Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
18,976
13,507,434,496
IssuesEvent
2020-09-14 05:57:11
joncampbell123/dosbox-x
https://api.github.com/repos/joncampbell123/dosbox-x
closed
Confusing "Quick right mouse button copy/paste"
usability
**Is your feature request related to a problem? Please describe.** https://github.com/joncampbell123/dosbox-x/blob/23653d031af2036b241d53bb94e548fff79a1ec7/CHANGELOG#L329 ![2020-09-10_23-51-54](https://user-images.githubusercontent.com/1537591/92812988-a70ae180-f3c0-11ea-93dd-28df1cb75912.png) This is confusing, I thought I'd be able to copy a .BAS program I typed and that wasn't yet saved but no, it overwrote it with Windows clipboard! **Describe the solution you'd like** This should rather be something like `Paste text in Windows clipboard with right mouse button click`, things will be clear then.
True
Confusing "Quick right mouse button copy/paste" - **Is your feature request related to a problem? Please describe.** https://github.com/joncampbell123/dosbox-x/blob/23653d031af2036b241d53bb94e548fff79a1ec7/CHANGELOG#L329 ![2020-09-10_23-51-54](https://user-images.githubusercontent.com/1537591/92812988-a70ae180-f3c0-11ea-93dd-28df1cb75912.png) This is confusing, I thought I'd be able to copy a .BAS program I typed and that wasn't yet saved but no, it overwrote it with Windows clipboard! **Describe the solution you'd like** This should rather be something like `Paste text in Windows clipboard with right mouse button click`, things will be clear then.
non_priority
confusing quick right mouse button copy paste is your feature request related to a problem please describe this is confusing i thought i d be able to copy a bas program i typed and that wasn t yet saved but no it overwrote it with windows clipboard describe the solution you d like this should rather be something like paste text in windows clipboard with right mouse button click things will be clear then
0
28,602
23,384,199,204
IssuesEvent
2022-08-11 12:25:08
getlago/lago
https://api.github.com/repos/getlago/lago
closed
Unable to Install my own SSL Certificate in "lago-api" Docker Container.
issue: help wanted Infrastructure issue: discussion
Hi, I have deployed lago through Docker on my AWS EC2 Instance. Now the problem is if I set my LAGO_FRONT_URL and LAGO_API_URL to my instance's public IPv4, I can succesfully login but cannot copy the api from the Copy API button. getting the error <b>"Cannot read properties of undefined (reading 'writeText')"<b> So I looked into this error and found that my frontend and api should be on "HTTPS" or either the button will not work. So I installed my own certificate in <b>"lago-front"</b> Docker container through nginx but I am unable to install the ssl cerificate on the api container. Since 443 port of my instance is already bound to lago-front container I cannot bind it to lago-api container. I also found another way to install certificate which was installing it directly through rails i-e <b> rails s puma -b 'ssl://0.0.0.0:9292?key=path_to_key.key&cert=path_to_cert.crt&verify_mode=none&ca=path_to_root_bundle.crt' <b> When I try to install the certificate through puma it says addressport 3000 is already in use. Obiously because the api is running on 3000 port it wont start the server on the same port. I am stuck here. Kindly help me with the installation of SSL certificate on the api docker container. I did this setup on my personal machine and it was running perfect because the url was localhost but on the ec2 instance I am facing this ssl issue. Need to install my own SSL certificate, not from letsencrypt.
1.0
Unable to Install my own SSL Certificate in "lago-api" Docker Container. - Hi, I have deployed lago through Docker on my AWS EC2 Instance. Now the problem is if I set my LAGO_FRONT_URL and LAGO_API_URL to my instance's public IPv4, I can succesfully login but cannot copy the api from the Copy API button. getting the error <b>"Cannot read properties of undefined (reading 'writeText')"<b> So I looked into this error and found that my frontend and api should be on "HTTPS" or either the button will not work. So I installed my own certificate in <b>"lago-front"</b> Docker container through nginx but I am unable to install the ssl cerificate on the api container. Since 443 port of my instance is already bound to lago-front container I cannot bind it to lago-api container. I also found another way to install certificate which was installing it directly through rails i-e <b> rails s puma -b 'ssl://0.0.0.0:9292?key=path_to_key.key&cert=path_to_cert.crt&verify_mode=none&ca=path_to_root_bundle.crt' <b> When I try to install the certificate through puma it says addressport 3000 is already in use. Obiously because the api is running on 3000 port it wont start the server on the same port. I am stuck here. Kindly help me with the installation of SSL certificate on the api docker container. I did this setup on my personal machine and it was running perfect because the url was localhost but on the ec2 instance I am facing this ssl issue. Need to install my own SSL certificate, not from letsencrypt.
non_priority
unable to install my own ssl certificate in lago api docker container hi i have deployed lago through docker on my aws instance now the problem is if i set my lago front url and lago api url to my instance s public i can succesfully login but cannot copy the api from the copy api button getting the error cannot read properties of undefined reading writetext so i looked into this error and found that my frontend and api should be on https or either the button will not work so i installed my own certificate in lago front docker container through nginx but i am unable to install the ssl cerificate on the api container since port of my instance is already bound to lago front container i cannot bind it to lago api container i also found another way to install certificate which was installing it directly through rails i e rails s puma b ssl key path to key key cert path to cert crt verify mode none ca path to root bundle crt when i try to install the certificate through puma it says addressport is already in use obiously because the api is running on port it wont start the server on the same port i am stuck here kindly help me with the installation of ssl certificate on the api docker container i did this setup on my personal machine and it was running perfect because the url was localhost but on the instance i am facing this ssl issue need to install my own ssl certificate not from letsencrypt
0
388,676
26,777,600,660
IssuesEvent
2023-01-31 18:21:16
uf-mil/mil
https://api.github.com/repos/uf-mil/mil
opened
Add note on receiving packages and sending info to Schwartz
documentation software difficulty: very easy
### Assignee _No response_ ### Deadline _No response_ ### What needs to change? Whenever a package is received in MIL, a note needs to be sent to Schwartz - a note on this should be added to the docs. ### How would this task be tested? 1. No testing - just add to docs. ### Contacts - [ ] We need help from the mechanical team. - [ ] We need help from the electrical team. - [ ] We need help from Dr. Schwartz or other faculty. - [ ] We need help from a company or an organization. - [ ] We need help from another UF staff member or organization (ex, facilities).
1.0
Add note on receiving packages and sending info to Schwartz - ### Assignee _No response_ ### Deadline _No response_ ### What needs to change? Whenever a package is received in MIL, a note needs to be sent to Schwartz - a note on this should be added to the docs. ### How would this task be tested? 1. No testing - just add to docs. ### Contacts - [ ] We need help from the mechanical team. - [ ] We need help from the electrical team. - [ ] We need help from Dr. Schwartz or other faculty. - [ ] We need help from a company or an organization. - [ ] We need help from another UF staff member or organization (ex, facilities).
non_priority
add note on receiving packages and sending info to schwartz assignee no response deadline no response what needs to change whenever a package is received in mil a note needs to be sent to schwartz a note on this should be added to the docs how would this task be tested no testing just add to docs contacts we need help from the mechanical team we need help from the electrical team we need help from dr schwartz or other faculty we need help from a company or an organization we need help from another uf staff member or organization ex facilities
0
301,448
22,756,998,663
IssuesEvent
2022-07-07 17:26:17
dagster-io/dagster
https://api.github.com/repos/dagster-io/dagster
closed
Add migration guide to documentation
documentation
## Advice We would like to see a structured release planning and a guide\examples to upgrade the dagster platform in production, with major pitfalls covered. ## Ideas of Implementation Add a session of migration guide in [releases chapter](https://docs.dagster.io/community/releases).
1.0
Add migration guide to documentation - ## Advice We would like to see a structured release planning and a guide\examples to upgrade the dagster platform in production, with major pitfalls covered. ## Ideas of Implementation Add a session of migration guide in [releases chapter](https://docs.dagster.io/community/releases).
non_priority
add migration guide to documentation advice we would like to see a structured release planning and a guide examples to upgrade the dagster platform in production with major pitfalls covered ideas of implementation add a session of migration guide in
0
5,937
2,989,943,077
IssuesEvent
2015-07-21 05:05:38
ecology-rocks/grammaR
https://api.github.com/repos/ecology-rocks/grammaR
opened
spinStory
documentation enhancement generalize testing
I just copied/pasted from the old stuff. Will need to generalize, test, document, etc. Probably take the write() out as default, since that's terrible practice. Also dangerous.
1.0
spinStory - I just copied/pasted from the old stuff. Will need to generalize, test, document, etc. Probably take the write() out as default, since that's terrible practice. Also dangerous.
non_priority
spinstory i just copied pasted from the old stuff will need to generalize test document etc probably take the write out as default since that s terrible practice also dangerous
0
398,566
27,201,794,087
IssuesEvent
2023-02-20 10:14:19
giantswarm/harbor-app
https://api.github.com/repos/giantswarm/harbor-app
closed
Documentation of operational information
documentation
We need to have some operational information available and updated: - Disaster recovery of harbor - Updating to a new version of harbor - Recovering a failed deployment for harbor - Debugging runtime issues (where to find logs, which info is exposed where)
1.0
Documentation of operational information - We need to have some operational information available and updated: - Disaster recovery of harbor - Updating to a new version of harbor - Recovering a failed deployment for harbor - Debugging runtime issues (where to find logs, which info is exposed where)
non_priority
documentation of operational information we need to have some operational information available and updated disaster recovery of harbor updating to a new version of harbor recovering a failed deployment for harbor debugging runtime issues where to find logs which info is exposed where
0
104,987
13,152,284,058
IssuesEvent
2020-08-09 21:20:59
merenlab/anvio
https://api.github.com/repos/merenlab/anvio
closed
genes_in_contigs table should have a "type" column, which states whether the gene is coding or non-coding
contigs database core design
In the current design, it is very hacky/difficult to work with gene collections when you want codon sequences and values like 'codon_order_in_gene' and 'base_pos_in_codon', because noncoding genes do not have these attributes. This issue is magnified greatly when external gene calls are imported during anvi-gen-contigs-database
1.0
genes_in_contigs table should have a "type" column, which states whether the gene is coding or non-coding - In the current design, it is very hacky/difficult to work with gene collections when you want codon sequences and values like 'codon_order_in_gene' and 'base_pos_in_codon', because noncoding genes do not have these attributes. This issue is magnified greatly when external gene calls are imported during anvi-gen-contigs-database
non_priority
genes in contigs table should have a type column which states whether the gene is coding or non coding in the current design it is very hacky difficult to work with gene collections when you want codon sequences and values like codon order in gene and base pos in codon because noncoding genes do not have these attributes this issue is magnified greatly when external gene calls are imported during anvi gen contigs database
0
30,790
11,849,415,471
IssuesEvent
2020-03-24 15:12:52
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
Simplify or remove Kibana Privilege Calculator
Feature:Security/Feature Controls Team:Security chore
## Background The role management screen utilizes a Privilege Calculator in order to tell users what their effective privileges are for the role in question. It takes the following into account: - Global Base Privileges - Global Feature Privileges - Space Base Privileges - Space Feature Privileges It currently relies on an implicit hierarchy, where certain privilege definitions are assumed to be subsets of other definitions. A bulk of this complexity comes from the fact that we tell the user *why* a privilege is set to a specific value. For example, we are able to say things like: "Your original `canvas:read` feature privilege for space `x` was superseded by the global base privilege of `all`" If we remove these explanations from the UI, I believe we can greatly simplify the calculator. ## Problem The calculator as it exists today is essentially tech debt that we took on to implement the first round of Feature Controls. We knew it wasn't a construct that we could keep around longterm. Concretely, the implicit hierarchy of privileges is a blocker to implementing https://github.com/elastic/kibana/issues/35616. ## Proposal We will likely want to continue to show the effective privileges in the UI, on the role management screen, and potentially elsewhere in the future. Simplifying the calculator by removing the explanations would considerably reduce the complexity, and should allow us to restructure the calculator itself to be easier to reason about and maintain going forward.
True
Simplify or remove Kibana Privilege Calculator - ## Background The role management screen utilizes a Privilege Calculator in order to tell users what their effective privileges are for the role in question. It takes the following into account: - Global Base Privileges - Global Feature Privileges - Space Base Privileges - Space Feature Privileges It currently relies on an implicit hierarchy, where certain privilege definitions are assumed to be subsets of other definitions. A bulk of this complexity comes from the fact that we tell the user *why* a privilege is set to a specific value. For example, we are able to say things like: "Your original `canvas:read` feature privilege for space `x` was superseded by the global base privilege of `all`" If we remove these explanations from the UI, I believe we can greatly simplify the calculator. ## Problem The calculator as it exists today is essentially tech debt that we took on to implement the first round of Feature Controls. We knew it wasn't a construct that we could keep around longterm. Concretely, the implicit hierarchy of privileges is a blocker to implementing https://github.com/elastic/kibana/issues/35616. ## Proposal We will likely want to continue to show the effective privileges in the UI, on the role management screen, and potentially elsewhere in the future. Simplifying the calculator by removing the explanations would considerably reduce the complexity, and should allow us to restructure the calculator itself to be easier to reason about and maintain going forward.
non_priority
simplify or remove kibana privilege calculator background the role management screen utilizes a privilege calculator in order to tell users what their effective privileges are for the role in question it takes the following into account global base privileges global feature privileges space base privileges space feature privileges it currently relies on an implicit hierarchy where certain privilege definitions are assumed to be subsets of other definitions a bulk of this complexity comes from the fact that we tell the user why a privilege is set to a specific value for example we are able to say things like your original canvas read feature privilege for space x was superseded by the global base privilege of all if we remove these explanations from the ui i believe we can greatly simplify the calculator problem the calculator as it exists today is essentially tech debt that we took on to implement the first round of feature controls we knew it wasn t a construct that we could keep around longterm concretely the implicit hierarchy of privileges is a blocker to implementing proposal we will likely want to continue to show the effective privileges in the ui on the role management screen and potentially elsewhere in the future simplifying the calculator by removing the explanations would considerably reduce the complexity and should allow us to restructure the calculator itself to be easier to reason about and maintain going forward
0
345,967
30,856,780,967
IssuesEvent
2023-08-02 21:21:52
istio/istio.io
https://api.github.com/repos/istio/istio.io
reopened
Performance doc charts are out of date.
area/test and release kind/docs lifecycle/stale
https://istio.io/latest/docs/ops/deployment/performance-and-scalability/ Docs use {{< istio_release_name >}} so they state 1.15. Chart svgs were last updated for 1.8 https://github.com/istio/istio.io/pull/8574 The results in the text are likely out of date as well.
1.0
Performance doc charts are out of date. - https://istio.io/latest/docs/ops/deployment/performance-and-scalability/ Docs use {{< istio_release_name >}} so they state 1.15. Chart svgs were last updated for 1.8 https://github.com/istio/istio.io/pull/8574 The results in the text are likely out of date as well.
non_priority
performance doc charts are out of date docs use so they state chart svgs were last updated for the results in the text are likely out of date as well
0
26,752
5,284,723,939
IssuesEvent
2017-02-08 01:26:53
simplabs/ember-simple-auth
https://api.github.com/repos/simplabs/ember-simple-auth
closed
Feature request - Add demo app
documentation
Hi, I have been doing a demo app for 0.8.0 version of ESA with a "devise" backend. Do you plan to add some examples or demo apps inside the repo for the 1.0 version? I would be interested in helping with this.
1.0
Feature request - Add demo app - Hi, I have been doing a demo app for 0.8.0 version of ESA with a "devise" backend. Do you plan to add some examples or demo apps inside the repo for the 1.0 version? I would be interested in helping with this.
non_priority
feature request add demo app hi i have been doing a demo app for version of esa with a devise backend do you plan to add some examples or demo apps inside the repo for the version i would be interested in helping with this
0
100,391
30,692,602,122
IssuesEvent
2023-07-26 16:08:21
metabase/metabase
https://api.github.com/repos/metabase/metabase
opened
Get the CLJS REPL connecting to Metabase running in the browser
Type:Bug .Building & Releasing .Team/QueryProcessor :hammer_and_wrench:
### Describe the bug When working in the CLJS environment, the Node REPL runs in its own world, separate from the browser. Some functionality doesn't work at all there (the DOM for example), and other things are different from the browser environment. One notable gap is that `metabase.lib.core` doesn't work at all in the Node environment, but works fine in the browser. Without that "kitchen sink" file, `defmethod`s in various `metabase.lib.*` namespaces may not be loaded, which causes odd behavior when trying to debug CLJS-only issues. In addition, connecting to the live, running browser instance is very powerful because it gives access to the current real metadata, the current query, and more. ### To Reproduce `yarn cljs-nrepl` starts an impoverished NodeJS environment with an nrepl connection. ### Expected behavior This (or a similar command) should connect to the live Metabase instance in your browser. ### Logs _No response_ ### Information about your Metabase installation ```JSON master ``` ### Severity Annoying when debugging CLJS-only issues; FE integration for MLv2. ### Additional context This doesn't work out of the box because of our nonstandard `shadow-cljs` configuration. The typical pattern `shadow-cljs` expects for a browser app is to combine some JS dependencies, CLJS dependencies, and our own CLJS code, and compile it. It expects that this output is what ships to the browser. In dev mode, extra libraries and startup code support connecting a Clojure REPL to the browser environment. Our configuration is to compile our CLJS code into a module, which webpack will combine with the FE code. There's no reason that we can't include the necessary libraries and startup code in this process, it just doesn't work out of the box and isn't trivial to include.
1.0
Get the CLJS REPL connecting to Metabase running in the browser - ### Describe the bug When working in the CLJS environment, the Node REPL runs in its own world, separate from the browser. Some functionality doesn't work at all there (the DOM for example), and other things are different from the browser environment. One notable gap is that `metabase.lib.core` doesn't work at all in the Node environment, but works fine in the browser. Without that "kitchen sink" file, `defmethod`s in various `metabase.lib.*` namespaces may not be loaded, which causes odd behavior when trying to debug CLJS-only issues. In addition, connecting to the live, running browser instance is very powerful because it gives access to the current real metadata, the current query, and more. ### To Reproduce `yarn cljs-nrepl` starts an impoverished NodeJS environment with an nrepl connection. ### Expected behavior This (or a similar command) should connect to the live Metabase instance in your browser. ### Logs _No response_ ### Information about your Metabase installation ```JSON master ``` ### Severity Annoying when debugging CLJS-only issues; FE integration for MLv2. ### Additional context This doesn't work out of the box because of our nonstandard `shadow-cljs` configuration. The typical pattern `shadow-cljs` expects for a browser app is to combine some JS dependencies, CLJS dependencies, and our own CLJS code, and compile it. It expects that this output is what ships to the browser. In dev mode, extra libraries and startup code support connecting a Clojure REPL to the browser environment. Our configuration is to compile our CLJS code into a module, which webpack will combine with the FE code. There's no reason that we can't include the necessary libraries and startup code in this process, it just doesn't work out of the box and isn't trivial to include.
non_priority
get the cljs repl connecting to metabase running in the browser describe the bug when working in the cljs environment the node repl runs in its own world separate from the browser some functionality doesn t work at all there the dom for example and other things are different from the browser environment one notable gap is that metabase lib core doesn t work at all in the node environment but works fine in the browser without that kitchen sink file defmethod s in various metabase lib namespaces may not be loaded which causes odd behavior when trying to debug cljs only issues in addition connecting to the live running browser instance is very powerful because it gives access to the current real metadata the current query and more to reproduce yarn cljs nrepl starts an impoverished nodejs environment with an nrepl connection expected behavior this or a similar command should connect to the live metabase instance in your browser logs no response information about your metabase installation json master severity annoying when debugging cljs only issues fe integration for additional context this doesn t work out of the box because of our nonstandard shadow cljs configuration the typical pattern shadow cljs expects for a browser app is to combine some js dependencies cljs dependencies and our own cljs code and compile it it expects that this output is what ships to the browser in dev mode extra libraries and startup code support connecting a clojure repl to the browser environment our configuration is to compile our cljs code into a module which webpack will combine with the fe code there s no reason that we can t include the necessary libraries and startup code in this process it just doesn t work out of the box and isn t trivial to include
0
16,674
5,270,776,246
IssuesEvent
2017-02-06 07:02:40
learning-unlimited/ESP-Website
https://api.github.com/repos/learning-unlimited/ESP-Website
closed
select_students is bitrotted
Old/unused code
It tries to interact with some weird caching stuff that was deleted from ClassSection years ago, and apparently nobody noticed. We should delete it.
1.0
select_students is bitrotted - It tries to interact with some weird caching stuff that was deleted from ClassSection years ago, and apparently nobody noticed. We should delete it.
non_priority
select students is bitrotted it tries to interact with some weird caching stuff that was deleted from classsection years ago and apparently nobody noticed we should delete it
0
247,700
26,728,765,941
IssuesEvent
2023-01-30 01:04:09
ThomasRuemmler/openspaceplanner
https://api.github.com/repos/ThomasRuemmler/openspaceplanner
opened
CVE-2022-48285 (Medium) detected in jszip-3.1.5.tgz
security vulnerability
## CVE-2022-48285 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jszip-3.1.5.tgz</b></p></summary> <p>Create, read and edit .zip files with JavaScript http://stuartk.com/jszip</p> <p>Library home page: <a href="https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz">https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz</a></p> <p>Path to dependency file: /Web/package.json</p> <p>Path to vulnerable library: /Web/node_modules/jszip/package.json</p> <p> Dependency Hierarchy: - protractor-5.4.2.tgz (Root Library) - selenium-webdriver-3.6.0.tgz - :x: **jszip-3.1.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ThomasRuemmler/openspaceplanner/commit/f6c2c84ced43eeee592037f4035255d8f6a450bc">f6c2c84ced43eeee592037f4035255d8f6a450bc</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive. <p>Publish Date: 2023-01-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-48285>CVE-2022-48285</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-48285">https://www.cve.org/CVERecord?id=CVE-2022-48285</a></p> <p>Release Date: 2023-01-29</p> <p>Fix Resolution (jszip): 3.8.0</p> <p>Direct dependency fix Resolution (protractor): 5.4.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-48285 (Medium) detected in jszip-3.1.5.tgz - ## CVE-2022-48285 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jszip-3.1.5.tgz</b></p></summary> <p>Create, read and edit .zip files with JavaScript http://stuartk.com/jszip</p> <p>Library home page: <a href="https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz">https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz</a></p> <p>Path to dependency file: /Web/package.json</p> <p>Path to vulnerable library: /Web/node_modules/jszip/package.json</p> <p> Dependency Hierarchy: - protractor-5.4.2.tgz (Root Library) - selenium-webdriver-3.6.0.tgz - :x: **jszip-3.1.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ThomasRuemmler/openspaceplanner/commit/f6c2c84ced43eeee592037f4035255d8f6a450bc">f6c2c84ced43eeee592037f4035255d8f6a450bc</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive. <p>Publish Date: 2023-01-29 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-48285>CVE-2022-48285</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-48285">https://www.cve.org/CVERecord?id=CVE-2022-48285</a></p> <p>Release Date: 2023-01-29</p> <p>Fix Resolution (jszip): 3.8.0</p> <p>Direct dependency fix Resolution (protractor): 5.4.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jszip tgz cve medium severity vulnerability vulnerable library jszip tgz create read and edit zip files with javascript library home page a href path to dependency file web package json path to vulnerable library web node modules jszip package json dependency hierarchy protractor tgz root library selenium webdriver tgz x jszip tgz vulnerable library found in head commit a href vulnerability details loadasync in jszip before allows directory traversal via a crafted zip archive publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jszip direct dependency fix resolution protractor step up your open source security game with mend
0
143,168
19,143,230,858
IssuesEvent
2021-12-02 02:55:59
n-devs/edit-map
https://api.github.com/repos/n-devs/edit-map
opened
CVE-2021-29059 (High) detected in is-svg-2.1.0.tgz
security vulnerability
## CVE-2021-29059 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>is-svg-2.1.0.tgz</b></p></summary> <p>Check if a string or buffer is SVG</p> <p>Library home page: <a href="https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz">https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz</a></p> <p>Path to dependency file: /edit-map/v0.4/package.json</p> <p>Path to vulnerable library: edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.0.13.tgz (Root Library) - css-loader-0.28.4.tgz - cssnano-3.10.0.tgz - postcss-svgo-2.1.6.tgz - :x: **is-svg-2.1.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was discovered in IS-SVG version 2.1.0 to 4.2.2 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29059>CVE-2021-29059</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0">https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution: is-svg - 4.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-29059 (High) detected in is-svg-2.1.0.tgz - ## CVE-2021-29059 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>is-svg-2.1.0.tgz</b></p></summary> <p>Check if a string or buffer is SVG</p> <p>Library home page: <a href="https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz">https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz</a></p> <p>Path to dependency file: /edit-map/v0.4/package.json</p> <p>Path to vulnerable library: edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json</p> <p> Dependency Hierarchy: - react-scripts-1.0.13.tgz (Root Library) - css-loader-0.28.4.tgz - cssnano-3.10.0.tgz - postcss-svgo-2.1.6.tgz - :x: **is-svg-2.1.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was discovered in IS-SVG version 2.1.0 to 4.2.2 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string. <p>Publish Date: 2021-06-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29059>CVE-2021-29059</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0">https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0</a></p> <p>Release Date: 2021-06-21</p> <p>Fix Resolution: is-svg - 4.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in is svg tgz cve high severity vulnerability vulnerable library is svg tgz check if a string or buffer is svg library home page a href path to dependency file edit map package json path to vulnerable library edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json dependency hierarchy react scripts tgz root library css loader tgz cssnano tgz postcss svgo tgz x is svg tgz vulnerable library vulnerability details a vulnerability was discovered in is svg version to and below where a regular expression denial of service redos occurs if the application is provided and checks a crafted invalid svg string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution is svg step up your open source security game with whitesource
0
166,120
26,284,886,089
IssuesEvent
2023-01-07 18:20:14
edenia/eden-spend-explorer
https://api.github.com/repos/edenia/eden-spend-explorer
closed
Check the margin space of the charts
enhancement UI / UX Design
**Description and expected** We need to resize the margin spaces between the charts. This will give the user more breath when observe the information
1.0
Check the margin space of the charts - **Description and expected** We need to resize the margin spaces between the charts. This will give the user more breath when observe the information
non_priority
check the margin space of the charts description and expected we need to resize the margin spaces between the charts this will give the user more breath when observe the information
0
52,780
13,050,473,908
IssuesEvent
2020-07-29 15:32:54
golang/go
https://api.github.com/repos/golang/go
closed
x/build/cmd/releasebot: remove obsolete check that the major version is listed on the project page
Builders NeedsFix release-blocker
The https://golang.org/project/ page has a "Version history" section that lists major Go releases that have been released. Prior to [CL 229483](https://golang.org/cl/229483), it needed to be manually updated before each final major release, and so to catch potential mistakes releasebot has a safety check that aborts the release process if the major version isn't listed: ```Go func (w *Work) checkDocs() { // Check that the major version is listed on the project page. data, err := ioutil.ReadFile(filepath.Join(w.Dir, "gitwork", "doc/contrib.html")) if err != nil { w.log.Panic(err) } major := major(w.Version) if !strings.Contains(string(data), major) { w.logError("doc/contrib.html does not list major version %s", major) } } ``` _(Source: [golang.org/x/build/cmd/releasebot/main.go#L595-L605](https://github.com/golang/build/blob/b405858d836876f4a9391a8c61cb626a47a3fea1/cmd/releasebot/main.go#L595-L605).)_ The doc/contrib.html file no longer needs to be manually updated, and it [doesn't even exist](https://github.com/golang/go/tree/master/doc) in the main repo as it was moved to x/website in [CL 229485](https://golang.org/cl/229485). The check needs to be removed. /cc @toothrot @cagedmantis @andybons
1.0
x/build/cmd/releasebot: remove obsolete check that the major version is listed on the project page - The https://golang.org/project/ page has a "Version history" section that lists major Go releases that have been released. Prior to [CL 229483](https://golang.org/cl/229483), it needed to be manually updated before each final major release, and so to catch potential mistakes releasebot has a safety check that aborts the release process if the major version isn't listed: ```Go func (w *Work) checkDocs() { // Check that the major version is listed on the project page. data, err := ioutil.ReadFile(filepath.Join(w.Dir, "gitwork", "doc/contrib.html")) if err != nil { w.log.Panic(err) } major := major(w.Version) if !strings.Contains(string(data), major) { w.logError("doc/contrib.html does not list major version %s", major) } } ``` _(Source: [golang.org/x/build/cmd/releasebot/main.go#L595-L605](https://github.com/golang/build/blob/b405858d836876f4a9391a8c61cb626a47a3fea1/cmd/releasebot/main.go#L595-L605).)_ The doc/contrib.html file no longer needs to be manually updated, and it [doesn't even exist](https://github.com/golang/go/tree/master/doc) in the main repo as it was moved to x/website in [CL 229485](https://golang.org/cl/229485). The check needs to be removed. /cc @toothrot @cagedmantis @andybons
non_priority
x build cmd releasebot remove obsolete check that the major version is listed on the project page the page has a version history section that lists major go releases that have been released prior to it needed to be manually updated before each final major release and so to catch potential mistakes releasebot has a safety check that aborts the release process if the major version isn t listed go func w work checkdocs check that the major version is listed on the project page data err ioutil readfile filepath join w dir gitwork doc contrib html if err nil w log panic err major major w version if strings contains string data major w logerror doc contrib html does not list major version s major source the doc contrib html file no longer needs to be manually updated and it in the main repo as it was moved to x website in the check needs to be removed cc toothrot cagedmantis andybons
0
139,055
18,836,336,409
IssuesEvent
2021-11-11 01:39:59
ElliotChen/spring_boot_example
https://api.github.com/repos/ElliotChen/spring_boot_example
opened
CVE-2021-38153 (Medium) detected in kafka-clients-2.7.1.jar
security vulnerability
## CVE-2021-38153 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kafka-clients-2.7.1.jar</b></p></summary> <p></p> <p>Library home page: <a href="https://kafka.apache.org">https://kafka.apache.org</a></p> <p>Path to dependency file: spring_boot_example/13nettyserver/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar</p> <p> Dependency Hierarchy: - spring-kafka-2.7.7.jar (Root Library) - :x: **kafka-clients-2.7.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ElliotChen/spring_boot_example/commit/da8540b4a5b6bc433eb5555e9f1ee407307bab84">da8540b4a5b6bc433eb5555e9f1ee407307bab84</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0. <p>Publish Date: 2021-09-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-38153>CVE-2021-38153</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153</a></p> <p>Release Date: 2021-09-22</p> <p>Fix Resolution: org.apache.kafka:kafka-clients:2.8.1,3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-38153 (Medium) detected in kafka-clients-2.7.1.jar - ## CVE-2021-38153 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kafka-clients-2.7.1.jar</b></p></summary> <p></p> <p>Library home page: <a href="https://kafka.apache.org">https://kafka.apache.org</a></p> <p>Path to dependency file: spring_boot_example/13nettyserver/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar</p> <p> Dependency Hierarchy: - spring-kafka-2.7.7.jar (Root Library) - :x: **kafka-clients-2.7.1.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ElliotChen/spring_boot_example/commit/da8540b4a5b6bc433eb5555e9f1ee407307bab84">da8540b4a5b6bc433eb5555e9f1ee407307bab84</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0. <p>Publish Date: 2021-09-22 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-38153>CVE-2021-38153</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153</a></p> <p>Release Date: 2021-09-22</p> <p>Fix Resolution: org.apache.kafka:kafka-clients:2.8.1,3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in kafka clients jar cve medium severity vulnerability vulnerable library kafka clients jar library home page a href path to dependency file spring boot example pom xml path to vulnerable library home wss scanner repository org apache kafka kafka clients kafka clients jar home wss scanner repository org apache kafka kafka clients kafka clients jar home wss scanner repository org apache kafka kafka clients kafka clients jar dependency hierarchy spring kafka jar root library x kafka clients jar vulnerable library found in head commit a href found in base branch master vulnerability details some components in apache kafka use arrays equals to validate a password or key which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful users should upgrade to or higher or or higher where this vulnerability has been fixed the affected versions include apache kafka and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache kafka kafka clients step up your open source security game with whitesource
0
347,946
24,904,603,997
IssuesEvent
2022-10-29 04:33:04
CHAMPION316/coffee-forest
https://api.github.com/repos/CHAMPION316/coffee-forest
closed
GENERAL: Creating less padding on about.html
documentation could have
Too much padding is causing the test to be too centered. Decrease padding for better viewability.
1.0
GENERAL: Creating less padding on about.html - Too much padding is causing the test to be too centered. Decrease padding for better viewability.
non_priority
general creating less padding on about html too much padding is causing the test to be too centered decrease padding for better viewability
0
64,515
12,474,824,755
IssuesEvent
2020-05-29 10:21:55
WesselSmit/education-portal
https://api.github.com/repos/WesselSmit/education-portal
closed
Build new mobile/tablet menu (with toggle?)
code design wontfix
Build the new menu design if the user tests are positive
1.0
Build new mobile/tablet menu (with toggle?) - Build the new menu design if the user tests are positive
non_priority
build new mobile tablet menu with toggle build the new menu design if the user tests are positive
0
33,493
7,132,454,114
IssuesEvent
2018-01-22 14:40:17
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
onLazyLoad event not fired when a text filter is cleared out
defect
``` [X] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Current behavior** When the last character or the whole text string in a text filter is removed there is no onLazyLoad event fired. **Expected behavior** The onLazyLoad event should fire when a text filter is cleared. **Minimal reproduction of the problem with instructions** This bug is shown in the following Plunk: http://plnkr.co/edit/iJdn8ZKx5dqAs5o8aCjE?p=preview * **Angular version:** 5.2.1 * **PrimeNG version:** 5.2.0-rc.1 * **Browser:** Tested in Chrome v63.0.3239.132 (Official Build) (64-bit) on macOS High Sierra
1.0
onLazyLoad event not fired when a text filter is cleared out - ``` [X] bug report => Search github for a similar issue or PR before submitting [ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap [ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35 ``` **Current behavior** When the last character or the whole text string in a text filter is removed there is no onLazyLoad event fired. **Expected behavior** The onLazyLoad event should fire when a text filter is cleared. **Minimal reproduction of the problem with instructions** This bug is shown in the following Plunk: http://plnkr.co/edit/iJdn8ZKx5dqAs5o8aCjE?p=preview * **Angular version:** 5.2.1 * **PrimeNG version:** 5.2.0-rc.1 * **Browser:** Tested in Chrome v63.0.3239.132 (Official Build) (64-bit) on macOS High Sierra
non_priority
onlazyload event not fired when a text filter is cleared out bug report search github for a similar issue or pr before submitting feature request please check if request is not on the roadmap already support request please do not submit support request here instead see current behavior when the last character or the whole text string in a text filter is removed there is no onlazyload event fired expected behavior the onlazyload event should fire when a text filter is cleared minimal reproduction of the problem with instructions this bug is shown in the following plunk angular version primeng version rc browser tested in chrome official build bit on macos high sierra
0
33,938
12,229,047,999
IssuesEvent
2020-05-03 22:10:21
YANG-DB/yang-db
https://api.github.com/repos/YANG-DB/yang-db
opened
CVE-2020-11111 (High) detected in jackson-databind-2.9.8.jar
security vulnerability
## CVE-2020-11111 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /yang-db/distrib/dragon-dragon/lib/jackson-databind-2.9.8.jar,/yang-db/distrib/knowledge-knowledge/lib/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YANG-DB/yang-db/commit/fb4688fc73077d82b1716f0af8303e34cb1e6d25">fb4688fc73077d82b1716f0af8303e34cb1e6d25</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11111 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-11111 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to vulnerable library: /yang-db/distrib/dragon-dragon/lib/jackson-databind-2.9.8.jar,/yang-db/distrib/knowledge-knowledge/lib/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/YANG-DB/yang-db/commit/fb4688fc73077d82b1716f0af8303e34cb1e6d25">fb4688fc73077d82b1716f0af8303e34cb1e6d25</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms). <p>Publish Date: 2020-03-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p> <p>Release Date: 2020-03-31</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library yang db distrib dragon dragon lib jackson databind jar yang db distrib knowledge knowledge lib jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache activemq aka activemq jms activemq core activemq pool and activemq pool jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
222,948
17,514,208,588
IssuesEvent
2021-08-11 03:44:31
pingcap/ticdc
https://api.github.com/repos/pingcap/ticdc
closed
Capture list increased 1 unexpected after all PD restarting
type/bug component/status-server difficulty/easy severity/minor bug-from-internal-test
## Bug Report Please answer these questions before submitting your issue. Thanks! 1. What did you do? If possible, provide a recipe for reproducing the error. - 2x capture: Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379 [ { "id": "3378b726-26cb-4963-8280-3ee679024a76", "is-owner": false, "address": "172.16.6.32:8300" }, { "id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7", "is-owner": true, "address": "172.16.6.31:8300" } ] - Restart all PD: $ tiup cluster restart 360UP -R pd - Check capture list 2. What did you expect to see? - 2x capture, and their status is normal. 3. What did you see instead? - 3x capture list unexpected in a short time after PD restarting: Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379 [ { "id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e", "is-owner": false, "address": "172.16.6.32:8300" }, { "id": "3378b726-26cb-4963-8280-3ee679024a76", "is-owner": false, "address": "172.16.6.32:8300" }, { "id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7", "is-owner": true, "address": "172.16.6.31:8300" } ] Waiting for several seconds, 2x capture list as expected: Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379 [ { "id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e", "is-owner": true, "address": "172.16.6.32:8300" }, { "id": "4b8e6f29-847d-4caf-bc7a-ea8cba317a28", "is-owner": false, "address": "172.16.6.31:8300" } ] 4. Versions of the cluster - Upstream TiDB cluster version (execute `SELECT tidb_version();` in a MySQL client): ``` 4.0.14 ``` - TiCDC version (execute `cdc version`): ``` [release-version=v4.0.14] [git-hash=5a7851967f686da896b45acd3f3e968bfe53d6bd] [git-branch=heads/refs/tags/v4.0.14] ```
1.0
Capture list increased 1 unexpected after all PD restarting - ## Bug Report Please answer these questions before submitting your issue. Thanks! 1. What did you do? If possible, provide a recipe for reproducing the error. - 2x capture: Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379 [ { "id": "3378b726-26cb-4963-8280-3ee679024a76", "is-owner": false, "address": "172.16.6.32:8300" }, { "id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7", "is-owner": true, "address": "172.16.6.31:8300" } ] - Restart all PD: $ tiup cluster restart 360UP -R pd - Check capture list 2. What did you expect to see? - 2x capture, and their status is normal. 3. What did you see instead? - 3x capture list unexpected in a short time after PD restarting: Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379 [ { "id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e", "is-owner": false, "address": "172.16.6.32:8300" }, { "id": "3378b726-26cb-4963-8280-3ee679024a76", "is-owner": false, "address": "172.16.6.32:8300" }, { "id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7", "is-owner": true, "address": "172.16.6.31:8300" } ] Waiting for several seconds, 2x capture list as expected: Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379 [ { "id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e", "is-owner": true, "address": "172.16.6.32:8300" }, { "id": "4b8e6f29-847d-4caf-bc7a-ea8cba317a28", "is-owner": false, "address": "172.16.6.31:8300" } ] 4. Versions of the cluster - Upstream TiDB cluster version (execute `SELECT tidb_version();` in a MySQL client): ``` 4.0.14 ``` - TiCDC version (execute `cdc version`): ``` [release-version=v4.0.14] [git-hash=5a7851967f686da896b45acd3f3e968bfe53d6bd] [git-branch=heads/refs/tags/v4.0.14] ```
non_priority
capture list increased unexpected after all pd restarting bug report please answer these questions before submitting your issue thanks what did you do if possible provide a recipe for reproducing the error capture starting component cdc root tiup components cdc cdc cli capture list pd id is owner false address id is owner true address restart all pd tiup cluster restart r pd check capture list what did you expect to see capture and their status is normal what did you see instead capture list unexpected in a short time after pd restarting starting component cdc root tiup components cdc cdc cli capture list pd id is owner false address id is owner false address id is owner true address waiting for several seconds capture list as expected starting component cdc root tiup components cdc cdc cli capture list pd id is owner true address id is owner false address versions of the cluster upstream tidb cluster version execute select tidb version in a mysql client ticdc version execute cdc version
0
26,213
4,622,767,866
IssuesEvent
2016-09-27 08:46:29
siddhartha-gadgil/ProvingGround
https://api.github.com/repos/siddhartha-gadgil/ProvingGround
closed
Very poor performance due to cascade of replacements.
defect
In generating from _Monoids_, but not from just _logic_, there is a huge slowdown, with most of the time spent in replace methods. This appears to be because: * for the sake of safety, lambdas: * create an inner variable * in the case of lambda-fixed, check independence. * both these involve replacements for lambdas * if the replaced values are `IdentityTyp` etc., then the terms themselves contain a lot of lambdas, so we get a cascade of replacements. * We can avoid creating inner variables and checking for dependence if we are using a new synthesized variable (and are careful about dependence).
1.0
Very poor performance due to cascade of replacements. - In generating from _Monoids_, but not from just _logic_, there is a huge slowdown, with most of the time spent in replace methods. This appears to be because: * for the sake of safety, lambdas: * create an inner variable * in the case of lambda-fixed, check independence. * both these involve replacements for lambdas * if the replaced values are `IdentityTyp` etc., then the terms themselves contain a lot of lambdas, so we get a cascade of replacements. * We can avoid creating inner variables and checking for dependence if we are using a new synthesized variable (and are careful about dependence).
non_priority
very poor performance due to cascade of replacements in generating from monoids but not from just logic there is a huge slowdown with most of the time spent in replace methods this appears to be because for the sake of safety lambdas create an inner variable in the case of lambda fixed check independence both these involve replacements for lambdas if the replaced values are identitytyp etc then the terms themselves contain a lot of lambdas so we get a cascade of replacements we can avoid creating inner variables and checking for dependence if we are using a new synthesized variable and are careful about dependence
0
106,223
9,122,408,375
IssuesEvent
2019-02-23 07:39:25
ChrisCScott/forecaster
https://api.github.com/repos/ChrisCScott/forecaster
closed
Add tests for SubForecast subclasses
ContributionForecast Forecast IncomeForecast LivingExpensesForecast ReductionForecast SubForecast TaxForecast WithdrawalForecast tests
With `IncomeForecast`, `LivingExpensesForecast`, `ReductionForecast` (rename this `LifecycleForecast`?), `ContributionForecast`, `WithdrawalForecast`, and `TaxForecast` now implemented, we need to test them (or, in the cast of `IncomeForecast`, reimplement its tests). Thanks to relatively rigorous encapsulation (pending resolution of #54), tests should be much more straightforward than the existing `Forecast` testing framework.
1.0
Add tests for SubForecast subclasses - With `IncomeForecast`, `LivingExpensesForecast`, `ReductionForecast` (rename this `LifecycleForecast`?), `ContributionForecast`, `WithdrawalForecast`, and `TaxForecast` now implemented, we need to test them (or, in the cast of `IncomeForecast`, reimplement its tests). Thanks to relatively rigorous encapsulation (pending resolution of #54), tests should be much more straightforward than the existing `Forecast` testing framework.
non_priority
add tests for subforecast subclasses with incomeforecast livingexpensesforecast reductionforecast rename this lifecycleforecast contributionforecast withdrawalforecast and taxforecast now implemented we need to test them or in the cast of incomeforecast reimplement its tests thanks to relatively rigorous encapsulation pending resolution of tests should be much more straightforward than the existing forecast testing framework
0
19,500
3,774,201,492
IssuesEvent
2016-03-17 08:03:23
quantmind/pulsar
https://api.github.com/repos/quantmind/pulsar
closed
Exception message in tests
test won't fix
In `tests/async/events.py` we see at line 24 the line h.bind_event('finish', lambda f, exc=None: 'OK'+4) This raises exceptions, which result in the unintelligible output `"Exception ignored in:"` in the middle of the test output stream. If it's intended to raise that exception, could the message be suppressed, or at least identify the exception?
1.0
Exception message in tests - In `tests/async/events.py` we see at line 24 the line h.bind_event('finish', lambda f, exc=None: 'OK'+4) This raises exceptions, which result in the unintelligible output `"Exception ignored in:"` in the middle of the test output stream. If it's intended to raise that exception, could the message be suppressed, or at least identify the exception?
non_priority
exception message in tests in tests async events py we see at line the line h bind event finish lambda f exc none ok this raises exceptions which result in the unintelligible output exception ignored in in the middle of the test output stream if it s intended to raise that exception could the message be suppressed or at least identify the exception
0
109,895
16,903,293,840
IssuesEvent
2021-06-24 02:02:46
turkdevops/teletype
https://api.github.com/repos/turkdevops/teletype
closed
CVE-2021-33502 (High) detected in normalize-url-4.5.0.tgz - autoclosed
security vulnerability
## CVE-2021-33502 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>normalize-url-4.5.0.tgz</b></p></summary> <p>Normalize a URL</p> <p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz</a></p> <p>Path to dependency file: teletype/package.json</p> <p>Path to vulnerable library: teletype/node_modules/normalize-url/package.json</p> <p> Dependency Hierarchy: - snyk-1.514.0.tgz (Root Library) - snyk-nodejs-lockfile-parser-1.31.1.tgz - got-11.4.0.tgz - cacheable-request-7.0.1.tgz - :x: **normalize-url-4.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/teletype/commit/282acd838c0ad91b000caf2a2d48ae64a37b72f6">282acd838c0ad91b000caf2a2d48ae64a37b72f6</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. <p>Publish Date: 2021-05-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33502>CVE-2021-33502</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502</a></p> <p>Release Date: 2021-05-24</p> <p>Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-33502 (High) detected in normalize-url-4.5.0.tgz - autoclosed - ## CVE-2021-33502 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>normalize-url-4.5.0.tgz</b></p></summary> <p>Normalize a URL</p> <p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz</a></p> <p>Path to dependency file: teletype/package.json</p> <p>Path to vulnerable library: teletype/node_modules/normalize-url/package.json</p> <p> Dependency Hierarchy: - snyk-1.514.0.tgz (Root Library) - snyk-nodejs-lockfile-parser-1.31.1.tgz - got-11.4.0.tgz - cacheable-request-7.0.1.tgz - :x: **normalize-url-4.5.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/teletype/commit/282acd838c0ad91b000caf2a2d48ae64a37b72f6">282acd838c0ad91b000caf2a2d48ae64a37b72f6</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs. <p>Publish Date: 2021-05-24 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33502>CVE-2021-33502</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502</a></p> <p>Release Date: 2021-05-24</p> <p>Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in normalize url tgz autoclosed cve high severity vulnerability vulnerable library normalize url tgz normalize a url library home page a href path to dependency file teletype package json path to vulnerable library teletype node modules normalize url package json dependency hierarchy snyk tgz root library snyk nodejs lockfile parser tgz got tgz cacheable request tgz x normalize url tgz vulnerable library found in head commit a href found in base branch master vulnerability details the normalize url package before x before and x before for node js has a redos regular expression denial of service issue because it has exponential performance for data urls publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution normalize url step up your open source security game with whitesource
0
166,123
12,891,369,249
IssuesEvent
2020-07-13 17:36:27
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed
C-test-failure O-roachtest O-robot branch-master release-blocker
[(roachtest).sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=buildLog) on [master@542c83e7db1694208e09c7fea7d350db4993b897](https://github.com/cockroachdb/cockroach/commits/542c83e7db1694208e09c7fea7d350db4993b897): ``` | signal: killed | (1) signal: killed | Error types: (1) *exec.ExitError Wraps: (6) context canceled Error types: (1) *withstack.withStack (2) *safedetails.withSafeDetails (3) *errutil.withMessage (4) *main.withCommandDetails (5) *secondary.withSecondaryError (6) *errors.errorString cluster.go:2471,sysbench.go:117,sysbench.go:138,test_runner.go:757: monitor failure: unexpected node event: 3: dead (1) attached stack trace | main.(*monitor).WaitE | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2459 | main.(*monitor).Wait | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2467 | main.runSysbench | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:117 | main.registerSysbench.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:138 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:757 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1373 Wraps: (2) monitor failure Wraps: (3) unexpected node event: 3: dead Error types: (1) *withstack.withStack (2) *errutil.withMessage (3) *errors.errorString cluster.go:1516,context.go:135,cluster.go:1505,test_runner.go:826: dead node detection: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod monitor teamcity-2079204-1594361493-101-n4cpu32 --oneshot --ignore-empty-nodes: exit status 1 4: skipped 3: dead 2: 4685 1: 4963 Error: UNCLASSIFIED_PROBLEM: 3: dead (1) UNCLASSIFIED_PROBLEM Wraps: (2) attached stack trace | main.glob..func13 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1115 | main.wrap.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:266 | github.com/spf13/cobra.(*Command).execute | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:830 | github.com/spf13/cobra.(*Command).ExecuteC | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:914 | github.com/spf13/cobra.(*Command).Execute | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:864 | main.main | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1789 | runtime.main | /usr/local/go/src/runtime/proc.go:203 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1373 Wraps: (3) 3 safe details enclosed Wraps: (4) 3: dead Error types: (1) errors.Unclassified (2) *withstack.withStack (3) *safedetails.withSafeDetails (4) *errors.errorString ``` <details><summary>More</summary><p> Artifacts: [/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=artifacts#/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Asysbench%2Foltp_write_only%2Fnodes%3D3%2Fcpu%3D32%2Fconc%3D128.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
2.0
roachtest: sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed - [(roachtest).sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=buildLog) on [master@542c83e7db1694208e09c7fea7d350db4993b897](https://github.com/cockroachdb/cockroach/commits/542c83e7db1694208e09c7fea7d350db4993b897): ``` | signal: killed | (1) signal: killed | Error types: (1) *exec.ExitError Wraps: (6) context canceled Error types: (1) *withstack.withStack (2) *safedetails.withSafeDetails (3) *errutil.withMessage (4) *main.withCommandDetails (5) *secondary.withSecondaryError (6) *errors.errorString cluster.go:2471,sysbench.go:117,sysbench.go:138,test_runner.go:757: monitor failure: unexpected node event: 3: dead (1) attached stack trace | main.(*monitor).WaitE | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2459 | main.(*monitor).Wait | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2467 | main.runSysbench | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:117 | main.registerSysbench.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:138 | main.(*testRunner).runTest.func2 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:757 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1373 Wraps: (2) monitor failure Wraps: (3) unexpected node event: 3: dead Error types: (1) *withstack.withStack (2) *errutil.withMessage (3) *errors.errorString cluster.go:1516,context.go:135,cluster.go:1505,test_runner.go:826: dead node detection: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod monitor teamcity-2079204-1594361493-101-n4cpu32 --oneshot --ignore-empty-nodes: exit status 1 4: skipped 3: dead 2: 4685 1: 4963 Error: UNCLASSIFIED_PROBLEM: 3: dead (1) UNCLASSIFIED_PROBLEM Wraps: (2) attached stack trace | main.glob..func13 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1115 | main.wrap.func1 | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:266 | github.com/spf13/cobra.(*Command).execute | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:830 | github.com/spf13/cobra.(*Command).ExecuteC | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:914 | github.com/spf13/cobra.(*Command).Execute | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:864 | main.main | /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1789 | runtime.main | /usr/local/go/src/runtime/proc.go:203 | runtime.goexit | /usr/local/go/src/runtime/asm_amd64.s:1373 Wraps: (3) 3 safe details enclosed Wraps: (4) 3: dead Error types: (1) errors.Unclassified (2) *withstack.withStack (3) *safedetails.withSafeDetails (4) *errors.errorString ``` <details><summary>More</summary><p> Artifacts: [/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=artifacts#/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128) [See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Asysbench%2Foltp_write_only%2Fnodes%3D3%2Fcpu%3D32%2Fconc%3D128.%2A&sort=title&restgroup=false&display=lastcommented+project) <sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
non_priority
roachtest sysbench oltp write only nodes cpu conc failed on signal killed signal killed error types exec exiterror wraps context canceled error types withstack withstack safedetails withsafedetails errutil withmessage main withcommanddetails secondary withsecondaryerror errors errorstring cluster go sysbench go sysbench go test runner go monitor failure unexpected node event dead attached stack trace main monitor waite home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main monitor wait home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main runsysbench home agent work go src github com cockroachdb cockroach pkg cmd roachtest sysbench go main registersysbench home agent work go src github com cockroachdb cockroach pkg cmd roachtest sysbench go main testrunner runtest home agent work go src github com cockroachdb cockroach pkg cmd roachtest test runner go runtime goexit usr local go src runtime asm s wraps monitor failure wraps unexpected node event dead error types withstack withstack errutil withmessage errors errorstring cluster go context go cluster go test runner go dead node detection home agent work go src github com cockroachdb cockroach bin roachprod monitor teamcity oneshot ignore empty nodes exit status skipped dead error unclassified problem dead unclassified problem wraps attached stack trace main glob home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go main wrap home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go github com cobra command execute home agent work go src github com cockroachdb cockroach vendor github com cobra command go github com cobra command executec home agent work go src github com cockroachdb cockroach vendor github com cobra command go github com cobra command execute home agent work go src github com cockroachdb cockroach vendor github com cobra command go main main home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go runtime main usr local go src runtime proc go runtime goexit usr local go src runtime asm s wraps safe details enclosed wraps dead error types errors unclassified withstack withstack safedetails withsafedetails errors errorstring more artifacts powered by
0
32,039
13,751,942,517
IssuesEvent
2020-10-06 13:57:09
terraform-providers/terraform-provider-aws
https://api.github.com/repos/terraform-providers/terraform-provider-aws
closed
aws_dynamodb_table returns name before resource is even created
bug service/dynamodb upstream-terraform
<!--- Please note the following potential times when an issue might be in Terraform core: * [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues * [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues * [Registry](https://registry.terraform.io/) issues * Spans resources across multiple providers If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead. ---> <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Terraform CLI and Terraform AWS Provider Version <!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). ---> Terraform v0.13.3 provider registry.terraform.io/hashicorp/aws v3.8.0 ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_dynamodb_table ### Terraform Configuration Files <!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code ---> ```hcl resource "aws_dynamodb_table" "table" { name = "somename" ... } data "aws_dynamodb_table" "table" { name = aws_dynamodb_table.table.name } ``` ### Debug Output <!--- Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist. To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html). ---> ### Panic Output <!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. ---> ### Expected Behavior <!--- What should have happened? ---> Data source waits for resource to be created ### Actual Behavior <!--- What actually happened? ---> ``` Error retrieving DynamoDB table: ResourceNotFoundException: Requested resource not found: Table: somename not found ``` ### Steps to Reproduce <!--- Please list the steps required to reproduce the issue. ---> 1. `terraform apply` ### Important Factoids <!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? ---> This happens also during terraform refresh ### References <!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example: ---> * #0000
1.0
aws_dynamodb_table returns name before resource is even created - <!--- Please note the following potential times when an issue might be in Terraform core: * [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues * [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues * [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues * [Registry](https://registry.terraform.io/) issues * Spans resources across multiple providers If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead. ---> <!--- Please keep this note for the community ---> ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment <!--- Thank you for keeping this note for the community ---> ### Terraform CLI and Terraform AWS Provider Version <!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). ---> Terraform v0.13.3 provider registry.terraform.io/hashicorp/aws v3.8.0 ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_dynamodb_table ### Terraform Configuration Files <!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code ---> ```hcl resource "aws_dynamodb_table" "table" { name = "somename" ... } data "aws_dynamodb_table" "table" { name = aws_dynamodb_table.table.name } ``` ### Debug Output <!--- Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist. To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html). ---> ### Panic Output <!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. ---> ### Expected Behavior <!--- What should have happened? ---> Data source waits for resource to be created ### Actual Behavior <!--- What actually happened? ---> ``` Error retrieving DynamoDB table: ResourceNotFoundException: Requested resource not found: Table: somename not found ``` ### Steps to Reproduce <!--- Please list the steps required to reproduce the issue. ---> 1. `terraform apply` ### Important Factoids <!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? ---> This happens also during terraform refresh ### References <!--- Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example: ---> * #0000
non_priority
aws dynamodb table returns name before resource is even created please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform cli and terraform aws provider version terraform provider registry terraform io hashicorp aws affected resource s aws dynamodb table terraform configuration files hcl resource aws dynamodb table table name somename data aws dynamodb table table name aws dynamodb table table name debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output expected behavior data source waits for resource to be created actual behavior error retrieving dynamodb table resourcenotfoundexception requested resource not found table somename not found steps to reproduce terraform apply important factoids this happens also during terraform refresh references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example
0
54,860
23,346,038,637
IssuesEvent
2022-08-09 18:04:16
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Explore React Testing Library for testing React components and web maps
Service: Dev Type: Research
**Docs and videos** - https://testing-library.com/docs/react-testing-library/intro/ - https://blog.sapegin.me/all/react-testing-3-jest-and-react-testing-library/ - https://www.youtube.com/watch?v=7dTTFW7yACQ - https://github.com/visgl/react-map-gl/issues/210 - https://blog.wick.technology/testing-react-map/ - https://stackoverflow.com/questions/66051265/testing-react-map-gl-with-jest-and-react-testing-library-timeout Goal - Add tests to the PR that I've been working on to refactor the user management features in Moped Editor - Stretch goal: Circle back on the tests for the Moped API and refresh myself on pytest and check in on if those are passing **Questions** - Is there any setup that I need to do to get this library working?
1.0
Explore React Testing Library for testing React components and web maps - **Docs and videos** - https://testing-library.com/docs/react-testing-library/intro/ - https://blog.sapegin.me/all/react-testing-3-jest-and-react-testing-library/ - https://www.youtube.com/watch?v=7dTTFW7yACQ - https://github.com/visgl/react-map-gl/issues/210 - https://blog.wick.technology/testing-react-map/ - https://stackoverflow.com/questions/66051265/testing-react-map-gl-with-jest-and-react-testing-library-timeout Goal - Add tests to the PR that I've been working on to refactor the user management features in Moped Editor - Stretch goal: Circle back on the tests for the Moped API and refresh myself on pytest and check in on if those are passing **Questions** - Is there any setup that I need to do to get this library working?
non_priority
explore react testing library for testing react components and web maps docs and videos goal add tests to the pr that i ve been working on to refactor the user management features in moped editor stretch goal circle back on the tests for the moped api and refresh myself on pytest and check in on if those are passing questions is there any setup that i need to do to get this library working
0
171,631
20,984,629,066
IssuesEvent
2022-03-29 00:49:42
fdm-monster/fdm-monster-client
https://api.github.com/repos/fdm-monster/fdm-monster-client
opened
cypress-9.5.3.tgz: 1 vulnerabilities (highest severity is: 7.5)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cypress-9.5.3.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-44907](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.5.3.tgz | Transitive | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44907</summary> ### Vulnerable Library - <b>qs-6.5.3.tgz</b></p> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.5.3.tgz">https://registry.npmjs.org/qs/-/qs-6.5.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - cypress-9.5.3.tgz (Root Library) - request-2.88.10.tgz - :x: **qs-6.5.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior. <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907>CVE-2021-44907</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: qs - 6.8.1</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"6.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"cypress:9.5.3;@cypress/request:2.88.10;qs:6.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 6.8.1","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-44907","vulnerabilityDetails":"A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
True
cypress-9.5.3.tgz: 1 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cypress-9.5.3.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-44907](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.5.3.tgz | Transitive | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44907</summary> ### Vulnerable Library - <b>qs-6.5.3.tgz</b></p> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.5.3.tgz">https://registry.npmjs.org/qs/-/qs-6.5.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - cypress-9.5.3.tgz (Root Library) - request-2.88.10.tgz - :x: **qs-6.5.3.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p> <p>Found in base branch: <b>develop</b></p> </p> <p></p> ### Vulnerability Details <p> A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior. <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907>CVE-2021-44907</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: qs - 6.8.1</p> </p> <p></p> Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"6.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"cypress:9.5.3;@cypress/request:2.88.10;qs:6.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 6.8.1","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-44907","vulnerabilityDetails":"A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
non_priority
cypress tgz vulnerabilities highest severity is vulnerable library cypress tgz path to dependency file package json path to vulnerable library node modules qs package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high qs tgz transitive n a details cve vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy cypress tgz root library request tgz x qs tgz vulnerable library found in head commit a href found in base branch develop vulnerability details a denial of service vulnerability exists in qs up to due to insufficient sanitization of property in the gs parse function the merge function allows the assignment of properties on an array in the query for any property being assigned a value in the array is converted to an object containing these properties essentially this means that the property whose expected type is array always has to be checked with array isarray by the user this may not be obvious to the user and can cause unexpected behavior publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs step up your open source security game with whitesource istransitivedependency true dependencytree cypress cypress request qs isminimumfixversionavailable true minimumfixversion qs isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a denial of service vulnerability exists in qs up to due to insufficient sanitization of property in the gs parse function the merge function allows the assignment of properties on an array in the query for any property being assigned a value in the array is converted to an object containing these properties essentially this means that the property whose expected type is array always has to be checked with array isarray by the user this may not be obvious to the user and can cause unexpected behavior vulnerabilityurl
0
65,036
7,854,315,123
IssuesEvent
2018-06-20 20:21:43
Azure/azure-functions-ux
https://api.github.com/repos/Azure/azure-functions-ux
closed
Validate Azure Files storage account
Runtime pending-design
Today, if a customer deletes the storage account backing the content share, the function app is left in a broken state and the portal doesn't show any information about what is going on. It would be good if the portal could validate the storage account when failures to talk to Kudu occur (calls to getfunctions, etc) so we can provide a detailed message to the customer so they know what needs to be done.
1.0
Validate Azure Files storage account - Today, if a customer deletes the storage account backing the content share, the function app is left in a broken state and the portal doesn't show any information about what is going on. It would be good if the portal could validate the storage account when failures to talk to Kudu occur (calls to getfunctions, etc) so we can provide a detailed message to the customer so they know what needs to be done.
non_priority
validate azure files storage account today if a customer deletes the storage account backing the content share the function app is left in a broken state and the portal doesn t show any information about what is going on it would be good if the portal could validate the storage account when failures to talk to kudu occur calls to getfunctions etc so we can provide a detailed message to the customer so they know what needs to be done
0
67,162
9,011,405,489
IssuesEvent
2019-02-05 14:37:28
Braeden261/kendoSchool
https://api.github.com/repos/Braeden261/kendoSchool
closed
KG-03: Define High Level Resource Plan
Documentation
Use the Estimation Spreadsheet to put a rough plan together for the hours required each week to achieve MVP goals.
1.0
KG-03: Define High Level Resource Plan - Use the Estimation Spreadsheet to put a rough plan together for the hours required each week to achieve MVP goals.
non_priority
kg define high level resource plan use the estimation spreadsheet to put a rough plan together for the hours required each week to achieve mvp goals
0
98,539
20,752,707,398
IssuesEvent
2022-03-15 09:17:01
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
New Menu Item Error: 0 array_key_exists(): Argument #2 ($array) must be of type array, stdClass given
No Code Attached Yet
### Steps to reproduce the issue With PHP8 (8.0.8, 8.1.0) I get the above error when i try to add a new menu item With PHP7 (7.4.28) all works fine ### Expected result ### Actual result ### System information (as much as possible) Setting Value PHP Built On Linux Database Type mysql Database Version 8.0.26 Database Collation utf8mb4_0900_ai_ci Database Connection Collation utf8mb4_0900_ai_ci PHP Version 8.0.8 Web Server Apache WebServer to PHP Interface cgi-fcgi Joomla! Version Joomla! 3.10.6 Stable [ Daraja ] 12-February-2022 17:04 GMT Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT User Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0 ### Additional comments
1.0
New Menu Item Error: 0 array_key_exists(): Argument #2 ($array) must be of type array, stdClass given - ### Steps to reproduce the issue With PHP8 (8.0.8, 8.1.0) I get the above error when i try to add a new menu item With PHP7 (7.4.28) all works fine ### Expected result ### Actual result ### System information (as much as possible) Setting Value PHP Built On Linux Database Type mysql Database Version 8.0.26 Database Collation utf8mb4_0900_ai_ci Database Connection Collation utf8mb4_0900_ai_ci PHP Version 8.0.8 Web Server Apache WebServer to PHP Interface cgi-fcgi Joomla! Version Joomla! 3.10.6 Stable [ Daraja ] 12-February-2022 17:04 GMT Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT User Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0 ### Additional comments
non_priority
new menu item error array key exists argument array must be of type array stdclass given steps to reproduce the issue with i get the above error when i try to add a new menu item with all works fine expected result actual result system information as much as possible setting value php built on linux database type mysql database version database collation ai ci database connection collation ai ci php version web server apache webserver to php interface cgi fcgi joomla version joomla stable february gmt joomla platform version joomla platform stable apr gmt user agent mozilla windows nt rv gecko firefox additional comments
0
76,220
9,922,959,424
IssuesEvent
2019-07-01 05:29:12
Alexander-Miller/treemacs
https://api.github.com/repos/Alexander-Miller/treemacs
closed
Split readme keymap section
Documentation Enhancement
Now that the keybindings are split over several maps the readme should do the same.
1.0
Split readme keymap section - Now that the keybindings are split over several maps the readme should do the same.
non_priority
split readme keymap section now that the keybindings are split over several maps the readme should do the same
0
2,547
8,675,068,872
IssuesEvent
2018-11-30 09:48:02
citrusframework/citrus
https://api.github.com/repos/citrusframework/citrus
opened
Breaking change in waitFor().message()
Prio: High READY Type: Maintainance
**Citrus Version** >= 2.7.7 **Description** If you upgrade your Citrus version to 2.7.7 or higher, we've a breaking change in the http wait builder API. We'll correct this with one of the future releases to ensure effortless version upgrades **API before change** ```java waitFor().message("message"); ``` **API after change** ```java waitFor().message().name("message"); ``` **Additional information** * Issue:#417 * Commit: https://github.com/citrusframework/citrus/commit/515e840f9133383d19304916db197ce5fdb9ac83#diff-f106d4946b18253678933a5267aa2540R82 BR, Sven
True
Breaking change in waitFor().message() - **Citrus Version** >= 2.7.7 **Description** If you upgrade your Citrus version to 2.7.7 or higher, we've a breaking change in the http wait builder API. We'll correct this with one of the future releases to ensure effortless version upgrades **API before change** ```java waitFor().message("message"); ``` **API after change** ```java waitFor().message().name("message"); ``` **Additional information** * Issue:#417 * Commit: https://github.com/citrusframework/citrus/commit/515e840f9133383d19304916db197ce5fdb9ac83#diff-f106d4946b18253678933a5267aa2540R82 BR, Sven
non_priority
breaking change in waitfor message citrus version description if you upgrade your citrus version to or higher we ve a breaking change in the http wait builder api we ll correct this with one of the future releases to ensure effortless version upgrades api before change java waitfor message message api after change java waitfor message name message additional information issue commit br sven
0
11,474
9,376,843,829
IssuesEvent
2019-04-04 08:56:35
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
When using a User Assigned Managed identity, SQL login fails when the identity is assigned to an Active Directory Group
app-service-web/svc cxp in-progress product-question sql-database/svc triaged
I'm using a User assigned managed identity assigned to an AAD Group. This group is then in turn assigned to the Azure SQL Database using the CREATE USER FROM EXTERNAL PROVIDER call as above. Attempting to connect to the database via a .net core 2.2 application results in SqlException: Login failed for user '&lt;UPN&gt;'. If I assign the Managed Identity by display name to the same database, the connection succeeds. Is this a supported scenario - should this be working? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 31b0d33c-f88e-d50c-2926-7933940f3b92 * Version Independent ID: 4aaef906-f501-6947-5d23-1b704470f09d * Content: [Secure SQL Database connection with managed identity - Azure App Service](https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-connect-msi) * Content Source: [articles/app-service/app-service-web-tutorial-connect-msi.md](https://github.com/Microsoft/azure-docs/blob/master/articles/app-service/app-service-web-tutorial-connect-msi.md) * Service: **app-service-web** * GitHub Login: @cephalin * Microsoft Alias: **cephalin**
1.0
When using a User Assigned Managed identity, SQL login fails when the identity is assigned to an Active Directory Group - I'm using a User assigned managed identity assigned to an AAD Group. This group is then in turn assigned to the Azure SQL Database using the CREATE USER FROM EXTERNAL PROVIDER call as above. Attempting to connect to the database via a .net core 2.2 application results in SqlException: Login failed for user '&lt;UPN&gt;'. If I assign the Managed Identity by display name to the same database, the connection succeeds. Is this a supported scenario - should this be working? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 31b0d33c-f88e-d50c-2926-7933940f3b92 * Version Independent ID: 4aaef906-f501-6947-5d23-1b704470f09d * Content: [Secure SQL Database connection with managed identity - Azure App Service](https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-connect-msi) * Content Source: [articles/app-service/app-service-web-tutorial-connect-msi.md](https://github.com/Microsoft/azure-docs/blob/master/articles/app-service/app-service-web-tutorial-connect-msi.md) * Service: **app-service-web** * GitHub Login: @cephalin * Microsoft Alias: **cephalin**
non_priority
when using a user assigned managed identity sql login fails when the identity is assigned to an active directory group i m using a user assigned managed identity assigned to an aad group this group is then in turn assigned to the azure sql database using the create user from external provider call as above attempting to connect to the database via a net core application results in sqlexception login failed for user lt upn gt if i assign the managed identity by display name to the same database the connection succeeds is this a supported scenario should this be working document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service app service web github login cephalin microsoft alias cephalin
0
36,630
12,418,153,420
IssuesEvent
2020-05-22 23:01:13
wrbejar/wrbejar-Nova8Ksa
https://api.github.com/repos/wrbejar/wrbejar-Nova8Ksa
opened
CVE-2016-1000031 (High) detected in commons-fileupload-1.2.2.jar
security vulnerability
## CVE-2016-1000031 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-fileupload-1.2.2.jar</b></p></summary> <p>The FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Path to dependency file: /tmp/ws-scm/wrbejar-Nova8Ksa/ksa-web-root/ksa-finance-web/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/wrbejar-Nova8Ksa/ksa-web-root/ksa-web/target/ROOT/WEB-INF/lib/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar</p> <p> Dependency Hierarchy: - struts2-core-2.3.31.jar (Root Library) - :x: **commons-fileupload-1.2.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/wrbejar/wrbejar-Nova8Ksa/commit/83ef1f263a13b2d9fe245f311088690d2c3c248d">83ef1f263a13b2d9fe245f311088690d2c3c248d</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution <p>Publish Date: 2016-10-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p> <p>Release Date: 2016-10-25</p> <p>Fix Resolution: 1.3.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-fileupload","packageName":"commons-fileupload","packageVersion":"1.2.2","isTransitiveDependency":true,"dependencyTree":"org.apache.struts:struts2-core:2.3.31;commons-fileupload:commons-fileupload:1.2.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.3"}],"vulnerabilityIdentifier":"CVE-2016-1000031","vulnerabilityDetails":"Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-1000031 (High) detected in commons-fileupload-1.2.2.jar - ## CVE-2016-1000031 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-fileupload-1.2.2.jar</b></p></summary> <p>The FileUpload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications.</p> <p>Path to dependency file: /tmp/ws-scm/wrbejar-Nova8Ksa/ksa-web-root/ksa-finance-web/pom.xml</p> <p>Path to vulnerable library: /root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/wrbejar-Nova8Ksa/ksa-web-root/ksa-web/target/ROOT/WEB-INF/lib/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar</p> <p> Dependency Hierarchy: - struts2-core-2.3.31.jar (Root Library) - :x: **commons-fileupload-1.2.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/wrbejar/wrbejar-Nova8Ksa/commit/83ef1f263a13b2d9fe245f311088690d2c3c248d">83ef1f263a13b2d9fe245f311088690d2c3c248d</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution <p>Publish Date: 2016-10-25 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p> <p>Release Date: 2016-10-25</p> <p>Fix Resolution: 1.3.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-fileupload","packageName":"commons-fileupload","packageVersion":"1.2.2","isTransitiveDependency":true,"dependencyTree":"org.apache.struts:struts2-core:2.3.31;commons-fileupload:commons-fileupload:1.2.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.3"}],"vulnerabilityIdentifier":"CVE-2016-1000031","vulnerabilityDetails":"Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in commons fileupload jar cve high severity vulnerability vulnerable library commons fileupload jar the fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications path to dependency file tmp ws scm wrbejar ksa web root ksa finance web pom xml path to vulnerable library root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar wrbejar ksa web root ksa web target root web inf lib commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy core jar root library x commons fileupload jar vulnerable library found in head commit a href vulnerability details apache commons fileupload before diskfileitem file manipulation remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails apache commons fileupload before diskfileitem file manipulation remote code execution vulnerabilityurl
0
172,064
27,229,461,608
IssuesEvent
2023-02-21 12:09:18
ProgrammingPhilippines/project_rei
https://api.github.com/repos/ProgrammingPhilippines/project_rei
opened
Shop Module & Game Economics
🎯 Gameplay 💻 Engineering 💬 User Interface 🗯 User Experience 🖼 Game Design
We'll need to implement a shop system that will sell "items" to the player for upgrades, consumables/useables, weapons. This will function similar to an inventory system. We'll also need to implement currency that goes with purchasing items.
1.0
Shop Module & Game Economics - We'll need to implement a shop system that will sell "items" to the player for upgrades, consumables/useables, weapons. This will function similar to an inventory system. We'll also need to implement currency that goes with purchasing items.
non_priority
shop module game economics we ll need to implement a shop system that will sell items to the player for upgrades consumables useables weapons this will function similar to an inventory system we ll also need to implement currency that goes with purchasing items
0
67,955
8,204,155,841
IssuesEvent
2018-09-03 04:40:58
brave/browser-laptop
https://api.github.com/repos/brave/browser-laptop
closed
Tab opening enhancement
design feature/tab-page feature/tabsbar stale suggestion
### Description This happens when you're on the last tab at 1st page, and every new tab would be opening on the page 2 (http://prntscr.com/hxmhwm). If you start opening new tabs from the last tab on page 1, you will know only if the first one opened successfully because an arrow will appear at the end of tab bar. But after this first tab in the page 2 you won't be getting any other indicators that the new tabs are getting successfully opened in page 2. ### Steps to Reproduce 1. Open 20 tabs to fill page 1 2. Inside the last tab (so that all new tabs get opened in the page 2) start clicking links holding "CTRL+" to open new tabs 3. You'll know that the first tab successfully opened in page 2 because the arrow will appear at the end of the tab bar on the page 1, but there will be no other indicators that you kept opening tabs #22,23,24... successfully. **Actual result:** http://prntscr.com/hxmoto **Expected result:** In my opinion it would be an enhancement if the arrow which leads to page 2 of tabs would blink every time we click links while we're in opening tabs in the new tab page.
1.0
Tab opening enhancement - ### Description This happens when you're on the last tab at 1st page, and every new tab would be opening on the page 2 (http://prntscr.com/hxmhwm). If you start opening new tabs from the last tab on page 1, you will know only if the first one opened successfully because an arrow will appear at the end of tab bar. But after this first tab in the page 2 you won't be getting any other indicators that the new tabs are getting successfully opened in page 2. ### Steps to Reproduce 1. Open 20 tabs to fill page 1 2. Inside the last tab (so that all new tabs get opened in the page 2) start clicking links holding "CTRL+" to open new tabs 3. You'll know that the first tab successfully opened in page 2 because the arrow will appear at the end of the tab bar on the page 1, but there will be no other indicators that you kept opening tabs #22,23,24... successfully. **Actual result:** http://prntscr.com/hxmoto **Expected result:** In my opinion it would be an enhancement if the arrow which leads to page 2 of tabs would blink every time we click links while we're in opening tabs in the new tab page.
non_priority
tab opening enhancement description this happens when you re on the last tab at page and every new tab would be opening on the page if you start opening new tabs from the last tab on page you will know only if the first one opened successfully because an arrow will appear at the end of tab bar but after this first tab in the page you won t be getting any other indicators that the new tabs are getting successfully opened in page steps to reproduce open tabs to fill page inside the last tab so that all new tabs get opened in the page start clicking links holding ctrl to open new tabs you ll know that the first tab successfully opened in page because the arrow will appear at the end of the tab bar on the page but there will be no other indicators that you kept opening tabs successfully actual result expected result in my opinion it would be an enhancement if the arrow which leads to page of tabs would blink every time we click links while we re in opening tabs in the new tab page
0
385,303
26,630,331,527
IssuesEvent
2023-01-24 17:20:06
eclipse/lsp4jakarta
https://api.github.com/repos/eclipse/lsp4jakarta
closed
Document what is supported in which release of LSP4Jakarta
documentation
Document or at least summarise what capabilities (coding assistance) are supported in which release of LSP4Jakarta. e.g., translate what is captured in https://github.com/eclipse/lsp4jakarta/issues/16 to an end-user (developer) consumable information mapping to the corresponding release(s) of the language server.
1.0
Document what is supported in which release of LSP4Jakarta - Document or at least summarise what capabilities (coding assistance) are supported in which release of LSP4Jakarta. e.g., translate what is captured in https://github.com/eclipse/lsp4jakarta/issues/16 to an end-user (developer) consumable information mapping to the corresponding release(s) of the language server.
non_priority
document what is supported in which release of document or at least summarise what capabilities coding assistance are supported in which release of e g translate what is captured in to an end user developer consumable information mapping to the corresponding release s of the language server
0
27,347
11,473,741,583
IssuesEvent
2020-02-10 01:00:13
whitesource-yossi/datahelix
https://api.github.com/repos/whitesource-yossi/datahelix
opened
CVE-2017-18640 (High) detected in snakeyaml-1.23.jar
security vulnerability
## CVE-2017-18640 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.23.jar</b></p></summary> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p> <p>Path to dependency file: /tmp/ws-scm/datahelix/core/build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar,/tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar</p> <p> Dependency Hierarchy: - javafaker-1.0.1.jar (Root Library) - :x: **snakeyaml-1.23.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564. <p>Publish Date: 2019-12-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640>CVE-2017-18640</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.yaml","packageName":"snakeyaml","packageVersion":"1.23","isTransitiveDependency":true,"dependencyTree":"com.github.javafaker:javafaker:1.0.1;org.yaml:snakeyaml:1.23","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2017-18640","vulnerabilityDetails":"The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2017-18640 (High) detected in snakeyaml-1.23.jar - ## CVE-2017-18640 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.23.jar</b></p></summary> <p>YAML 1.1 parser and emitter for Java</p> <p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p> <p>Path to dependency file: /tmp/ws-scm/datahelix/core/build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar,/tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar</p> <p> Dependency Hierarchy: - javafaker-1.0.1.jar (Root Library) - :x: **snakeyaml-1.23.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564. <p>Publish Date: 2019-12-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640>CVE-2017-18640</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.yaml","packageName":"snakeyaml","packageVersion":"1.23","isTransitiveDependency":true,"dependencyTree":"com.github.javafaker:javafaker:1.0.1;org.yaml:snakeyaml:1.23","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2017-18640","vulnerabilityDetails":"The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in snakeyaml jar cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file tmp ws scm datahelix core build gradle path to vulnerable library tmp ws ua downloadresource snakeyaml jar tmp ws ua downloadresource snakeyaml jar dependency hierarchy javafaker jar root library x snakeyaml jar vulnerable library vulnerability details the alias feature in snakeyaml allows entity expansion during a load operation a related issue to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the alias feature in snakeyaml allows entity expansion during a load operation a related issue to cve vulnerabilityurl
0
189,373
15,186,899,772
IssuesEvent
2021-02-15 13:03:45
arturo-lang/arturo
https://api.github.com/repos/arturo-lang/arturo
closed
[Sets\union] add example for documentation
documentation easy library todo
[Sets\union] add example for documentation https://github.com/arturo-lang/arturo/blob/de6b44acd21e2d88248ccc42e565c2fabc5637a5/src/library/Sets.nim#L90 ```text # (c) 2019-2021 Yanis Zafirópulos # # @file: library/Sets.nim ###################################################### #======================================= # Pragmas #======================================= {.used.} #======================================= # Libraries #======================================= import sequtils, std/sets import vm/[common, globals, stack, value] #======================================= # Methods #======================================= proc defineSymbols*() = when defined(VERBOSE): echo "- Importing: Sets" builtin "difference", alias = unaliased, rule = PrefixPrecedence, description = "return the difference of given sets", args = { "setA" : {Block,Literal}, "setB" : {Block} }, attrs = { "symmetric" : ({Boolean},"get the symmetric difference") }, returns = {Block,Nothing}, # TODO(Sets\difference) add example for documentation # labels: library,documentation,easy example = """ """: ########################################################## if (popAttr("symmetric")!=VNULL): if x.kind==Literal: Syms[x.s] = newBlock(toSeq(symmetricDifference(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(symmetricDifference(toHashSet(x.a), toHashSet(y.a))))) else: if x.kind==Literal: Syms[x.s] = newBlock(toSeq(difference(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(difference(toHashSet(x.a), toHashSet(y.a))))) builtin "intersection", alias = unaliased, rule = PrefixPrecedence, description = "return the intersection of given sets", args = { "setA" : {Block,Literal}, "setB" : {Block} }, attrs = NoAttrs, returns = {Block,Nothing}, # TODO(Sets\intersection) add example for documentation # labels: library,documentation,easy example = """ """: ########################################################## if x.kind==Literal: Syms[x.s] = newBlock(toSeq(intersection(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(intersection(toHashSet(x.a), toHashSet(y.a))))) builtin "union", alias = unaliased, rule = PrefixPrecedence, description = "return the union of given sets", args = { "setA" : {Block,Literal}, "setB" : {Block} }, attrs = NoAttrs, returns = {Block,Nothing}, # TODO(Sets\union) add example for documentation # labels: library,documentation,easy example = """ """: ########################################################## if x.kind==Literal: Syms[x.s] = newBlock(toSeq(union(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(union(toHashSet(x.a), toHashSet(y.a))))) #======================================= # Add Library #======================================= Libraries.add(defineSymbols) No newline at end of file ndex 01a4d706..fe6a7c5e 100644 ++ b/src/vm/vm.nim ``` 1f96271f95cba351d83e4791a12b0df0d72a49c0
1.0
[Sets\union] add example for documentation - [Sets\union] add example for documentation https://github.com/arturo-lang/arturo/blob/de6b44acd21e2d88248ccc42e565c2fabc5637a5/src/library/Sets.nim#L90 ```text # (c) 2019-2021 Yanis Zafirópulos # # @file: library/Sets.nim ###################################################### #======================================= # Pragmas #======================================= {.used.} #======================================= # Libraries #======================================= import sequtils, std/sets import vm/[common, globals, stack, value] #======================================= # Methods #======================================= proc defineSymbols*() = when defined(VERBOSE): echo "- Importing: Sets" builtin "difference", alias = unaliased, rule = PrefixPrecedence, description = "return the difference of given sets", args = { "setA" : {Block,Literal}, "setB" : {Block} }, attrs = { "symmetric" : ({Boolean},"get the symmetric difference") }, returns = {Block,Nothing}, # TODO(Sets\difference) add example for documentation # labels: library,documentation,easy example = """ """: ########################################################## if (popAttr("symmetric")!=VNULL): if x.kind==Literal: Syms[x.s] = newBlock(toSeq(symmetricDifference(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(symmetricDifference(toHashSet(x.a), toHashSet(y.a))))) else: if x.kind==Literal: Syms[x.s] = newBlock(toSeq(difference(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(difference(toHashSet(x.a), toHashSet(y.a))))) builtin "intersection", alias = unaliased, rule = PrefixPrecedence, description = "return the intersection of given sets", args = { "setA" : {Block,Literal}, "setB" : {Block} }, attrs = NoAttrs, returns = {Block,Nothing}, # TODO(Sets\intersection) add example for documentation # labels: library,documentation,easy example = """ """: ########################################################## if x.kind==Literal: Syms[x.s] = newBlock(toSeq(intersection(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(intersection(toHashSet(x.a), toHashSet(y.a))))) builtin "union", alias = unaliased, rule = PrefixPrecedence, description = "return the union of given sets", args = { "setA" : {Block,Literal}, "setB" : {Block} }, attrs = NoAttrs, returns = {Block,Nothing}, # TODO(Sets\union) add example for documentation # labels: library,documentation,easy example = """ """: ########################################################## if x.kind==Literal: Syms[x.s] = newBlock(toSeq(union(toHashSet(Syms[x.s].a), toHashSet(y.a)))) else: stack.push(newBlock(toSeq(union(toHashSet(x.a), toHashSet(y.a))))) #======================================= # Add Library #======================================= Libraries.add(defineSymbols) No newline at end of file ndex 01a4d706..fe6a7c5e 100644 ++ b/src/vm/vm.nim ``` 1f96271f95cba351d83e4791a12b0df0d72a49c0
non_priority
add example for documentation add example for documentation text c yanis zafirópulos file library sets nim pragmas used libraries import sequtils std sets import vm methods proc definesymbols when defined verbose echo importing sets builtin difference alias unaliased rule prefixprecedence description return the difference of given sets args seta block literal setb block attrs symmetric boolean get the symmetric difference returns block nothing todo sets difference add example for documentation labels library documentation easy example if popattr symmetric vnull if x kind literal syms newblock toseq symmetricdifference tohashset syms a tohashset y a else stack push newblock toseq symmetricdifference tohashset x a tohashset y a else if x kind literal syms newblock toseq difference tohashset syms a tohashset y a else stack push newblock toseq difference tohashset x a tohashset y a builtin intersection alias unaliased rule prefixprecedence description return the intersection of given sets args seta block literal setb block attrs noattrs returns block nothing todo sets intersection add example for documentation labels library documentation easy example if x kind literal syms newblock toseq intersection tohashset syms a tohashset y a else stack push newblock toseq intersection tohashset x a tohashset y a builtin union alias unaliased rule prefixprecedence description return the union of given sets args seta block literal setb block attrs noattrs returns block nothing todo sets union add example for documentation labels library documentation easy example if x kind literal syms newblock toseq union tohashset syms a tohashset y a else stack push newblock toseq union tohashset x a tohashset y a add library libraries add definesymbols no newline at end of file ndex b src vm vm nim
0
173,842
21,182,114,020
IssuesEvent
2022-04-08 08:58:55
OTTIN-T/OttinTimothe_5_27112020
https://api.github.com/repos/OTTIN-T/OttinTimothe_5_27112020
closed
WS-2019-0605 (Medium) detected in CSS::Sassv3.4.11 - autoclosed
security vulnerability
## WS-2019-0605 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>CSS::Sassv3.4.11</b></p></summary> <p> <p>Library home page: <a href=https://metacpan.org/pod/CSS::Sass>https://metacpan.org/pod/CSS::Sass</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/node_modules/node-sass/src/libsass/src/lexer.cpp</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In sass versions between 3.2.0 to 3.6.3 may read 1 byte outside an allocated buffer while parsing a specially crafted css rule. <p>Publish Date: 2019-07-16 <p>URL: <a href=https://github.com/sass/libsass/commit/7a21c79e321927363a153dc5d7e9c492365faf9b>WS-2019-0605</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/OSV-2020-734">https://osv.dev/vulnerability/OSV-2020-734</a></p> <p>Release Date: 2019-07-16</p> <p>Fix Resolution: 3.6.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0605 (Medium) detected in CSS::Sassv3.4.11 - autoclosed - ## WS-2019-0605 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>CSS::Sassv3.4.11</b></p></summary> <p> <p>Library home page: <a href=https://metacpan.org/pod/CSS::Sass>https://metacpan.org/pod/CSS::Sass</a></p> <p>Found in base branch: <b>main</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/node_modules/node-sass/src/libsass/src/lexer.cpp</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In sass versions between 3.2.0 to 3.6.3 may read 1 byte outside an allocated buffer while parsing a specially crafted css rule. <p>Publish Date: 2019-07-16 <p>URL: <a href=https://github.com/sass/libsass/commit/7a21c79e321927363a153dc5d7e9c492365faf9b>WS-2019-0605</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/OSV-2020-734">https://osv.dev/vulnerability/OSV-2020-734</a></p> <p>Release Date: 2019-07-16</p> <p>Fix Resolution: 3.6.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in css autoclosed ws medium severity vulnerability vulnerable library css library home page a href found in base branch main vulnerable source files node modules node sass src libsass src lexer cpp vulnerability details in sass versions between to may read byte outside an allocated buffer while parsing a specially crafted css rule publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
62,147
15,170,050,117
IssuesEvent
2021-02-12 22:21:44
lbl-srg/modelica-buildings
https://api.github.com/repos/lbl-srg/modelica-buildings
opened
Add default vendor annotation to generate point list
OpenBuildingControl
This issue is to add vendor annotation to the cdl control sequences, for generating point list. See [section 7.7.4 Point list](http://obc.lbl.gov/specification/cdl.html#point-list) of OBC specification.
1.0
Add default vendor annotation to generate point list - This issue is to add vendor annotation to the cdl control sequences, for generating point list. See [section 7.7.4 Point list](http://obc.lbl.gov/specification/cdl.html#point-list) of OBC specification.
non_priority
add default vendor annotation to generate point list this issue is to add vendor annotation to the cdl control sequences for generating point list see of obc specification
0
50,934
7,644,731,498
IssuesEvent
2018-05-08 16:18:39
dealii/dealii
https://api.github.com/repos/dealii/dealii
closed
Review all documentation related to GridGenerator
Documentation Manifold Meta Triangulation
GridGenerator functions have changed their default behaviour. This should be reflected anywhere we discuss about manifold descriptions (e.g., tutorials, modules, etc.).
1.0
Review all documentation related to GridGenerator - GridGenerator functions have changed their default behaviour. This should be reflected anywhere we discuss about manifold descriptions (e.g., tutorials, modules, etc.).
non_priority
review all documentation related to gridgenerator gridgenerator functions have changed their default behaviour this should be reflected anywhere we discuss about manifold descriptions e g tutorials modules etc
0
22,170
10,731,372,471
IssuesEvent
2019-10-28 19:24:18
melsorg/github-scanner-test
https://api.github.com/repos/melsorg/github-scanner-test
opened
CVE-2014-3509 (Medium) detected in openssl-OpenSSL_1_0_1
security vulnerability
## CVE-2014-3509 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1</b></p></summary> <p> <p>Akamai fork of openssl master.</p> <p>Library home page: <a href=https://github.com/akamai/openssl.git>https://github.com/akamai/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/melsorg/github-scanner-test/commit/38c8615a6d0a047787b5e7401328782154ba03e4">38c8615a6d0a047787b5e7401328782154ba03e4</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (13)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /github-scanner-test/openssl/ssl/t1_enc.c - /github-scanner-test/openssl/ssl/ssl.h - /github-scanner-test/openssl/ssl/d1_lib.c - /github-scanner-test/openssl/ssl/s3_srvr.c - /github-scanner-test/openssl/ssl/s23_clnt.c - /github-scanner-test/openssl/ssl/s3_pkt.c - /github-scanner-test/openssl/ssl/s3_clnt.c - /github-scanner-test/openssl/ssl/bio_ssl.c - /github-scanner-test/openssl/ssl/ssl_ciph.c - /github-scanner-test/openssl/ssl/d1_srvr.c - /github-scanner-test/openssl/ssl/s3_lib.c - /github-scanner-test/openssl/ssl/ssl_err.c - /github-scanner-test/openssl/ssl/t1_lib.c </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data. <p>Publish Date: 2014-08-13 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509>CVE-2014-3509</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">https://nvd.nist.gov/vuln/detail/CVE-2014-3509</a></p> <p>Release Date: 2014-08-13</p> <p>Fix Resolution: 1.0.0n,1.0.1i</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2014-3509 (Medium) detected in openssl-OpenSSL_1_0_1 - ## CVE-2014-3509 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1</b></p></summary> <p> <p>Akamai fork of openssl master.</p> <p>Library home page: <a href=https://github.com/akamai/openssl.git>https://github.com/akamai/openssl.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/melsorg/github-scanner-test/commit/38c8615a6d0a047787b5e7401328782154ba03e4">38c8615a6d0a047787b5e7401328782154ba03e4</a></p> </p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (13)</summary> <p></p> <p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p> <p> - /github-scanner-test/openssl/ssl/t1_enc.c - /github-scanner-test/openssl/ssl/ssl.h - /github-scanner-test/openssl/ssl/d1_lib.c - /github-scanner-test/openssl/ssl/s3_srvr.c - /github-scanner-test/openssl/ssl/s23_clnt.c - /github-scanner-test/openssl/ssl/s3_pkt.c - /github-scanner-test/openssl/ssl/s3_clnt.c - /github-scanner-test/openssl/ssl/bio_ssl.c - /github-scanner-test/openssl/ssl/ssl_ciph.c - /github-scanner-test/openssl/ssl/d1_srvr.c - /github-scanner-test/openssl/ssl/s3_lib.c - /github-scanner-test/openssl/ssl/ssl_err.c - /github-scanner-test/openssl/ssl/t1_lib.c </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data. <p>Publish Date: 2014-08-13 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509>CVE-2014-3509</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">https://nvd.nist.gov/vuln/detail/CVE-2014-3509</a></p> <p>Release Date: 2014-08-13</p> <p>Fix Resolution: 1.0.0n,1.0.1i</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in openssl openssl cve medium severity vulnerability vulnerable library opensslopenssl akamai fork of openssl master library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries github scanner test openssl ssl enc c github scanner test openssl ssl ssl h github scanner test openssl ssl lib c github scanner test openssl ssl srvr c github scanner test openssl ssl clnt c github scanner test openssl ssl pkt c github scanner test openssl ssl clnt c github scanner test openssl ssl bio ssl c github scanner test openssl ssl ssl ciph c github scanner test openssl ssl srvr c github scanner test openssl ssl lib c github scanner test openssl ssl ssl err c github scanner test openssl ssl lib c vulnerability details race condition in the ssl parse serverhello tlsext function in lib c in openssl before and before when multithreading and session resumption are used allows remote ssl servers to cause a denial of service memory overwrite and client application crash or possibly have unspecified other impact by sending elliptic curve ec supported point formats extension data publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
224,271
17,170,789,792
IssuesEvent
2021-07-15 03:54:33
NREL-SIIP/PowerSimulationsDynamics.jl
https://api.github.com/repos/NREL-SIIP/PowerSimulationsDynamics.jl
closed
Inconsistent label for outer control angle
documentation
In the meta-model figure, the angle appears as δ<sub>olc</sub>, in the Virtual inertia model it appears as δθ<sub>olc</sub>, and in the Droop model it appears as θ<sub>olc</sub>: ![image](https://user-images.githubusercontent.com/67015312/124842153-2834f580-df4c-11eb-9556-8fbfd8562c68.png) ![image](https://user-images.githubusercontent.com/67015312/124842375-a09bb680-df4c-11eb-831a-71465417627b.png) ![image](https://user-images.githubusercontent.com/67015312/124842397-adb8a580-df4c-11eb-86c5-f88fe899d6c6.png) Can we label this angle as θ<sub>olc</sub> in each part of the documentation?
1.0
Inconsistent label for outer control angle - In the meta-model figure, the angle appears as δ<sub>olc</sub>, in the Virtual inertia model it appears as δθ<sub>olc</sub>, and in the Droop model it appears as θ<sub>olc</sub>: ![image](https://user-images.githubusercontent.com/67015312/124842153-2834f580-df4c-11eb-9556-8fbfd8562c68.png) ![image](https://user-images.githubusercontent.com/67015312/124842375-a09bb680-df4c-11eb-831a-71465417627b.png) ![image](https://user-images.githubusercontent.com/67015312/124842397-adb8a580-df4c-11eb-86c5-f88fe899d6c6.png) Can we label this angle as θ<sub>olc</sub> in each part of the documentation?
non_priority
inconsistent label for outer control angle in the meta model figure the angle appears as δ olc in the virtual inertia model it appears as δθ olc and in the droop model it appears as θ olc can we label this angle as θ olc in each part of the documentation
0
282,573
30,889,370,435
IssuesEvent
2023-08-04 02:37:23
maddyCode23/linux-4.1.15
https://api.github.com/repos/maddyCode23/linux-4.1.15
reopened
CVE-2020-0431 (Medium) detected in linux-stable-rtv4.1.33
Mend: dependency security vulnerability
## CVE-2020-0431 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459 <p>Publish Date: 2020-09-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0431>CVE-2020-0431</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-0431">https://www.linuxkernelcves.com/cves/CVE-2020-0431</a></p> <p>Release Date: 2020-09-17</p> <p>Fix Resolution: v3.16.83,4.4.210,v4.9.210,v4.14.165,v4.19.96,v5.4.12</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-0431 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2020-0431 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459 <p>Publish Date: 2020-09-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0431>CVE-2020-0431</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-0431">https://www.linuxkernelcves.com/cves/CVE-2020-0431</a></p> <p>Release Date: 2020-09-17</p> <p>Fix Resolution: v3.16.83,4.4.210,v4.9.210,v4.14.165,v4.19.96,v5.4.12</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files drivers hid hid input c drivers hid hid input c vulnerability details in kbd keycode of keyboard c there is a possible out of bounds write due to a missing bounds check this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android kernelandroid id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
157,624
13,697,709,992
IssuesEvent
2020-10-01 03:51:47
msandfor/10-Easy-Steps
https://api.github.com/repos/msandfor/10-Easy-Steps
closed
[Bug]: Broken Links in emoji-key.md
documentation :memo: good first issue hacktoberfest :children_crossing:
**Describe the bug** The links redirect to 404 page **To Reproduce** Steps to reproduce the behavior: 1. Go to '10-Easy-Steps/docs/emoji-key.md' 3. Scroll down to 'What's next' 4. Click on 'Notes for repository maintainers' and 'Automating the process using tools' **Expected behavior** Clicking on these links lead to a 404 page **Screenshots** ![image](https://user-images.githubusercontent.com/24486796/94560423-3d7e4480-0295-11eb-8fef-fee7f902e212.png) **Desktop (please complete the following information):** - Browser: Microsoft Edge - Version: Version 85.0.564.63
1.0
[Bug]: Broken Links in emoji-key.md - **Describe the bug** The links redirect to 404 page **To Reproduce** Steps to reproduce the behavior: 1. Go to '10-Easy-Steps/docs/emoji-key.md' 3. Scroll down to 'What's next' 4. Click on 'Notes for repository maintainers' and 'Automating the process using tools' **Expected behavior** Clicking on these links lead to a 404 page **Screenshots** ![image](https://user-images.githubusercontent.com/24486796/94560423-3d7e4480-0295-11eb-8fef-fee7f902e212.png) **Desktop (please complete the following information):** - Browser: Microsoft Edge - Version: Version 85.0.564.63
non_priority
broken links in emoji key md describe the bug the links redirect to page to reproduce steps to reproduce the behavior go to easy steps docs emoji key md scroll down to what s next click on notes for repository maintainers and automating the process using tools expected behavior clicking on these links lead to a page screenshots desktop please complete the following information browser microsoft edge version version
0
258,559
27,564,311,386
IssuesEvent
2023-03-08 01:43:10
cluesblues/didactic-pancake
https://api.github.com/repos/cluesblues/didactic-pancake
opened
CVE-2021-23337 (High) detected in lodash-4.17.4.tgz, lodash-1.3.1.tgz
security vulnerability
## CVE-2021-23337 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.4.tgz</b>, <b>lodash-1.3.1.tgz</b></p></summary> <p> <details><summary><b>lodash-4.17.4.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - nyc-10.3.2.tgz (Root Library) - istanbul-lib-instrument-1.7.1.tgz - babel-generator-6.24.1.tgz - :x: **lodash-4.17.4.tgz** (Vulnerable Library) </details> <details><summary><b>lodash-1.3.1.tgz</b></p></summary> <p>A utility library delivering consistency, customization, performance, and extras.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz">https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - travis-ci-2.2.0.tgz (Root Library) - :x: **lodash-1.3.1.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23337>CVE-2021-23337</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution (lodash): 4.17.21</p> <p>Direct dependency fix Resolution (nyc): 11.0.0-candidate.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23337 (High) detected in lodash-4.17.4.tgz, lodash-1.3.1.tgz - ## CVE-2021-23337 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.4.tgz</b>, <b>lodash-1.3.1.tgz</b></p></summary> <p> <details><summary><b>lodash-4.17.4.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - nyc-10.3.2.tgz (Root Library) - istanbul-lib-instrument-1.7.1.tgz - babel-generator-6.24.1.tgz - :x: **lodash-4.17.4.tgz** (Vulnerable Library) </details> <details><summary><b>lodash-1.3.1.tgz</b></p></summary> <p>A utility library delivering consistency, customization, performance, and extras.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz">https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - travis-ci-2.2.0.tgz (Root Library) - :x: **lodash-1.3.1.tgz** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23337>CVE-2021-23337</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution (lodash): 4.17.21</p> <p>Direct dependency fix Resolution (nyc): 11.0.0-candidate.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in lodash tgz lodash tgz cve high severity vulnerability vulnerable libraries lodash tgz lodash tgz lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules lodash package json dependency hierarchy nyc tgz root library istanbul lib instrument tgz babel generator tgz x lodash tgz vulnerable library lodash tgz a utility library delivering consistency customization performance and extras library home page a href path to dependency file package json path to vulnerable library node modules lodash package json dependency hierarchy travis ci tgz root library x lodash tgz vulnerable library found in base branch master vulnerability details lodash versions prior to are vulnerable to command injection via the template function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution lodash direct dependency fix resolution nyc candidate step up your open source security game with mend
0
154,963
12,235,064,961
IssuesEvent
2020-05-04 14:21:40
WoWManiaUK/Blackwing-Lair
https://api.github.com/repos/WoWManiaUK/Blackwing-Lair
opened
[NPC][FIRELANDS] Blazing Monstrosity
Confirmed By Tester Dungeon/Raid Later Patch
**Links:** https://www.wowhead.com/npc=53791/blazing-monstrosity from WoWHead or our Armory **What is happening:** When encounter start they just stand there. **What should happen:** These should be mountable and be able to use ablitities **Is it crashing the server?:** No **Other Information:**
1.0
[NPC][FIRELANDS] Blazing Monstrosity - **Links:** https://www.wowhead.com/npc=53791/blazing-monstrosity from WoWHead or our Armory **What is happening:** When encounter start they just stand there. **What should happen:** These should be mountable and be able to use ablitities **Is it crashing the server?:** No **Other Information:**
non_priority
blazing monstrosity links from wowhead or our armory what is happening when encounter start they just stand there what should happen these should be mountable and be able to use ablitities is it crashing the server no other information
0
32,585
4,777,779,475
IssuesEvent
2016-10-27 17:15:59
DynamoRIO/dynamorio
https://api.github.com/repos/DynamoRIO/dynamorio
opened
drcachesim sometimes fails to open pipe file
Bug-Assert Component-DRTool Component-Tests OpSys-Linux
This happened once for a test that passed many many times: http://dynamorio.org/CDash/testDetails.php?test=141155&build=13692 ASSERT FAILURE: /work/dr/nightly/src/clients/drcachesim/tracer/tracer.cpp:766: fd != -1 ()
1.0
drcachesim sometimes fails to open pipe file - This happened once for a test that passed many many times: http://dynamorio.org/CDash/testDetails.php?test=141155&build=13692 ASSERT FAILURE: /work/dr/nightly/src/clients/drcachesim/tracer/tracer.cpp:766: fd != -1 ()
non_priority
drcachesim sometimes fails to open pipe file this happened once for a test that passed many many times assert failure work dr nightly src clients drcachesim tracer tracer cpp fd
0
442,875
30,861,448,972
IssuesEvent
2023-08-03 03:40:08
froblesl/git_web_practice_branch
https://api.github.com/repos/froblesl/git_web_practice_branch
opened
Un commit que no sigue la convención de código o arreglo a realizar
documentation
La convención del mensaje del último commit no es la esperada: `FIX2: Error2` Recuerde que debe tener el siguiente formato: `<Identificador de la corrección>: <Comentario>` Para realizar la corrección del mensaje de commit ejecute los comandos `git commit --amend` y `git push -f` Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado.
1.0
Un commit que no sigue la convención de código o arreglo a realizar - La convención del mensaje del último commit no es la esperada: `FIX2: Error2` Recuerde que debe tener el siguiente formato: `<Identificador de la corrección>: <Comentario>` Para realizar la corrección del mensaje de commit ejecute los comandos `git commit --amend` y `git push -f` Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado.
non_priority
un commit que no sigue la convención de código o arreglo a realizar la convención del mensaje del último commit no es la esperada recuerde que debe tener el siguiente formato para realizar la corrección del mensaje de commit ejecute los comandos git commit amend y git push f este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado
0
58,187
8,233,680,374
IssuesEvent
2018-09-08 04:09:30
gatsbyjs/gatsby
https://api.github.com/repos/gatsbyjs/gatsby
closed
Add documentation about service workers
type: documentation
gatsby-plugin-offline adds amazing service worker caching functionality that should be mentioned in the project documentation.
1.0
Add documentation about service workers - gatsby-plugin-offline adds amazing service worker caching functionality that should be mentioned in the project documentation.
non_priority
add documentation about service workers gatsby plugin offline adds amazing service worker caching functionality that should be mentioned in the project documentation
0
36,088
6,516,011,081
IssuesEvent
2017-08-27 00:31:58
Zimmi48/bugzilla-test
https://api.github.com/repos/Zimmi48/bugzilla-test
closed
firstorder doc variants 2/3 are confused
kind: documentation
Note: the issue was created automatically with bugzilla2github tool # Bugzilla Bug ID: 4887 Date: 2016-07-02 16:47:34 +0200 From: Jonathan Leivent &lt;<jonikelee@gmail.com>&gt; To: CC: coq-bugs-redist@lists.gforge.inria.fr Last updated: 2016-09-27 17:34:57 +0200 ## Bugzilla Comment ID: 12959 Date: 2016-07-02 16:47:34 +0200 From: Jonathan Leivent &lt;<jonikelee@gmail.com>&gt; The doc for variants 2 and 3 of firstorder in section 8.10.4 of the refman is confused. It says: "2. firstorder with ident 1 ... ident n Adds lemmas ident 1 . . . ident n to the proof-search environment. 3. firstorder using qualid 1 , ... , qualid n Adds lemmas in auto hints bases qualid 1 . . . qualid n to the proof-search environment. If qualid i refers to an inductive type, it is the collection of its constructors which is added as hints." But, "firstorder with" looks for hint dbs while "firstorder using" looks for lemmas. And that makes sense with respect to other tactics like auto that have with and using variants. Also note the second sentence about inductive types in variant 3 seems to be about the using variant (3) and not the with variant (2), and so is correct. ## Bugzilla Comment ID: 13951 Date: 2016-09-27 17:34:57 +0200 From: @_herbelin Fixed in v8.5.
1.0
firstorder doc variants 2/3 are confused - Note: the issue was created automatically with bugzilla2github tool # Bugzilla Bug ID: 4887 Date: 2016-07-02 16:47:34 +0200 From: Jonathan Leivent &lt;<jonikelee@gmail.com>&gt; To: CC: coq-bugs-redist@lists.gforge.inria.fr Last updated: 2016-09-27 17:34:57 +0200 ## Bugzilla Comment ID: 12959 Date: 2016-07-02 16:47:34 +0200 From: Jonathan Leivent &lt;<jonikelee@gmail.com>&gt; The doc for variants 2 and 3 of firstorder in section 8.10.4 of the refman is confused. It says: "2. firstorder with ident 1 ... ident n Adds lemmas ident 1 . . . ident n to the proof-search environment. 3. firstorder using qualid 1 , ... , qualid n Adds lemmas in auto hints bases qualid 1 . . . qualid n to the proof-search environment. If qualid i refers to an inductive type, it is the collection of its constructors which is added as hints." But, "firstorder with" looks for hint dbs while "firstorder using" looks for lemmas. And that makes sense with respect to other tactics like auto that have with and using variants. Also note the second sentence about inductive types in variant 3 seems to be about the using variant (3) and not the with variant (2), and so is correct. ## Bugzilla Comment ID: 13951 Date: 2016-09-27 17:34:57 +0200 From: @_herbelin Fixed in v8.5.
non_priority
firstorder doc variants are confused note the issue was created automatically with tool bugzilla bug id date from jonathan leivent lt gt to cc coq bugs redist lists gforge inria fr last updated bugzilla comment id date from jonathan leivent lt gt the doc for variants and of firstorder in section of the refman is confused it says firstorder with ident ident n adds lemmas ident ident n to the proof search environment firstorder using qualid qualid n adds lemmas in auto hints bases qualid qualid n to the proof search environment if qualid i refers to an inductive type it is the collection of its constructors which is added as hints but firstorder with looks for hint dbs while firstorder using looks for lemmas and that makes sense with respect to other tactics like auto that have with and using variants also note the second sentence about inductive types in variant seems to be about the using variant and not the with variant and so is correct bugzilla comment id date from herbelin fixed in
0
81,815
10,260,843,661
IssuesEvent
2019-08-22 08:26:52
architecture-building-systems/CityEnergyAnalyst
https://api.github.com/repos/architecture-building-systems/CityEnergyAnalyst
closed
Solar radiation documentation correction
documentation
The solar radiation in the dashboard is placed at: Tools/Energy potentials/Solar radiation (Daysim engine) But in the documentation it is stated that it can be found at: tools/Resources/Solar Radiation
1.0
Solar radiation documentation correction - The solar radiation in the dashboard is placed at: Tools/Energy potentials/Solar radiation (Daysim engine) But in the documentation it is stated that it can be found at: tools/Resources/Solar Radiation
non_priority
solar radiation documentation correction the solar radiation in the dashboard is placed at tools energy potentials solar radiation daysim engine but in the documentation it is stated that it can be found at tools resources solar radiation
0
58,045
14,231,037,413
IssuesEvent
2020-11-18 09:00:53
ams0/openhack-containers
https://api.github.com/repos/ams0/openhack-containers
opened
CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar
security vulnerability
## CVE-2019-14893 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: openhack-containers/src/user-java/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - jackson-datatype-threetenbp-2.6.4.jar (Root Library) - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ams0/openhack-containers/commit/43171928fbf0aa46e304f2aef2bc7c65732f286b">43171928fbf0aa46e304f2aef2bc7c65732f286b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14893 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: openhack-containers/src/user-java/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - jackson-datatype-threetenbp-2.6.4.jar (Root Library) - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ams0/openhack-containers/commit/43171928fbf0aa46e304f2aef2bc7c65732f286b">43171928fbf0aa46e304f2aef2bc7c65732f286b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file openhack containers src user java pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jackson datatype threetenbp jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource
0
7,931
8,124,454,778
IssuesEvent
2018-08-16 17:36:39
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Service Fabric Mesh in EU/UK Regions ?
cxp in-progress needs-more-info product-question service-fabric-mesh/svc triaged
Is there any way can I get preview from EU / UK Regions ? or when this will become available as preview in EU / UK Regions ? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 1772867c-92c7-f8ae-e19a-929478763da3 * Version Independent ID: 2df08f43-c2be-63e3-1b6f-99932ddd593f * Content: [Overview of Azure Service Fabric Mesh](https://docs.microsoft.com/en-us/azure/service-fabric-mesh/service-fabric-mesh-overview) * Content Source: [articles/service-fabric-mesh/service-fabric-mesh-overview.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-fabric-mesh/service-fabric-mesh-overview.md) * Service: **service-fabric-mesh** * GitHub Login: @rwike77 * Microsoft Alias: **ryanwi**
1.0
Service Fabric Mesh in EU/UK Regions ? - Is there any way can I get preview from EU / UK Regions ? or when this will become available as preview in EU / UK Regions ? --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 1772867c-92c7-f8ae-e19a-929478763da3 * Version Independent ID: 2df08f43-c2be-63e3-1b6f-99932ddd593f * Content: [Overview of Azure Service Fabric Mesh](https://docs.microsoft.com/en-us/azure/service-fabric-mesh/service-fabric-mesh-overview) * Content Source: [articles/service-fabric-mesh/service-fabric-mesh-overview.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-fabric-mesh/service-fabric-mesh-overview.md) * Service: **service-fabric-mesh** * GitHub Login: @rwike77 * Microsoft Alias: **ryanwi**
non_priority
service fabric mesh in eu uk regions is there any way can i get preview from eu uk regions or when this will become available as preview in eu uk regions document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service service fabric mesh github login microsoft alias ryanwi
0
19,578
4,424,460,379
IssuesEvent
2016-08-16 12:39:08
PerfCake/PerfCake
https://api.github.com/repos/PerfCake/PerfCake
opened
Create standalone execution section in user guide
documentation
Make the information more clear and available.
1.0
Create standalone execution section in user guide - Make the information more clear and available.
non_priority
create standalone execution section in user guide make the information more clear and available
0
215,529
24,177,217,925
IssuesEvent
2022-09-23 04:09:12
bcgov/CONN-CCBC-portal
https://api.github.com/repos/bcgov/CONN-CCBC-portal
closed
Container Scanning
Blocked inSprint Security
Discuss with Nick Corcoran about container scanning. This will scan the OS level code that we have imported.
True
Container Scanning - Discuss with Nick Corcoran about container scanning. This will scan the OS level code that we have imported.
non_priority
container scanning discuss with nick corcoran about container scanning this will scan the os level code that we have imported
0
235,732
19,424,876,547
IssuesEvent
2021-12-21 03:12:28
go-gitea/gitea
https://api.github.com/repos/go-gitea/gitea
closed
Integration tests fail if LANG is not ""
kind/bug kind/testing
gitea version: 9296baf to reproduce: ``` export LANG=de_DE.UTF-8 make test-sqlite ``` expected: they should pass affected tests: - TestAPILFSBatch/Download/MetaNotFound (api_repo_lfs_test.go:186 - should be false) - TestAPILFSUpload/AlreadyExistsInStore (api_repo_lfs_test.go:360 - should be false) - TestMirrorPush (mirror_push_test.go:51 - hould have 1 item(s), but has 2; mirror_push_test.go:54 - should be true) - TestCreateNewTagProtected/API (repo_tag_test.go:33, unexpected error)
1.0
Integration tests fail if LANG is not "" - gitea version: 9296baf to reproduce: ``` export LANG=de_DE.UTF-8 make test-sqlite ``` expected: they should pass affected tests: - TestAPILFSBatch/Download/MetaNotFound (api_repo_lfs_test.go:186 - should be false) - TestAPILFSUpload/AlreadyExistsInStore (api_repo_lfs_test.go:360 - should be false) - TestMirrorPush (mirror_push_test.go:51 - hould have 1 item(s), but has 2; mirror_push_test.go:54 - should be true) - TestCreateNewTagProtected/API (repo_tag_test.go:33, unexpected error)
non_priority
integration tests fail if lang is not gitea version to reproduce export lang de de utf make test sqlite expected they should pass affected tests testapilfsbatch download metanotfound api repo lfs test go should be false testapilfsupload alreadyexistsinstore api repo lfs test go should be false testmirrorpush mirror push test go hould have item s but has mirror push test go should be true testcreatenewtagprotected api repo tag test go unexpected error
0
130,972
18,214,366,228
IssuesEvent
2021-09-30 01:02:56
brogers588/netflix_conductor_fork
https://api.github.com/repos/brogers588/netflix_conductor_fork
opened
CVE-2021-37136 (High) detected in multiple libraries
security vulnerability
## CVE-2021-37136 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-codec-4.1.41.Final.jar</b>, <b>netty-codec-4.1.27.Final.jar</b>, <b>netty-codec-4.1.32.Final.jar</b>, <b>netty-codec-4.1.13.Final.jar</b>, <b>netty-codec-4.0.56.Final.jar</b></p></summary> <p> <details><summary><b>netty-codec-4.1.41.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/redis-lock/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.41.Final/d2dceabcd4097d068a318e24542897d455b0729b/netty-codec-4.1.41.Final.jar</p> <p> Dependency Hierarchy: - redisson-3.11.4.jar (Root Library) - netty-handler-4.1.41.Final.jar - :x: **netty-codec-4.1.41.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.1.27.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/grpc-client/build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua_20210708151457_ISTDYJ/downloadResource_GJPGFO/20210708154202/netty-codec-4.1.27.Final.jar</p> <p> Dependency Hierarchy: - grpc-netty-1.14.0.jar (Root Library) - netty-handler-proxy-4.1.27.Final.jar - netty-codec-socks-4.1.27.Final.jar - :x: **netty-codec-4.1.27.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.1.32.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/es6-persistence/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.32.Final/8f32bd79c5a16f014a4372ed979dc62b39ede33a/netty-codec-4.1.32.Final.jar</p> <p> Dependency Hierarchy: - transport-6.8.12.jar (Root Library) - transport-netty4-client-6.8.12.jar - :x: **netty-codec-4.1.32.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.1.13.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/es5-persistence/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.13.Final/370eeb6e9d92495a2a3be096ab6102755af76730/netty-codec-4.1.13.Final.jar</p> <p> Dependency Hierarchy: - transport-5.6.8.jar (Root Library) - transport-netty4-client-5.6.8.jar - :x: **netty-codec-4.1.13.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.0.56.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/cassandra-persistence/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.0.56.Final/bd9ecf1cf3721bbedfd2fb0c52d4f56803ff270d/netty-codec-4.0.56.Final.jar</p> <p> Dependency Hierarchy: - cassandra-driver-core-3.6.0.jar (Root Library) - netty-handler-4.0.56.Final.jar - :x: **netty-codec-4.0.56.Final.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack <p>Publish Date: 2021-07-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136>CVE-2021-37136</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-grg4-wf29-r9vv">https://github.com/advisories/GHSA-grg4-wf29-r9vv</a></p> <p>Release Date: 2021-07-21</p> <p>Fix Resolution: io.netty:netty-codec:4.1.68.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.41.Final","packageFilePaths":["/redis-lock/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.redisson:redisson:3.11.4;io.netty:netty-handler:4.1.41.Final;io.netty:netty-codec:4.1.41.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.27.Final","packageFilePaths":["/grpc-client/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.grpc:grpc-netty:1.14.0;io.netty:netty-handler-proxy:4.1.27.Final;io.netty:netty-codec-socks:4.1.27.Final;io.netty:netty-codec:4.1.27.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.32.Final","packageFilePaths":["/es6-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:6.8.12;org.elasticsearch.plugin:transport-netty4-client:6.8.12;io.netty:netty-codec:4.1.32.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.13.Final","packageFilePaths":["/es5-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:5.6.8;org.elasticsearch.plugin:transport-netty4-client:5.6.8;io.netty:netty-codec:4.1.13.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.0.56.Final","packageFilePaths":["/cassandra-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"com.datastax.cassandra:cassandra-driver-core:3.6.0;io.netty:netty-handler:4.0.56.Final;io.netty:netty-codec:4.0.56.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-37136","vulnerabilityDetails":"The Bzip2 decompression decoder function doesn\u0027t allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).\n\nAll users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-37136 (High) detected in multiple libraries - ## CVE-2021-37136 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-codec-4.1.41.Final.jar</b>, <b>netty-codec-4.1.27.Final.jar</b>, <b>netty-codec-4.1.32.Final.jar</b>, <b>netty-codec-4.1.13.Final.jar</b>, <b>netty-codec-4.0.56.Final.jar</b></p></summary> <p> <details><summary><b>netty-codec-4.1.41.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/redis-lock/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.41.Final/d2dceabcd4097d068a318e24542897d455b0729b/netty-codec-4.1.41.Final.jar</p> <p> Dependency Hierarchy: - redisson-3.11.4.jar (Root Library) - netty-handler-4.1.41.Final.jar - :x: **netty-codec-4.1.41.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.1.27.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/grpc-client/build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua_20210708151457_ISTDYJ/downloadResource_GJPGFO/20210708154202/netty-codec-4.1.27.Final.jar</p> <p> Dependency Hierarchy: - grpc-netty-1.14.0.jar (Root Library) - netty-handler-proxy-4.1.27.Final.jar - netty-codec-socks-4.1.27.Final.jar - :x: **netty-codec-4.1.27.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.1.32.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/es6-persistence/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.32.Final/8f32bd79c5a16f014a4372ed979dc62b39ede33a/netty-codec-4.1.32.Final.jar</p> <p> Dependency Hierarchy: - transport-6.8.12.jar (Root Library) - transport-netty4-client-6.8.12.jar - :x: **netty-codec-4.1.32.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.1.13.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/es5-persistence/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.13.Final/370eeb6e9d92495a2a3be096ab6102755af76730/netty-codec-4.1.13.Final.jar</p> <p> Dependency Hierarchy: - transport-5.6.8.jar (Root Library) - transport-netty4-client-5.6.8.jar - :x: **netty-codec-4.1.13.Final.jar** (Vulnerable Library) </details> <details><summary><b>netty-codec-4.0.56.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to dependency file: netflix_conductor_fork/cassandra-persistence/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.0.56.Final/bd9ecf1cf3721bbedfd2fb0c52d4f56803ff270d/netty-codec-4.0.56.Final.jar</p> <p> Dependency Hierarchy: - cassandra-driver-core-3.6.0.jar (Root Library) - netty-handler-4.0.56.Final.jar - :x: **netty-codec-4.0.56.Final.jar** (Vulnerable Library) </details> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression). All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack <p>Publish Date: 2021-07-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136>CVE-2021-37136</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-grg4-wf29-r9vv">https://github.com/advisories/GHSA-grg4-wf29-r9vv</a></p> <p>Release Date: 2021-07-21</p> <p>Fix Resolution: io.netty:netty-codec:4.1.68.Final</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.41.Final","packageFilePaths":["/redis-lock/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.redisson:redisson:3.11.4;io.netty:netty-handler:4.1.41.Final;io.netty:netty-codec:4.1.41.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.27.Final","packageFilePaths":["/grpc-client/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.grpc:grpc-netty:1.14.0;io.netty:netty-handler-proxy:4.1.27.Final;io.netty:netty-codec-socks:4.1.27.Final;io.netty:netty-codec:4.1.27.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.32.Final","packageFilePaths":["/es6-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:6.8.12;org.elasticsearch.plugin:transport-netty4-client:6.8.12;io.netty:netty-codec:4.1.32.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.13.Final","packageFilePaths":["/es5-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:5.6.8;org.elasticsearch.plugin:transport-netty4-client:5.6.8;io.netty:netty-codec:4.1.13.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.0.56.Final","packageFilePaths":["/cassandra-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"com.datastax.cassandra:cassandra-driver-core:3.6.0;io.netty:netty-handler:4.0.56.Final;io.netty:netty-codec:4.0.56.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-37136","vulnerabilityDetails":"The Bzip2 decompression decoder function doesn\u0027t allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).\n\nAll users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries netty codec final jar netty codec final jar netty codec final jar netty codec final jar netty codec final jar netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork redis lock build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy redisson jar root library netty handler final jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork grpc client build gradle path to vulnerable library tmp ws ua istdyj downloadresource gjpgfo netty codec final jar dependency hierarchy grpc netty jar root library netty handler proxy final jar netty codec socks final jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy transport jar root library transport client jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy transport jar root library transport client jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork cassandra persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy cassandra driver core jar root library netty handler final jar x netty codec final jar vulnerable library found in base branch master vulnerability details the decompression decoder function doesn t allow setting size restrictions on the decompressed output data which affects the allocation size used during decompression all users of are affected the malicious input can trigger an oome and so a dos attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io netty netty codec final isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org redisson redisson io netty netty handler final io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree io grpc grpc netty io netty netty handler proxy final io netty netty codec socks final io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree org elasticsearch client transport org elasticsearch plugin transport client io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree org elasticsearch client transport org elasticsearch plugin transport client io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree com datastax cassandra cassandra driver core io netty netty handler final io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final basebranches vulnerabilityidentifier cve vulnerabilitydetails the decompression decoder function doesn allow setting size restrictions on the decompressed output data which affects the allocation size used during decompression n nall users of are affected the malicious input can trigger an oome and so a dos attack vulnerabilityurl
0
100,470
8,744,467,747
IssuesEvent
2018-12-12 22:21:08
ampproject/amphtml
https://api.github.com/repos/ampproject/amphtml
closed
Fix broken tests 'should show the body in error test' in `test-errors.js`
P2: Soon Related to: Flaky Tests Type: Bug
This test brakes on multiple browsers in SauceLabs, and was disabled in #19782. Please triage and fix Disabled test: https://github.com/ampproject/amphtml/pull/19782/files#diff-5bd3d5b9ed366abf44094456feef5f6aR55
1.0
Fix broken tests 'should show the body in error test' in `test-errors.js` - This test brakes on multiple browsers in SauceLabs, and was disabled in #19782. Please triage and fix Disabled test: https://github.com/ampproject/amphtml/pull/19782/files#diff-5bd3d5b9ed366abf44094456feef5f6aR55
non_priority
fix broken tests should show the body in error test in test errors js this test brakes on multiple browsers in saucelabs and was disabled in please triage and fix disabled test
0
233,028
17,839,636,277
IssuesEvent
2021-09-03 08:23:02
facebookresearch/detectron2
https://api.github.com/repos/facebookresearch/detectron2
opened
Multi-Node distributed training with SLURM
documentation
Hi everybody, I'm wondering how can I run a distributed training on 2 machines from a cluster managed with SLURM? I read that you have to manually specify the machine rank when you run the `tools/train_net.py` script, but in my case it should be managed by SLURM. Somebody had the same issue? :smile:
1.0
Multi-Node distributed training with SLURM - Hi everybody, I'm wondering how can I run a distributed training on 2 machines from a cluster managed with SLURM? I read that you have to manually specify the machine rank when you run the `tools/train_net.py` script, but in my case it should be managed by SLURM. Somebody had the same issue? :smile:
non_priority
multi node distributed training with slurm hi everybody i m wondering how can i run a distributed training on machines from a cluster managed with slurm i read that you have to manually specify the machine rank when you run the tools train net py script but in my case it should be managed by slurm somebody had the same issue smile
0
5,307
3,198,481,697
IssuesEvent
2015-10-01 12:31:23
owncloud/gallery
https://api.github.com/repos/owncloud/gallery
closed
Add images located on external storage if we already have a thumbnail
coder wanted enhancement
This might slow down the initial discovery operation, but it could be possible to check the thumbnails cache to see if we already have the max preview. If we do, we could show the image despite the fact that it's located on external storage. <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/10786486-add-images-located-on-external-storage-if-we-already-have-a-thumbnail?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github). </bountysource-plugin>
1.0
Add images located on external storage if we already have a thumbnail - This might slow down the initial discovery operation, but it could be possible to check the thumbnails cache to see if we already have the max preview. If we do, we could show the image despite the fact that it's located on external storage. <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/10786486-add-images-located-on-external-storage-if-we-already-have-a-thumbnail?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github). </bountysource-plugin>
non_priority
add images located on external storage if we already have a thumbnail this might slow down the initial discovery operation but it could be possible to check the thumbnails cache to see if we already have the max preview if we do we could show the image despite the fact that it s located on external storage want to back this issue we accept bounties via
0
43,172
5,581,534,855
IssuesEvent
2017-03-28 19:05:15
gustafl/youtube-blacklist-chrome-extension
https://api.github.com/repos/gustafl/youtube-blacklist-chrome-extension
opened
Show a live data stream on the web page
design future
Because it's fun and attractive. Ideally, we want to get the images from YouTube too. Websockets is probably the technology I need to learn for this.
1.0
Show a live data stream on the web page - Because it's fun and attractive. Ideally, we want to get the images from YouTube too. Websockets is probably the technology I need to learn for this.
non_priority
show a live data stream on the web page because it s fun and attractive ideally we want to get the images from youtube too websockets is probably the technology i need to learn for this
0
98,460
12,325,529,452
IssuesEvent
2020-05-13 15:10:52
department-of-veterans-affairs/va.gov-cms
https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms
closed
Iteration on Assignments wireframes, pre-usability testing
Design Research ⭐️ Content ops
## Description ## Acceptance Criteria * Wireframe prototype is ready for user testing
1.0
Iteration on Assignments wireframes, pre-usability testing - ## Description ## Acceptance Criteria * Wireframe prototype is ready for user testing
non_priority
iteration on assignments wireframes pre usability testing description acceptance criteria wireframe prototype is ready for user testing
0
312,715
26,873,909,894
IssuesEvent
2023-02-04 20:13:19
MPMG-DCC-UFMG/F01
https://api.github.com/repos/MPMG-DCC-UFMG/F01
closed
Teste de generalizacao para a tag Informações Institucionais - Leis Municipais - Santana do Riacho
generalization test development template - Síntese tecnologia e informatica (88) tag - Informações Institucionais subtag - Leis Municipais
DoD: Realizar o teste de Generalização do validador da tag Informações Institucionais - Leis Municipais para o Município de Santana do Riacho.
1.0
Teste de generalizacao para a tag Informações Institucionais - Leis Municipais - Santana do Riacho - DoD: Realizar o teste de Generalização do validador da tag Informações Institucionais - Leis Municipais para o Município de Santana do Riacho.
non_priority
teste de generalizacao para a tag informações institucionais leis municipais santana do riacho dod realizar o teste de generalização do validador da tag informações institucionais leis municipais para o município de santana do riacho
0
47,193
10,053,105,797
IssuesEvent
2019-07-21 14:08:30
chungwei/imiao
https://api.github.com/repos/chungwei/imiao
opened
LeetCode-217. 存在重复元素
LeetCode
原文链接 [217. 存在重复元素](https://leetcode-cn.com/problems/contains-duplicate/) ```go func containsDuplicate(nums []int) bool { m := make(map[int]int) for _, v := range nums { if _, ok := m[v]; ok { return true } m[v]++ } return false } ```
1.0
LeetCode-217. 存在重复元素 - 原文链接 [217. 存在重复元素](https://leetcode-cn.com/problems/contains-duplicate/) ```go func containsDuplicate(nums []int) bool { m := make(map[int]int) for _, v := range nums { if _, ok := m[v]; ok { return true } m[v]++ } return false } ```
non_priority
leetcode 存在重复元素 原文链接 go func containsduplicate nums int bool m make map int for v range nums if ok m ok return true m return false
0
262,971
27,989,595,348
IssuesEvent
2023-03-27 01:45:28
samq-ghdemo/apache-logging-log4j-kotlin
https://api.github.com/repos/samq-ghdemo/apache-logging-log4j-kotlin
opened
CVE-2020-29582 (Medium) detected in kotlin-stdlib-1.3.72.jar
Mend: dependency security vulnerability
## CVE-2020-29582 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kotlin-stdlib-1.3.72.jar</b></p></summary> <p>Kotlin Standard Library for JVM</p> <p>Library home page: <a href="https://kotlinlang.org/">https://kotlinlang.org/</a></p> <p>Path to dependency file: /log4j-api-kotlin/pom.xml</p> <p>Path to vulnerable library: /tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar</p> <p> Dependency Hierarchy: - :x: **kotlin-stdlib-1.3.72.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/apache-logging-log4j-kotlin/commit/347374860a480afb0a67d8f053795cb2a2920d88">347374860a480afb0a67d8f053795cb2a2920d88</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions. <p>Publish Date: 2021-02-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-29582>CVE-2020-29582</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-cqj8-47ch-rvvq">https://github.com/advisories/GHSA-cqj8-47ch-rvvq</a></p> <p>Release Date: 2021-02-03</p> <p>Fix Resolution: 1.4.21</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
True
CVE-2020-29582 (Medium) detected in kotlin-stdlib-1.3.72.jar - ## CVE-2020-29582 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kotlin-stdlib-1.3.72.jar</b></p></summary> <p>Kotlin Standard Library for JVM</p> <p>Library home page: <a href="https://kotlinlang.org/">https://kotlinlang.org/</a></p> <p>Path to dependency file: /log4j-api-kotlin/pom.xml</p> <p>Path to vulnerable library: /tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar</p> <p> Dependency Hierarchy: - :x: **kotlin-stdlib-1.3.72.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/apache-logging-log4j-kotlin/commit/347374860a480afb0a67d8f053795cb2a2920d88">347374860a480afb0a67d8f053795cb2a2920d88</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions. <p>Publish Date: 2021-02-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-29582>CVE-2020-29582</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-cqj8-47ch-rvvq">https://github.com/advisories/GHSA-cqj8-47ch-rvvq</a></p> <p>Release Date: 2021-02-03</p> <p>Fix Resolution: 1.4.21</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
non_priority
cve medium detected in kotlin stdlib jar cve medium severity vulnerability vulnerable library kotlin stdlib jar kotlin standard library for jvm library home page a href path to dependency file api kotlin pom xml path to vulnerable library tbrains kotlin kotlin stdlib kotlin stdlib jar tbrains kotlin kotlin stdlib kotlin stdlib jar tbrains kotlin kotlin stdlib kotlin stdlib jar dependency hierarchy x kotlin stdlib jar vulnerable library found in head commit a href found in base branch main vulnerability details in jetbrains kotlin before a vulnerable java api was used for temporary file and folder creation an attacker was able to read data from such files and list directories due to insecure permissions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue
0
6,491
3,398,444,727
IssuesEvent
2015-12-02 03:50:17
ProjectFacet/facet
https://api.github.com/repos/ProjectFacet/facet
opened
Series
code
A user can view all series of any status that's current. Series are organized by creation date. Meta information about a series should be available in the display or through a modal window or popover. **View:** Create a view to return series. **Template:** Create a template to display a series.
1.0
Series - A user can view all series of any status that's current. Series are organized by creation date. Meta information about a series should be available in the display or through a modal window or popover. **View:** Create a view to return series. **Template:** Create a template to display a series.
non_priority
series a user can view all series of any status that s current series are organized by creation date meta information about a series should be available in the display or through a modal window or popover view create a view to return series template create a template to display a series
0
167,838
20,726,426,016
IssuesEvent
2022-03-14 02:51:43
valdisiljuconoks/FeatureSwitch
https://api.github.com/repos/valdisiljuconoks/FeatureSwitch
opened
CVE-2020-28500 (Medium) detected in lodash-2.4.2.tgz
security vulnerability
## CVE-2020-28500 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary> <p>A utility library delivering consistency, customization, performance, & extras.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p> <p>Path to dependency file: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json</p> <p>Path to vulnerable library: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - intern-geezer-2.2.3.tgz (Root Library) - digdug-1.4.0.tgz - decompress-0.2.3.tgz - map-key-0.1.5.tgz - :x: **lodash-2.4.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. WhiteSource Note: After conducting further research, WhiteSource has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution: lodash - 4.17.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-28500 (Medium) detected in lodash-2.4.2.tgz - ## CVE-2020-28500 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary> <p>A utility library delivering consistency, customization, performance, & extras.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p> <p>Path to dependency file: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json</p> <p>Path to vulnerable library: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - intern-geezer-2.2.3.tgz (Root Library) - digdug-1.4.0.tgz - decompress-0.2.3.tgz - map-key-0.1.5.tgz - :x: **lodash-2.4.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions. WhiteSource Note: After conducting further research, WhiteSource has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash. <p>Publish Date: 2021-02-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p> <p>Release Date: 2021-02-15</p> <p>Fix Resolution: lodash - 4.17.21</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz a utility library delivering consistency customization performance extras library home page a href path to dependency file episample modules protected shell shell clientresources lib xstyle package json path to vulnerable library episample modules protected shell shell clientresources lib xstyle node modules lodash package json dependency hierarchy intern geezer tgz root library digdug tgz decompress tgz map key tgz x lodash tgz vulnerable library vulnerability details lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions whitesource note after conducting further research whitesource has determined that cve only affects environments with versions to of lodash publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource
0
57,783
14,217,865,708
IssuesEvent
2020-11-17 10:57:40
SAP/spartacus
https://api.github.com/repos/SAP/spartacus
closed
Cannot remove coupon if the coupon code is ".."
backend-dependency fellows-friendly security
Cannot remove coupon if the coupon code is ".." ## Environment Details - Spartacus: development environment - Browser: Chrome 76.0.3809.132 - OS: macOS Mojave 10.14.6 - Device: macbook ## Steps to Reproduce 1. Create a coupon with code ".." 2. Apply this coupon to a cart 3. Remove this coupon from cart ## Observed Results Cart is deleted ## Expected Results The coupon is deleted ## Offer to Fix NO. ## Additional Information 1. It seems that the browser treat ".." as super path. The url should be XXXX/cart/cartid/voucher/.., but the url which browser sent out is XXXX/cart/cartid 2. When testing this via Swagger UI, the cart will be deleted as well
True
Cannot remove coupon if the coupon code is ".." - Cannot remove coupon if the coupon code is ".." ## Environment Details - Spartacus: development environment - Browser: Chrome 76.0.3809.132 - OS: macOS Mojave 10.14.6 - Device: macbook ## Steps to Reproduce 1. Create a coupon with code ".." 2. Apply this coupon to a cart 3. Remove this coupon from cart ## Observed Results Cart is deleted ## Expected Results The coupon is deleted ## Offer to Fix NO. ## Additional Information 1. It seems that the browser treat ".." as super path. The url should be XXXX/cart/cartid/voucher/.., but the url which browser sent out is XXXX/cart/cartid 2. When testing this via Swagger UI, the cart will be deleted as well
non_priority
cannot remove coupon if the coupon code is cannot remove coupon if the coupon code is environment details spartacus development environment browser chrome os macos mojave device macbook steps to reproduce create a coupon with code apply this coupon to a cart remove this coupon from cart observed results cart is deleted expected results the coupon is deleted offer to fix no additional information it seems that the browser treat as super path the url should be xxxx cart cartid voucher but the url which browser sent out is xxxx cart cartid when testing this via swagger ui the cart will be deleted as well
0
326,027
24,070,421,896
IssuesEvent
2022-09-18 04:32:57
jupyterlite/demo
https://api.github.com/repos/jupyterlite/demo
closed
pre-install pure python package in static html site
documentation
### Problem Not sure if this is possible but I could not figure how to pre-install a pure python package on my jupyterlite static html site. The example is here: https://marcocaggioni.github.io/rheolite/lab/index.html in the notebook the first cell is to micropip install lmfit which works fine but takes some time: ```python import micropip await micropip.install('lmfit') ``` ### Suggested Improvement If not yet there and if possible would be nice to have in the documentation a section explaining how to pre-install packages thanks!
1.0
pre-install pure python package in static html site - ### Problem Not sure if this is possible but I could not figure how to pre-install a pure python package on my jupyterlite static html site. The example is here: https://marcocaggioni.github.io/rheolite/lab/index.html in the notebook the first cell is to micropip install lmfit which works fine but takes some time: ```python import micropip await micropip.install('lmfit') ``` ### Suggested Improvement If not yet there and if possible would be nice to have in the documentation a section explaining how to pre-install packages thanks!
non_priority
pre install pure python package in static html site problem not sure if this is possible but i could not figure how to pre install a pure python package on my jupyterlite static html site the example is here in the notebook the first cell is to micropip install lmfit which works fine but takes some time python import micropip await micropip install lmfit suggested improvement if not yet there and if possible would be nice to have in the documentation a section explaining how to pre install packages thanks
0
350,175
24,971,792,036
IssuesEvent
2022-11-02 02:20:15
Nuclei-Software/nuclei-linux-sdk
https://api.github.com/repos/Nuclei-Software/nuclei-linux-sdk
opened
opensbi boot traped with a lot of sbi_trap_error
documentation
## Issue Description and Solution As image below described: ![099f64a0-5dc2-4bfc-b43b-518eed8c9f73](https://user-images.githubusercontent.com/1538922/199377600-cf2a9b5c-5d56-4424-9f4a-22cf3af75666.png) You can see `mcause = 0x7, mtval = 0x08000000` mcause check riscv privilege manual is **Store/AMO access fault**, ![image](https://user-images.githubusercontent.com/1538922/199377927-4976c1cd-0db5-4e27-aef7-b1707ec05b27.png) mtval means whether the store access fault happened, which is 0x08000000, it is the previous Nuclei DemoSoC using cpu without iregion feature(iregion feature reallocate plic/timer base address). - nuclei cpu in demosoc without iregion: plic0: interrupt-controller@8000000 - nuclei cpu in evalsoc with iregion: plic0: interrupt-controller@1c000000 See https://github.com/Nuclei-Software/nuclei-linux-sdk#modify-build-configuration about evalsoc/demosoc. So the answer is change the SOC from demosoc to evalsoc. For example, you want to test ux900fd, then build with the following command. ~~~shell make SOC=evalsoc CORE=ux900fd freeloader make SOC=evalsoc CORE=ux900fd bootimages ~~~ ## Known issues currently evalsoc can't run in qemu, if you really want to run in qemu, please change the evalsoc dts you are using like this. > Caused by plic/timer base address changed. > If you changed this, opensbi will not run on your hardware, please remember change it back. ~~~diff index b04d0a2..947d56c 100644 --- a/conf/evalsoc/nuclei_rv64imafdc.dts +++ b/conf/evalsoc/nuclei_rv64imafdc.dts @@ -171,7 +171,7 @@ clock-output-names = "hfclk"; }; - plic0: interrupt-controller@1c000000 { + plic0: interrupt-controller@8000000 { #interrupt-cells = <1>; compatible = "riscv,plic0"; interrupt-controller; @@ -185,13 +185,13 @@ &cpu5_intc 11 &cpu5_intc 9 &cpu6_intc 11 &cpu6_intc 9 &cpu7_intc 11 &cpu7_intc 9>; - reg = <0x0 0x1c000000 0x0 0x4000000>; + reg = <0x0 0x8000000 0x0 0x4000000>; }; - clint0: clint@18031000 { + clint0: clint@2001000 { #interrupt-cells = <1>; compatible = "riscv,clint0"; - reg = <0x0 0x18031000 0x0 0xC000>; + reg = <0x0 0x2001000 0x0 0xC000>; interrupts-extended = <&cpu0_intc 3 &cpu0_intc 7 &cpu1_intc 3 &cpu1_intc 7 ~~~
1.0
opensbi boot traped with a lot of sbi_trap_error - ## Issue Description and Solution As image below described: ![099f64a0-5dc2-4bfc-b43b-518eed8c9f73](https://user-images.githubusercontent.com/1538922/199377600-cf2a9b5c-5d56-4424-9f4a-22cf3af75666.png) You can see `mcause = 0x7, mtval = 0x08000000` mcause check riscv privilege manual is **Store/AMO access fault**, ![image](https://user-images.githubusercontent.com/1538922/199377927-4976c1cd-0db5-4e27-aef7-b1707ec05b27.png) mtval means whether the store access fault happened, which is 0x08000000, it is the previous Nuclei DemoSoC using cpu without iregion feature(iregion feature reallocate plic/timer base address). - nuclei cpu in demosoc without iregion: plic0: interrupt-controller@8000000 - nuclei cpu in evalsoc with iregion: plic0: interrupt-controller@1c000000 See https://github.com/Nuclei-Software/nuclei-linux-sdk#modify-build-configuration about evalsoc/demosoc. So the answer is change the SOC from demosoc to evalsoc. For example, you want to test ux900fd, then build with the following command. ~~~shell make SOC=evalsoc CORE=ux900fd freeloader make SOC=evalsoc CORE=ux900fd bootimages ~~~ ## Known issues currently evalsoc can't run in qemu, if you really want to run in qemu, please change the evalsoc dts you are using like this. > Caused by plic/timer base address changed. > If you changed this, opensbi will not run on your hardware, please remember change it back. ~~~diff index b04d0a2..947d56c 100644 --- a/conf/evalsoc/nuclei_rv64imafdc.dts +++ b/conf/evalsoc/nuclei_rv64imafdc.dts @@ -171,7 +171,7 @@ clock-output-names = "hfclk"; }; - plic0: interrupt-controller@1c000000 { + plic0: interrupt-controller@8000000 { #interrupt-cells = <1>; compatible = "riscv,plic0"; interrupt-controller; @@ -185,13 +185,13 @@ &cpu5_intc 11 &cpu5_intc 9 &cpu6_intc 11 &cpu6_intc 9 &cpu7_intc 11 &cpu7_intc 9>; - reg = <0x0 0x1c000000 0x0 0x4000000>; + reg = <0x0 0x8000000 0x0 0x4000000>; }; - clint0: clint@18031000 { + clint0: clint@2001000 { #interrupt-cells = <1>; compatible = "riscv,clint0"; - reg = <0x0 0x18031000 0x0 0xC000>; + reg = <0x0 0x2001000 0x0 0xC000>; interrupts-extended = <&cpu0_intc 3 &cpu0_intc 7 &cpu1_intc 3 &cpu1_intc 7 ~~~
non_priority
opensbi boot traped with a lot of sbi trap error issue description and solution as image below described you can see mcause mtval mcause check riscv privilege manual is store amo access fault mtval means whether the store access fault happened which is it is the previous nuclei demosoc using cpu without iregion feature iregion feature reallocate plic timer base address nuclei cpu in demosoc without iregion interrupt controller nuclei cpu in evalsoc with iregion interrupt controller see about evalsoc demosoc so the answer is change the soc from demosoc to evalsoc for example you want to test then build with the following command shell make soc evalsoc core freeloader make soc evalsoc core bootimages known issues currently evalsoc can t run in qemu if you really want to run in qemu please change the evalsoc dts you are using like this caused by plic timer base address changed if you changed this opensbi will not run on your hardware please remember change it back diff index a conf evalsoc nuclei dts b conf evalsoc nuclei dts clock output names hfclk interrupt controller interrupt controller interrupt cells compatible riscv interrupt controller intc intc intc intc intc intc reg reg clint clint interrupt cells compatible riscv reg reg interrupts extended intc intc intc intc
0
29,281
23,875,910,808
IssuesEvent
2022-09-07 19:02:10
accessibility-exchange/platform
https://api.github.com/repos/accessibility-exchange/platform
closed
File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923...
help wanted infrastructure
**`Illuminate\Contracts\Filesystem\FileNotFoundException`** File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923b3.php. :dart: Illuminate\Filesystem\Filesystem::getRequire :page_facing_up: /app/vendor/laravel/framework/src/Illuminate/Filesystem/Filesystem.php ```php 109 } 110 111* throw new FileNotFoundException("File does not exist at path {$path}."); 112 } 113 ``` [Open in Flare](https://flareapp.io/errors/1495843/latest)
1.0
File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923... - **`Illuminate\Contracts\Filesystem\FileNotFoundException`** File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923b3.php. :dart: Illuminate\Filesystem\Filesystem::getRequire :page_facing_up: /app/vendor/laravel/framework/src/Illuminate/Filesystem/Filesystem.php ```php 109 } 110 111* throw new FileNotFoundException("File does not exist at path {$path}."); 112 } 113 ``` [Open in Flare](https://flareapp.io/errors/1495843/latest)
non_priority
file does not exist at path opt data storage framework views illuminate contracts filesystem filenotfoundexception file does not exist at path opt data storage framework views php dart illuminate filesystem filesystem getrequire page facing up app vendor laravel framework src illuminate filesystem filesystem php php throw new filenotfoundexception file does not exist at path path
0
68,424
13,129,893,590
IssuesEvent
2020-08-06 14:34:10
Abbassihraf/P-curiosity-LAB
https://api.github.com/repos/Abbassihraf/P-curiosity-LAB
opened
Popups what we offer section
Code In progress home_page
> ### Desktop **To Rural Communities** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To idea-holders** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To business** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To researchers & scientifics** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing > ### Tablet **To Rural Communities** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To idea-holders** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To business** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To researchers & scientifics** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing `### Mobile` **To Rural Communities** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To idea-holders** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To business** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To researchers & scientifics** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing
1.0
Popups what we offer section - > ### Desktop **To Rural Communities** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To idea-holders** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To business** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To researchers & scientifics** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing > ### Tablet **To Rural Communities** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To idea-holders** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To business** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To researchers & scientifics** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing `### Mobile` **To Rural Communities** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To idea-holders** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To business** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing **To researchers & scientifics** - [ ] Popup markup - [ ] Popup styling - [ ] Popup testing
non_priority
popups what we offer section desktop to rural communities popup markup popup styling popup testing to idea holders popup markup popup styling popup testing to business popup markup popup styling popup testing to researchers scientifics popup markup popup styling popup testing tablet to rural communities popup markup popup styling popup testing to idea holders popup markup popup styling popup testing to business popup markup popup styling popup testing to researchers scientifics popup markup popup styling popup testing mobile to rural communities popup markup popup styling popup testing to idea holders popup markup popup styling popup testing to business popup markup popup styling popup testing to researchers scientifics popup markup popup styling popup testing
0
175,298
14,522,809,352
IssuesEvent
2020-12-14 09:18:19
fweik/nrng
https://api.github.com/repos/fweik/nrng
closed
State Goals
documentation
Update the documentation to state what the goals of the library are. So far planned 1. Range and constrained versions of the stl numerics algorithms 2. Additional numeric algorithms like weighted sums, statistical moments, ... Maybe 3. Parallel versions 4. Integrations of `std::experimenta::simd`. Ideas are welcome.
1.0
State Goals - Update the documentation to state what the goals of the library are. So far planned 1. Range and constrained versions of the stl numerics algorithms 2. Additional numeric algorithms like weighted sums, statistical moments, ... Maybe 3. Parallel versions 4. Integrations of `std::experimenta::simd`. Ideas are welcome.
non_priority
state goals update the documentation to state what the goals of the library are so far planned range and constrained versions of the stl numerics algorithms additional numeric algorithms like weighted sums statistical moments maybe parallel versions integrations of std experimenta simd ideas are welcome
0
73,513
9,668,962,656
IssuesEvent
2019-05-21 16:12:06
itechub/jane
https://api.github.com/repos/itechub/jane
closed
Add prefix to environment variables
backend documentation refactor
In order to avoid collisions with OS environment variables, rename these variables by adding a `JANE_` prefix. ``` export SECRET_KEY='z1q=7ixu5&o=2lj05uziiemvhi)!z1-d9fwmyo(sqsyzpvg2u_' export USERNAME='root' export PASSWORD='123456' export NAME='jane' export HOST='localhost' export PORT=3306 export DEBUG=Ture # sentry 用于辅助追踪生产环境运行时错误 export SENTRY='https://......' ``` - [x] variables in `settings.py` - [x] variables in backend's `README.md` - [x] variables in docker
1.0
Add prefix to environment variables - In order to avoid collisions with OS environment variables, rename these variables by adding a `JANE_` prefix. ``` export SECRET_KEY='z1q=7ixu5&o=2lj05uziiemvhi)!z1-d9fwmyo(sqsyzpvg2u_' export USERNAME='root' export PASSWORD='123456' export NAME='jane' export HOST='localhost' export PORT=3306 export DEBUG=Ture # sentry 用于辅助追踪生产环境运行时错误 export SENTRY='https://......' ``` - [x] variables in `settings.py` - [x] variables in backend's `README.md` - [x] variables in docker
non_priority
add prefix to environment variables in order to avoid collisions with os environment variables rename these variables by adding a jane prefix export secret key o export username root export password export name jane export host localhost export port export debug ture sentry 用于辅助追踪生产环境运行时错误 export sentry variables in settings py variables in backend s readme md variables in docker
0
334,543
24,423,504,963
IssuesEvent
2022-10-05 23:05:18
aws/aws-sdk-java-v2
https://api.github.com/repos/aws/aws-sdk-java-v2
closed
"IN" Statement doesn't work with StringSet
service-api documentation service:dynamodb
## Describe the bug We are trying to do a query with a `IN` Statement and setting a StringSet in Query Expression e.g.: ``` --filter-expression 'field1 IN (:fieldList)' --expression-attribute-values '{":fieldList": {"SS":["value1", "value2"]}}' ``` Documentation isn't clear about this scenario ## Expected Behavior The Query to actually return some values ## Current Behavior We need to manually set value1 and value2 as variables, e.g.: ``` --filter-expression 'field1 IN (:fieldValue1,:fieldValue2)' --expression-attribute-values '{":fieldValue1": {"S":"value1"}, ":fieldValue2": {"S":":value2"}}' ``` ## Steps to Reproduce See Description ## Possible Solution I believe it's DynamoDb backend related ## Context <!--- How has this issue affected you? What are you trying to accomplish? --> We are trying to execute a query ## Your Environment <!--- Include as many relevant details about the environment where the bug was discovered --> * AWS Java SDK version used: 2.15.63 * JDK version used: 11 * Operating System and version: N/A
1.0
"IN" Statement doesn't work with StringSet - ## Describe the bug We are trying to do a query with a `IN` Statement and setting a StringSet in Query Expression e.g.: ``` --filter-expression 'field1 IN (:fieldList)' --expression-attribute-values '{":fieldList": {"SS":["value1", "value2"]}}' ``` Documentation isn't clear about this scenario ## Expected Behavior The Query to actually return some values ## Current Behavior We need to manually set value1 and value2 as variables, e.g.: ``` --filter-expression 'field1 IN (:fieldValue1,:fieldValue2)' --expression-attribute-values '{":fieldValue1": {"S":"value1"}, ":fieldValue2": {"S":":value2"}}' ``` ## Steps to Reproduce See Description ## Possible Solution I believe it's DynamoDb backend related ## Context <!--- How has this issue affected you? What are you trying to accomplish? --> We are trying to execute a query ## Your Environment <!--- Include as many relevant details about the environment where the bug was discovered --> * AWS Java SDK version used: 2.15.63 * JDK version used: 11 * Operating System and version: N/A
non_priority
in statement doesn t work with stringset describe the bug we are trying to do a query with a in statement and setting a stringset in query expression e g filter expression in fieldlist expression attribute values fieldlist ss documentation isn t clear about this scenario expected behavior the query to actually return some values current behavior we need to manually set and as variables e g filter expression in expression attribute values s s steps to reproduce see description possible solution i believe it s dynamodb backend related context we are trying to execute a query your environment aws java sdk version used jdk version used operating system and version n a
0
63,712
15,707,410,440
IssuesEvent
2021-03-26 18:50:27
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
opened
Please help Conda package tensorflow for OSX
type:build/install
(I get that this is a weird thing to put in an issue) Right now it's hard for the Anaconda people to make conda packages of Tensorflow for OSX because of gcc-versus-clang issues: https://github.com/ContinuumIO/anaconda-issues/issues/11697 This is impacting downstream packages that want to use tensorflow, as we can't specify conda environments that come with tensorflow included; installing it with pip afterwards severely limits our ability to sanely package it. If you can spare the time to work this out with them, a lot of us who maintain downstream packages would really appreciate it.
1.0
Please help Conda package tensorflow for OSX - (I get that this is a weird thing to put in an issue) Right now it's hard for the Anaconda people to make conda packages of Tensorflow for OSX because of gcc-versus-clang issues: https://github.com/ContinuumIO/anaconda-issues/issues/11697 This is impacting downstream packages that want to use tensorflow, as we can't specify conda environments that come with tensorflow included; installing it with pip afterwards severely limits our ability to sanely package it. If you can spare the time to work this out with them, a lot of us who maintain downstream packages would really appreciate it.
non_priority
please help conda package tensorflow for osx i get that this is a weird thing to put in an issue right now it s hard for the anaconda people to make conda packages of tensorflow for osx because of gcc versus clang issues this is impacting downstream packages that want to use tensorflow as we can t specify conda environments that come with tensorflow included installing it with pip afterwards severely limits our ability to sanely package it if you can spare the time to work this out with them a lot of us who maintain downstream packages would really appreciate it
0
198,278
22,621,115,053
IssuesEvent
2022-06-30 06:26:51
ioana-nicolae/keycloak
https://api.github.com/repos/ioana-nicolae/keycloak
opened
CVE-2021-41973 (Medium) detected in mina-core-2.1.3.jar
security vulnerability
## CVE-2021-41973 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mina-core-2.1.3.jar</b></p></summary> <p>Apache MINA is a network application framework which helps users develop high performance and highly scalable network applications easily. It provides an abstract event-driven asynchronous API over various transports such as TCP/IP and UDP/IP via Java NIO.</p> <p>Library home page: <a href="https://mina.apache.org/">https://mina.apache.org/</a></p> <p>Path to dependency file: /testsuite/model/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar</p> <p> Dependency Hierarchy: - keycloak-util-embedded-ldap-13.0.0-SNAPSHOT.jar (Root Library) - apacheds-server-annotations-2.0.0.AM26.jar - :x: **mina-core-2.1.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ioana-nicolae/keycloak/commit/34eee947640ca637662cb41e649c6acf8b6d8c2e">34eee947640ca637662cb41e649c6acf8b6d8c2e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater. <p>Publish Date: 2021-11-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41973>CVE-2021-41973</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-6mcm-j9cj-3vc3">https://github.com/advisories/GHSA-6mcm-j9cj-3vc3</a></p> <p>Release Date: 2021-11-01</p> <p>Fix Resolution: org.apache.mina:mina-core:2.0.22,2.1.5</p> </p> </details> <p></p>
True
CVE-2021-41973 (Medium) detected in mina-core-2.1.3.jar - ## CVE-2021-41973 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mina-core-2.1.3.jar</b></p></summary> <p>Apache MINA is a network application framework which helps users develop high performance and highly scalable network applications easily. It provides an abstract event-driven asynchronous API over various transports such as TCP/IP and UDP/IP via Java NIO.</p> <p>Library home page: <a href="https://mina.apache.org/">https://mina.apache.org/</a></p> <p>Path to dependency file: /testsuite/model/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar</p> <p> Dependency Hierarchy: - keycloak-util-embedded-ldap-13.0.0-SNAPSHOT.jar (Root Library) - apacheds-server-annotations-2.0.0.AM26.jar - :x: **mina-core-2.1.3.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ioana-nicolae/keycloak/commit/34eee947640ca637662cb41e649c6acf8b6d8c2e">34eee947640ca637662cb41e649c6acf8b6d8c2e</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater. <p>Publish Date: 2021-11-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41973>CVE-2021-41973</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-6mcm-j9cj-3vc3">https://github.com/advisories/GHSA-6mcm-j9cj-3vc3</a></p> <p>Release Date: 2021-11-01</p> <p>Fix Resolution: org.apache.mina:mina-core:2.0.22,2.1.5</p> </p> </details> <p></p>
non_priority
cve medium detected in mina core jar cve medium severity vulnerability vulnerable library mina core jar apache mina is a network application framework which helps users develop high performance and highly scalable network applications easily it provides an abstract event driven asynchronous api over various transports such as tcp ip and udp ip via java nio library home page a href path to dependency file testsuite model pom xml path to vulnerable library home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar dependency hierarchy keycloak util embedded ldap snapshot jar root library apacheds server annotations jar x mina core jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache mina a specifically crafted malformed http request may cause the http header decoder to loop indefinitely the decoder assumed that the http header begins at the beginning of the buffer and loops if there is more data than expected please update mina to or greater publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache mina mina core
0
12,026
3,250,500,664
IssuesEvent
2015-10-19 00:51:23
photonstorm/phaser
https://api.github.com/repos/photonstorm/phaser
closed
With WebGL, adding child text to button renders text to other buttons
user to test
Creating multiple Phaser.Buttons and giving them Phaser.Text children will result in both the buttons and children to be rendered and subsequent labels to be rendered on previously created buttons. This problem is only reproducible when using WebGL (and not Canvas) as Phaser's renderer. This bug is seen as a regression between 2.4.3 and 2.4.4 (introduced by 99751a5). Example code: http://phaser.io/sandbox/rscQDbmR ``` function create() { var buttonStyle = { font: "32px Arial", fill: "#ffffff" }; var button1 = game.add.button( 0, 0 ); var buttonLabel1 = game.make.text( 0, 0, "Button1", buttonStyle ); button1.addChild( buttonLabel1 ); var button2 = game.add.button( 0, 32 ); var buttonLabel2 = game.make.text( 64, 256, "Button2", buttonStyle ); button2.addChild( buttonLabel2 ); var button3 = game.add.button( 0, 64 ); game.add.tween( button2.position ).to( { x: 256 }, 2500, Phaser.Easing.Linear.None, true ); //game.add.tween( buttonLabel2.position ).to( { y: 128 }, 1500, Phaser.Easing.Linear.None, true ); } ```
1.0
With WebGL, adding child text to button renders text to other buttons - Creating multiple Phaser.Buttons and giving them Phaser.Text children will result in both the buttons and children to be rendered and subsequent labels to be rendered on previously created buttons. This problem is only reproducible when using WebGL (and not Canvas) as Phaser's renderer. This bug is seen as a regression between 2.4.3 and 2.4.4 (introduced by 99751a5). Example code: http://phaser.io/sandbox/rscQDbmR ``` function create() { var buttonStyle = { font: "32px Arial", fill: "#ffffff" }; var button1 = game.add.button( 0, 0 ); var buttonLabel1 = game.make.text( 0, 0, "Button1", buttonStyle ); button1.addChild( buttonLabel1 ); var button2 = game.add.button( 0, 32 ); var buttonLabel2 = game.make.text( 64, 256, "Button2", buttonStyle ); button2.addChild( buttonLabel2 ); var button3 = game.add.button( 0, 64 ); game.add.tween( button2.position ).to( { x: 256 }, 2500, Phaser.Easing.Linear.None, true ); //game.add.tween( buttonLabel2.position ).to( { y: 128 }, 1500, Phaser.Easing.Linear.None, true ); } ```
non_priority
with webgl adding child text to button renders text to other buttons creating multiple phaser buttons and giving them phaser text children will result in both the buttons and children to be rendered and subsequent labels to be rendered on previously created buttons this problem is only reproducible when using webgl and not canvas as phaser s renderer this bug is seen as a regression between and introduced by example code function create var buttonstyle font arial fill ffffff var game add button var game make text buttonstyle addchild var game add button var game make text buttonstyle addchild var game add button game add tween position to x phaser easing linear none true game add tween position to y phaser easing linear none true
0
387,415
26,722,807,189
IssuesEvent
2023-01-29 10:51:01
PerimeterX/marshmallow
https://api.github.com/repos/PerimeterX/marshmallow
closed
Is there a way to marshal de JSON
documentation
Hi! I am looking for a way to read, modify and save a JSON of which I am only interested in part of its content. This package looks like it could be useful for the first two steps, but I'm not sure about the last one. Is there any way to do it? Either through the API of the package or in some recommended way. Thanks! (P.S. I tried to open a discussion instead of an issue but I can't do it)
1.0
Is there a way to marshal de JSON - Hi! I am looking for a way to read, modify and save a JSON of which I am only interested in part of its content. This package looks like it could be useful for the first two steps, but I'm not sure about the last one. Is there any way to do it? Either through the API of the package or in some recommended way. Thanks! (P.S. I tried to open a discussion instead of an issue but I can't do it)
non_priority
is there a way to marshal de json hi i am looking for a way to read modify and save a json of which i am only interested in part of its content this package looks like it could be useful for the first two steps but i m not sure about the last one is there any way to do it either through the api of the package or in some recommended way thanks p s i tried to open a discussion instead of an issue but i can t do it
0
74,598
20,250,091,212
IssuesEvent
2022-02-14 17:03:00
bottlerocket-os/bottlerocket-test-system
https://api.github.com/repos/bottlerocket-os/bottlerocket-test-system
closed
certificates missing in agents
bug resource-agent test-agent build
``` kubectl logs x86-64-aws-k8s-121-creation-s2h8k [2022-02-14T01:30:43Z INFO eks_resource_agent::eks_provider] Beginning creation of EKS cluster 'x86-64-aws-k8s-121' with creation policy 'Some(IfNotExists)' thread 'main' panicked at 'no CA certificates found', /src/.cargo/registry/src/github.com-1ecc6299db9ec823/hyper-rustls-0.22.1/src/connector.rs:45:13 note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace ```
1.0
certificates missing in agents - ``` kubectl logs x86-64-aws-k8s-121-creation-s2h8k [2022-02-14T01:30:43Z INFO eks_resource_agent::eks_provider] Beginning creation of EKS cluster 'x86-64-aws-k8s-121' with creation policy 'Some(IfNotExists)' thread 'main' panicked at 'no CA certificates found', /src/.cargo/registry/src/github.com-1ecc6299db9ec823/hyper-rustls-0.22.1/src/connector.rs:45:13 note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace ```
non_priority
certificates missing in agents kubectl logs aws creation beginning creation of eks cluster aws with creation policy some ifnotexists thread main panicked at no ca certificates found src cargo registry src github com hyper rustls src connector rs note run with rust backtrace environment variable to display a backtrace
0
84,919
10,421,311,023
IssuesEvent
2019-09-16 05:35:37
trevorld/r-optparse
https://api.github.com/repos/trevorld/r-optparse
closed
Throw error if short flag more than one character long
documentation
Hello, The opt list contains different values while executing a script by command-line (Rscript) versus RStudio. Here's the code: ``` #!/usr/bin/env Rscript suppressMessages(library('optparse')) options(show.error.locations = TRUE) #### ARGUMENTS #### option_list = list( make_option(c("-i","--input"), type="character", default=NULL, help="", metavar="character"), make_option(c("--output", "-o"), type="character", default=NULL, help="", metavar="character"), make_option(c("--bootstraps", "-b"), type="integer", default=1000, help="", metavar="integer"), make_option(c("--predictionsNumber", "-m"), type="integer", default=NULL, help="", metavar="integer"), make_option(c("--bootstrapsCI", "-c"), type="numeric", default=0.95, help="", metavar="numeric"), make_option(c("--CPU", "-p"), type="integer", default=4, help="", metavar="integer"), make_option(c("--wilcoxStartBin", "-wilcoxStart"), type="numeric", default=NULL, help="", metavar="numeric"), make_option(c("--wilcoxEndBin", "-wilcoxEnd"), type="numeric", default=NULL, help="", metavar="numeric"), make_option(c("--wilcoxThreshold", "-wilcoxT"), type="numeric", default=0.05, help="", metavar="numeric"), make_option(c("--firstRegionName", "-name1"), type="character", default="Region1", help="", metavar="character"), make_option(c("--secondRegionName", "-name2"), type="character", default="Region2", help="", metavar="character"), make_option(c("--bootPlotWidth", "-bootW"), type="numeric", default=6, help="", metavar="numeric"), make_option(c("--bootPlotHeight", "-bootH"), type="numeric", default=3.7, help="", metavar="numeric"), make_option(c("--bootPlotColors", "-bootC"), type="character", default=NULL, help="", metavar="character"), make_option(c("--wilcoxPlotWidth", "-wilcoxW"), type="numeric", default=4.6, help="", metavar="numeric"), make_option(c("--wilcoxPlotHeight", "-wilcoxH"), type="numeric", default=3.7, help="", metavar="numeric"), make_option(c("--signalName", "-signal"), type="character", default="Genomic signal", help="", metavar="character"), make_option(c("--font", "-f"), type="character", default=NULL, help=".", metavar="character") ); opt_parser = OptionParser(description= "", usage = "", option_list=option_list); opt = parse_args(opt_parser); opt ``` Under RStudio, the none given arguments are NULL in the `opt` list (they don't exist), while when executed under command line, they are not null and even take other arguments values, for instance: Rscript script.R -i file.txt -o output_test -b 1000 -p 40 --firstRegionName "Selection" --signalName "" ``` $input [1] "file.txt" $output [1] "output_test" $bootstraps [1] 1000 $bootstrapsCI [1] 0.95 $CPU [1] 40 $wilcoxStartBin [1] "output_test" $wilcoxEndBin [1] "output_test" $wilcoxThreshold [1] "output_test" $firstRegionName [1] "Selection" $secondRegionName [1] "Region2" $bootPlotWidth [1] 1000 $bootPlotHeight [1] 1000 $bootPlotColors [1] 1000 $wilcoxPlotWidth [1] "output_test" $wilcoxPlotHeight [1] "output_test" $signalName [1] "A" $help [1] FALSE ``` When just executing `script.R` without any arguments, then `opt` has the correct default values and the default NULL are correctly assigned. ``` $bootstraps [1] 1000 $bootstrapsCI [1] 0.95 $CPU [1] 4 $wilcoxThreshold [1] 0.05 $firstRegionName [1] "Region1" $secondRegionName [1] "Region2" $bootPlotWidth [1] 6 $bootPlotHeight [1] 3.7 $wilcoxPlotWidth [1] 4.6 $wilcoxPlotHeight [1] 3.7 $signalName [1] "Genomic signal" $help [1] FALSE ```
1.0
Throw error if short flag more than one character long - Hello, The opt list contains different values while executing a script by command-line (Rscript) versus RStudio. Here's the code: ``` #!/usr/bin/env Rscript suppressMessages(library('optparse')) options(show.error.locations = TRUE) #### ARGUMENTS #### option_list = list( make_option(c("-i","--input"), type="character", default=NULL, help="", metavar="character"), make_option(c("--output", "-o"), type="character", default=NULL, help="", metavar="character"), make_option(c("--bootstraps", "-b"), type="integer", default=1000, help="", metavar="integer"), make_option(c("--predictionsNumber", "-m"), type="integer", default=NULL, help="", metavar="integer"), make_option(c("--bootstrapsCI", "-c"), type="numeric", default=0.95, help="", metavar="numeric"), make_option(c("--CPU", "-p"), type="integer", default=4, help="", metavar="integer"), make_option(c("--wilcoxStartBin", "-wilcoxStart"), type="numeric", default=NULL, help="", metavar="numeric"), make_option(c("--wilcoxEndBin", "-wilcoxEnd"), type="numeric", default=NULL, help="", metavar="numeric"), make_option(c("--wilcoxThreshold", "-wilcoxT"), type="numeric", default=0.05, help="", metavar="numeric"), make_option(c("--firstRegionName", "-name1"), type="character", default="Region1", help="", metavar="character"), make_option(c("--secondRegionName", "-name2"), type="character", default="Region2", help="", metavar="character"), make_option(c("--bootPlotWidth", "-bootW"), type="numeric", default=6, help="", metavar="numeric"), make_option(c("--bootPlotHeight", "-bootH"), type="numeric", default=3.7, help="", metavar="numeric"), make_option(c("--bootPlotColors", "-bootC"), type="character", default=NULL, help="", metavar="character"), make_option(c("--wilcoxPlotWidth", "-wilcoxW"), type="numeric", default=4.6, help="", metavar="numeric"), make_option(c("--wilcoxPlotHeight", "-wilcoxH"), type="numeric", default=3.7, help="", metavar="numeric"), make_option(c("--signalName", "-signal"), type="character", default="Genomic signal", help="", metavar="character"), make_option(c("--font", "-f"), type="character", default=NULL, help=".", metavar="character") ); opt_parser = OptionParser(description= "", usage = "", option_list=option_list); opt = parse_args(opt_parser); opt ``` Under RStudio, the none given arguments are NULL in the `opt` list (they don't exist), while when executed under command line, they are not null and even take other arguments values, for instance: Rscript script.R -i file.txt -o output_test -b 1000 -p 40 --firstRegionName "Selection" --signalName "" ``` $input [1] "file.txt" $output [1] "output_test" $bootstraps [1] 1000 $bootstrapsCI [1] 0.95 $CPU [1] 40 $wilcoxStartBin [1] "output_test" $wilcoxEndBin [1] "output_test" $wilcoxThreshold [1] "output_test" $firstRegionName [1] "Selection" $secondRegionName [1] "Region2" $bootPlotWidth [1] 1000 $bootPlotHeight [1] 1000 $bootPlotColors [1] 1000 $wilcoxPlotWidth [1] "output_test" $wilcoxPlotHeight [1] "output_test" $signalName [1] "A" $help [1] FALSE ``` When just executing `script.R` without any arguments, then `opt` has the correct default values and the default NULL are correctly assigned. ``` $bootstraps [1] 1000 $bootstrapsCI [1] 0.95 $CPU [1] 4 $wilcoxThreshold [1] 0.05 $firstRegionName [1] "Region1" $secondRegionName [1] "Region2" $bootPlotWidth [1] 6 $bootPlotHeight [1] 3.7 $wilcoxPlotWidth [1] 4.6 $wilcoxPlotHeight [1] 3.7 $signalName [1] "Genomic signal" $help [1] FALSE ```
non_priority
throw error if short flag more than one character long hello the opt list contains different values while executing a script by command line rscript versus rstudio here s the code usr bin env rscript suppressmessages library optparse options show error locations true arguments option list list make option c i input type character default null help metavar character make option c output o type character default null help metavar character make option c bootstraps b type integer default help metavar integer make option c predictionsnumber m type integer default null help metavar integer make option c bootstrapsci c type numeric default help metavar numeric make option c cpu p type integer default help metavar integer make option c wilcoxstartbin wilcoxstart type numeric default null help metavar numeric make option c wilcoxendbin wilcoxend type numeric default null help metavar numeric make option c wilcoxthreshold wilcoxt type numeric default help metavar numeric make option c firstregionname type character default help metavar character make option c secondregionname type character default help metavar character make option c bootplotwidth bootw type numeric default help metavar numeric make option c bootplotheight booth type numeric default help metavar numeric make option c bootplotcolors bootc type character default null help metavar character make option c wilcoxplotwidth wilcoxw type numeric default help metavar numeric make option c wilcoxplotheight wilcoxh type numeric default help metavar numeric make option c signalname signal type character default genomic signal help metavar character make option c font f type character default null help metavar character opt parser optionparser description usage option list option list opt parse args opt parser opt under rstudio the none given arguments are null in the opt list they don t exist while when executed under command line they are not null and even take other arguments values for instance rscript script r i file txt o output test b p firstregionname selection signalname input file txt output output test bootstraps bootstrapsci cpu wilcoxstartbin output test wilcoxendbin output test wilcoxthreshold output test firstregionname selection secondregionname bootplotwidth bootplotheight bootplotcolors wilcoxplotwidth output test wilcoxplotheight output test signalname a help false when just executing script r without any arguments then opt has the correct default values and the default null are correctly assigned bootstraps bootstrapsci cpu wilcoxthreshold firstregionname secondregionname bootplotwidth bootplotheight wilcoxplotwidth wilcoxplotheight signalname genomic signal help false
0
69,166
14,973,457,354
IssuesEvent
2021-01-28 01:07:34
TreyM-WSS/catalog-profiler-examples
https://api.github.com/repos/TreyM-WSS/catalog-profiler-examples
opened
CVE-2020-35490 (High) detected in jackson-databind-2.9.8.jar
security vulnerability
## CVE-2020-35490 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: catalog-profiler-examples/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - jersey-media-json-jackson-2.27.jar (Root Library) - jackson-module-jaxb-annotations-2.8.10.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource. <p>Publish Date: 2020-12-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490>CVE-2020-35490</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2986">https://github.com/FasterXML/jackson-databind/issues/2986</a></p> <p>Release Date: 2020-12-17</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":true,"dependencyTree":"org.glassfish.jersey.media:jersey-media-json-jackson:2.27;com.fasterxml.jackson.module:jackson-module-jaxb-annotations:2.8.10;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"vulnerabilityIdentifier":"CVE-2020-35490","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-35490 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-35490 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: catalog-profiler-examples/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - jersey-media-json-jackson-2.27.jar (Root Library) - jackson-module-jaxb-annotations-2.8.10.jar - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource. <p>Publish Date: 2020-12-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490>CVE-2020-35490</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2986">https://github.com/FasterXML/jackson-databind/issues/2986</a></p> <p>Release Date: 2020-12-17</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":true,"dependencyTree":"org.glassfish.jersey.media:jersey-media-json-jackson:2.27;com.fasterxml.jackson.module:jackson-module-jaxb-annotations:2.8.10;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"vulnerabilityIdentifier":"CVE-2020-35490","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file catalog profiler examples build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jersey media json jackson jar root library jackson module jaxb annotations jar x jackson databind jar vulnerable library found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache commons datasources peruserpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache commons datasources peruserpooldatasource vulnerabilityurl
0
83,170
10,329,221,959
IssuesEvent
2019-09-02 11:37:22
mhmdtshref/portfolio
https://api.github.com/repos/mhmdtshref/portfolio
closed
Create language page component
design feature technical
Using Figma design, create the service page component which gets services from the backend.
1.0
Create language page component - Using Figma design, create the service page component which gets services from the backend.
non_priority
create language page component using figma design create the service page component which gets services from the backend
0
2,814
12,641,414,202
IssuesEvent
2020-06-16 06:05:55
Shirataki2/WebBash
https://api.github.com/repos/Shirataki2/WebBash
closed
Test on Predeployでの条件変更とRelease Drafterの微修正
Automation Chore
`.github/release-drafter.yml` ```yml name-template: "v$NEXT_PATCH_VERSION" tag-template: "v$NEXT_PATCH_VERSION" categories: - title: "🚀 新機能" labels: - "Feature" - title: "🐛 バグ修正" labels: - "Bug" - title: "🧰 メンテナンス" labels: - "chore" <- 大文字にする - title: "🤖 自動化" labels: - "Automation" ... ``` ### Test on Predeploy コミットメッセージに[No CI]があれば実行しない
1.0
Test on Predeployでの条件変更とRelease Drafterの微修正 - `.github/release-drafter.yml` ```yml name-template: "v$NEXT_PATCH_VERSION" tag-template: "v$NEXT_PATCH_VERSION" categories: - title: "🚀 新機能" labels: - "Feature" - title: "🐛 バグ修正" labels: - "Bug" - title: "🧰 メンテナンス" labels: - "chore" <- 大文字にする - title: "🤖 自動化" labels: - "Automation" ... ``` ### Test on Predeploy コミットメッセージに[No CI]があれば実行しない
non_priority
test on predeployでの条件変更とrelease drafterの微修正 github release drafter yml yml name template v next patch version tag template v next patch version categories title 🚀 新機能 labels feature title 🐛 バグ修正 labels bug title 🧰 メンテナンス labels chore 大文字にする title 🤖 自動化 labels automation test on predeploy コミットメッセージに があれば実行しない
0
41,290
6,899,094,556
IssuesEvent
2017-11-24 12:16:24
bio2bel/ec
https://api.github.com/repos/bio2bel/ec
closed
Fill out all rtype in manager
documentation
It's a lot of the time more informative to have the `:rtype:` filled out in the documentation because then PyCharm can introspect and give better suggestions
1.0
Fill out all rtype in manager - It's a lot of the time more informative to have the `:rtype:` filled out in the documentation because then PyCharm can introspect and give better suggestions
non_priority
fill out all rtype in manager it s a lot of the time more informative to have the rtype filled out in the documentation because then pycharm can introspect and give better suggestions
0
137,986
11,171,920,734
IssuesEvent
2019-12-29 00:23:51
HRSEVESOSK/cide-ionic-app
https://api.github.com/repos/HRSEVESOSK/cide-ionic-app
opened
Correct names of Institutions
testing
Name of institutions should be in Croatian. The name of institution for ICZ/Inspekcije civilne zaštite” is missing and should be: „Ministsrstvo unutarnjih poslova Ravnateljstvo civilne zaštite“. ![obrázok](https://user-images.githubusercontent.com/6195936/71550843-d23bd500-29d9-11ea-9c2c-8d21bdd6db5c.png) Note 14.6.2019. This should be corrected. Please provide us a procedure how to do that.
1.0
Correct names of Institutions - Name of institutions should be in Croatian. The name of institution for ICZ/Inspekcije civilne zaštite” is missing and should be: „Ministsrstvo unutarnjih poslova Ravnateljstvo civilne zaštite“. ![obrázok](https://user-images.githubusercontent.com/6195936/71550843-d23bd500-29d9-11ea-9c2c-8d21bdd6db5c.png) Note 14.6.2019. This should be corrected. Please provide us a procedure how to do that.
non_priority
correct names of institutions name of institutions should be in croatian the name of institution for icz inspekcije civilne zaštite” is missing and should be „ministsrstvo unutarnjih poslova ravnateljstvo civilne zaštite“ note this should be corrected please provide us a procedure how to do that
0
15,232
19,340,074,462
IssuesEvent
2021-12-15 02:43:11
PG85/OpenTerrainGenerator
https://api.github.com/repos/PG85/OpenTerrainGenerator
closed
Bug: /locate not working for some Forge mods
Bug - Issue Forge Mod Compatibility Commands
#### OTG Plugin or Mod [Please specify if it's about Forge Mod or Spigot server Plugin placing "x" into []] - [x] OTG Mod for Forge - [ ] OTG Plugin for Spigot #### OTG Version [Please specify the full OTG version that you are running by placing "x" into []] - [x] 1.16.5 - [ ] 1.17.1 - [ ] 1.12.2_v8_r1 - [ ] 1.12.2_v7_DEV_r26 - [ ] 1.12.2-v6 - [ ] 1.12.2-v5 - [ ] 1.11.2-v8 - [ ] 1.11.2-v9 - [ ] 1.10.2-v21 - [ ] Other - specify here #### Forge or Spigot Versions Forge 1.16.5 / 36.2.8 #### What other plugins are you running? 1) The Graveyard - 2.1 2) Awesome dungeons - 1.1.2 3) Illagers plus - 1.7.2 #### Description A tester of ours, haeihaeihaei#4660, reported to the discord that he had experienced issues with structures. Apparently, certain mods mess up the /locate command, presumably, it says where the structures would be located if this were vanilla, but they wind up being in different places entirely.
True
Bug: /locate not working for some Forge mods - #### OTG Plugin or Mod [Please specify if it's about Forge Mod or Spigot server Plugin placing "x" into []] - [x] OTG Mod for Forge - [ ] OTG Plugin for Spigot #### OTG Version [Please specify the full OTG version that you are running by placing "x" into []] - [x] 1.16.5 - [ ] 1.17.1 - [ ] 1.12.2_v8_r1 - [ ] 1.12.2_v7_DEV_r26 - [ ] 1.12.2-v6 - [ ] 1.12.2-v5 - [ ] 1.11.2-v8 - [ ] 1.11.2-v9 - [ ] 1.10.2-v21 - [ ] Other - specify here #### Forge or Spigot Versions Forge 1.16.5 / 36.2.8 #### What other plugins are you running? 1) The Graveyard - 2.1 2) Awesome dungeons - 1.1.2 3) Illagers plus - 1.7.2 #### Description A tester of ours, haeihaeihaei#4660, reported to the discord that he had experienced issues with structures. Apparently, certain mods mess up the /locate command, presumably, it says where the structures would be located if this were vanilla, but they wind up being in different places entirely.
non_priority
bug locate not working for some forge mods otg plugin or mod otg mod for forge otg plugin for spigot otg version dev other specify here forge or spigot versions forge what other plugins are you running the graveyard awesome dungeons illagers plus description a tester of ours haeihaeihaei reported to the discord that he had experienced issues with structures apparently certain mods mess up the locate command presumably it says where the structures would be located if this were vanilla but they wind up being in different places entirely
0
442,556
30,842,304,666
IssuesEvent
2023-08-02 11:32:15
wirDesign-communication-AG/wirhub-app
https://api.github.com/repos/wirDesign-communication-AG/wirhub-app
closed
v3.0.8
documentation
🗓 Voraussichtlicher Release: 31.07. # Bugs - [x] #649 - [x] #658 # Features #### 2WD - [x] #644 - [x] #646 # Enhancements - [x] #655
1.0
v3.0.8 - 🗓 Voraussichtlicher Release: 31.07. # Bugs - [x] #649 - [x] #658 # Features #### 2WD - [x] #644 - [x] #646 # Enhancements - [x] #655
non_priority
🗓 voraussichtlicher release bugs features enhancements
0
190,298
22,047,378,086
IssuesEvent
2022-05-30 04:22:54
pazhanivel07/linux-4.19.72
https://api.github.com/repos/pazhanivel07/linux-4.19.72
closed
CVE-2018-20669 (High) detected in linux-yoctov5.4.51 - autoclosed
security vulnerability
## CVE-2018-20669 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary> <p> <p>Yocto Linux Embedded kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20669>CVE-2018-20669</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: v5.0-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-20669 (High) detected in linux-yoctov5.4.51 - autoclosed - ## CVE-2018-20669 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary> <p> <p>Yocto Linux Embedded kernel</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p> <p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation. <p>Publish Date: 2019-03-21 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20669>CVE-2018-20669</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a></p> <p>Release Date: 2019-03-21</p> <p>Fix Resolution: v5.0-rc1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linux autoclosed cve high severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details an issue where a provided address with access ok is not checked was discovered in gem ioctl in drivers gpu drm gem execbuffer c in the linux kernel through a local attacker can craft a malicious ioctl function call to overwrite arbitrary kernel memory resulting in a denial of service or privilege escalation publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
27,705
4,326,601,532
IssuesEvent
2016-07-26 07:14:20
QualiSystems/AWS-Shell
https://api.github.com/repos/QualiSystems/AWS-Shell
closed
Delete Instance command
Blocked by Bug F-deployment Test Plan Version 7.1
Terminate the AWS instance only this command should be hidden and will be called by RemoveResourceFromReservation we should delete all entities related to this instance as part of this command. For now only delete the exclusive Security Group. The deletion of storage will be handled in another story. **there will be only a hidden command! no command exposed to the user. **need to consider supporting bulk deletion using this command (should be aligned with the Server)
1.0
Delete Instance command - Terminate the AWS instance only this command should be hidden and will be called by RemoveResourceFromReservation we should delete all entities related to this instance as part of this command. For now only delete the exclusive Security Group. The deletion of storage will be handled in another story. **there will be only a hidden command! no command exposed to the user. **need to consider supporting bulk deletion using this command (should be aligned with the Server)
non_priority
delete instance command terminate the aws instance only this command should be hidden and will be called by removeresourcefromreservation we should delete all entities related to this instance as part of this command for now only delete the exclusive security group the deletion of storage will be handled in another story there will be only a hidden command no command exposed to the user need to consider supporting bulk deletion using this command should be aligned with the server
0
4,740
2,871,982,018
IssuesEvent
2015-06-08 08:51:33
dotse/zonemaster-backend
https://api.github.com/repos/dotse/zonemaster-backend
closed
Method #5 (start_domain_test) cant be run using API.md
documentation Prio High
This document (https://github.com/dotse/zonemaster-backend/blob/master/docs/API.md) needs to have functioning examples (that are always updated if the API changes). When I try to run method "start_domain_test" it returns: {"error":{"message":"Failed to parse json","code":-32700}} Please add a working example to the document (if some API-calls need a previous call to work, like "get_test" etc, then please note that in the document and try to have an existing call to create a test exists before that).
1.0
Method #5 (start_domain_test) cant be run using API.md - This document (https://github.com/dotse/zonemaster-backend/blob/master/docs/API.md) needs to have functioning examples (that are always updated if the API changes). When I try to run method "start_domain_test" it returns: {"error":{"message":"Failed to parse json","code":-32700}} Please add a working example to the document (if some API-calls need a previous call to work, like "get_test" etc, then please note that in the document and try to have an existing call to create a test exists before that).
non_priority
method start domain test cant be run using api md this document needs to have functioning examples that are always updated if the api changes when i try to run method start domain test it returns error message failed to parse json code please add a working example to the document if some api calls need a previous call to work like get test etc then please note that in the document and try to have an existing call to create a test exists before that
0
5,473
12,543,953,875
IssuesEvent
2020-06-05 16:24:39
MicrosoftDocs/architecture-center
https://api.github.com/repos/MicrosoftDocs/architecture-center
closed
Typo in Reference Architecture
Pri1 architecture-center/svc assigned-to-author cxp doc-enhancement solution-idea/subsvc triaged
In the reference architecture diagram for the first step it mentions as Azure Data Lake Storage but in the Data Flow step 1 it mentions as Azure Blob Storage. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 1b68d40f-4b98-396b-f4c3-b8650fc4633f * Version Independent ID: 26b362d7-b46a-fa03-c2aa-48b581b67bf0 * Content: [Advanced Analytics Architecture - Azure Solution Ideas](https://docs.microsoft.com/en-us/azure/architecture/solution-ideas/articles/advanced-analytics-on-big-data#feedback) * Content Source: [docs/solution-ideas/articles/advanced-analytics-on-big-data.md](https://github.com/microsoftdocs/architecture-center/blob/master/docs/solution-ideas/articles/advanced-analytics-on-big-data.md) * Service: **architecture-center** * Sub-service: **solution-idea** * GitHub Login: @adamboeglin * Microsoft Alias: **pnp**
1.0
Typo in Reference Architecture - In the reference architecture diagram for the first step it mentions as Azure Data Lake Storage but in the Data Flow step 1 it mentions as Azure Blob Storage. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 1b68d40f-4b98-396b-f4c3-b8650fc4633f * Version Independent ID: 26b362d7-b46a-fa03-c2aa-48b581b67bf0 * Content: [Advanced Analytics Architecture - Azure Solution Ideas](https://docs.microsoft.com/en-us/azure/architecture/solution-ideas/articles/advanced-analytics-on-big-data#feedback) * Content Source: [docs/solution-ideas/articles/advanced-analytics-on-big-data.md](https://github.com/microsoftdocs/architecture-center/blob/master/docs/solution-ideas/articles/advanced-analytics-on-big-data.md) * Service: **architecture-center** * Sub-service: **solution-idea** * GitHub Login: @adamboeglin * Microsoft Alias: **pnp**
non_priority
typo in reference architecture in the reference architecture diagram for the first step it mentions as azure data lake storage but in the data flow step it mentions as azure blob storage document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service architecture center sub service solution idea github login adamboeglin microsoft alias pnp
0
50,645
21,263,150,651
IssuesEvent
2022-04-13 07:20:24
BlackstarDigitalTeam/KetteringReleases
https://api.github.com/repos/BlackstarDigitalTeam/KetteringReleases
closed
[Architect v1.1.2] - Error Connecting
Customer Service
Architect: v1.1.2 OS: Windows 10 Device Model: Not connected Device Version: Description:I have a connection problem with my amp it is on and it is connected to the both devices. You can even hear the computer sounds through the amp but yet still the software does not recognize my amp.
1.0
[Architect v1.1.2] - Error Connecting - Architect: v1.1.2 OS: Windows 10 Device Model: Not connected Device Version: Description:I have a connection problem with my amp it is on and it is connected to the both devices. You can even hear the computer sounds through the amp but yet still the software does not recognize my amp.
non_priority
error connecting architect os windows device model not connected device version description i have a connection problem with my amp it is on and it is connected to the both devices you can even hear the computer sounds through the amp but yet still the software does not recognize my amp
0
217,616
16,723,146,622
IssuesEvent
2021-06-10 09:43:35
djfoster21/mcDuckBroker
https://api.github.com/repos/djfoster21/mcDuckBroker
opened
Webs para ver volumen y liquidaciones de un activo (pools de liquidez) (Futuros)
documentation
https://www.paguertrading.com/pools/ https://btcusd.aggr.trade/# El precio va a tender a llegar a donde se encuentran la mayor cantidad de liquidaciones. Esto sirve más que nada para abrir posiciones en futuros, aunque también se podría usar para spot.
1.0
Webs para ver volumen y liquidaciones de un activo (pools de liquidez) (Futuros) - https://www.paguertrading.com/pools/ https://btcusd.aggr.trade/# El precio va a tender a llegar a donde se encuentran la mayor cantidad de liquidaciones. Esto sirve más que nada para abrir posiciones en futuros, aunque también se podría usar para spot.
non_priority
webs para ver volumen y liquidaciones de un activo pools de liquidez futuros el precio va a tender a llegar a donde se encuentran la mayor cantidad de liquidaciones esto sirve más que nada para abrir posiciones en futuros aunque también se podría usar para spot
0
7,464
6,965,245,703
IssuesEvent
2017-12-09 03:35:24
nyu-devops-customers/customers
https://api.github.com/repos/nyu-devops-customers/customers
closed
MySQL data backup mechanism
infrastructure performance
**As a** developer **I need** to backup users' data **So that** to avoid unexpected data loss **Assumptions:** * Use a static SQL file as a backup **Acceptance Criteria:** When I backup my database Then I delete my original tables and restore it with my backup file I can get all my data back
1.0
MySQL data backup mechanism - **As a** developer **I need** to backup users' data **So that** to avoid unexpected data loss **Assumptions:** * Use a static SQL file as a backup **Acceptance Criteria:** When I backup my database Then I delete my original tables and restore it with my backup file I can get all my data back
non_priority
mysql data backup mechanism as a developer i need to backup users data so that to avoid unexpected data loss assumptions use a static sql file as a backup acceptance criteria when i backup my database then i delete my original tables and restore it with my backup file i can get all my data back
0