue and our workflow
non_priority
code for boston agenda last week comment review priorities umbrella issues current finish student profile improvements next productionize visualizations of star academic progress after sped referral form help finish what s in progress finish any work in progress you own help anyone else with work in progress if you can keeping in mind that sometimes piling on more people doesn t help check out work that s left over from last week check open pull requests umbrella issues see if there s a clear piece you can get done on one of the open issues start some new work fix an open bug start on a help wanted issue start a brand new feature talk it out with kevin if you have questions or if you re stuck help new folks pitch in coordinating tonight erose talk about any questions from the project overview help them set up development environment show them the agenda issue and our workflow
0