Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 844 | labels stringlengths 4 721 | body stringlengths 1 261k | index stringclasses 12 values | text_combine stringlengths 96 261k | label stringclasses 2 values | text stringlengths 96 248k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
18,976 | 13,507,434,496 | IssuesEvent | 2020-09-14 05:57:11 | joncampbell123/dosbox-x | https://api.github.com/repos/joncampbell123/dosbox-x | closed | Confusing "Quick right mouse button copy/paste" | usability |
**Is your feature request related to a problem? Please describe.**
https://github.com/joncampbell123/dosbox-x/blob/23653d031af2036b241d53bb94e548fff79a1ec7/CHANGELOG#L329

This is confusing, I thought I'd be able to copy a .BAS program I typed and that wasn't yet saved but no, it overwrote it with Windows clipboard!
**Describe the solution you'd like**
This should rather be something like `Paste text in Windows clipboard with right mouse button click`, things will be clear then.
| True | Confusing "Quick right mouse button copy/paste" -
**Is your feature request related to a problem? Please describe.**
https://github.com/joncampbell123/dosbox-x/blob/23653d031af2036b241d53bb94e548fff79a1ec7/CHANGELOG#L329

This is confusing, I thought I'd be able to copy a .BAS program I typed and that wasn't yet saved but no, it overwrote it with Windows clipboard!
**Describe the solution you'd like**
This should rather be something like `Paste text in Windows clipboard with right mouse button click`, things will be clear then.
| non_priority | confusing quick right mouse button copy paste is your feature request related to a problem please describe this is confusing i thought i d be able to copy a bas program i typed and that wasn t yet saved but no it overwrote it with windows clipboard describe the solution you d like this should rather be something like paste text in windows clipboard with right mouse button click things will be clear then | 0 |
28,602 | 23,384,199,204 | IssuesEvent | 2022-08-11 12:25:08 | getlago/lago | https://api.github.com/repos/getlago/lago | closed | Unable to Install my own SSL Certificate in "lago-api" Docker Container. | issue: help wanted Infrastructure issue: discussion | Hi,
I have deployed lago through Docker on my AWS EC2 Instance.
Now the problem is if I set my LAGO_FRONT_URL and LAGO_API_URL to my instance's public IPv4, I can succesfully login but cannot copy the api from the Copy API button. getting the error <b>"Cannot read properties of undefined (reading 'writeText')"<b>
So I looked into this error and found that my frontend and api should be on "HTTPS" or either the button will not work.
So I installed my own certificate in <b>"lago-front"</b> Docker container through nginx but I am unable to install the ssl cerificate on the api container. Since 443 port of my instance is already bound to lago-front container I cannot bind it to lago-api container.
I also found another way to install certificate which was installing it directly through rails i-e <b> rails s puma -b 'ssl://0.0.0.0:9292?key=path_to_key.key&cert=path_to_cert.crt&verify_mode=none&ca=path_to_root_bundle.crt' <b>
When I try to install the certificate through puma it says addressport 3000 is already in use.
Obiously because the api is running on 3000 port it wont start the server on the same port.
I am stuck here. Kindly help me with the installation of SSL certificate on the api docker container.
I did this setup on my personal machine and it was running perfect because the url was localhost but on the ec2 instance I am facing this ssl issue.
Need to install my own SSL certificate, not from letsencrypt.
| 1.0 | Unable to Install my own SSL Certificate in "lago-api" Docker Container. - Hi,
I have deployed lago through Docker on my AWS EC2 Instance.
Now the problem is if I set my LAGO_FRONT_URL and LAGO_API_URL to my instance's public IPv4, I can succesfully login but cannot copy the api from the Copy API button. getting the error <b>"Cannot read properties of undefined (reading 'writeText')"<b>
So I looked into this error and found that my frontend and api should be on "HTTPS" or either the button will not work.
So I installed my own certificate in <b>"lago-front"</b> Docker container through nginx but I am unable to install the ssl cerificate on the api container. Since 443 port of my instance is already bound to lago-front container I cannot bind it to lago-api container.
I also found another way to install certificate which was installing it directly through rails i-e <b> rails s puma -b 'ssl://0.0.0.0:9292?key=path_to_key.key&cert=path_to_cert.crt&verify_mode=none&ca=path_to_root_bundle.crt' <b>
When I try to install the certificate through puma it says addressport 3000 is already in use.
Obiously because the api is running on 3000 port it wont start the server on the same port.
I am stuck here. Kindly help me with the installation of SSL certificate on the api docker container.
I did this setup on my personal machine and it was running perfect because the url was localhost but on the ec2 instance I am facing this ssl issue.
Need to install my own SSL certificate, not from letsencrypt.
| non_priority | unable to install my own ssl certificate in lago api docker container hi i have deployed lago through docker on my aws instance now the problem is if i set my lago front url and lago api url to my instance s public i can succesfully login but cannot copy the api from the copy api button getting the error cannot read properties of undefined reading writetext so i looked into this error and found that my frontend and api should be on https or either the button will not work so i installed my own certificate in lago front docker container through nginx but i am unable to install the ssl cerificate on the api container since port of my instance is already bound to lago front container i cannot bind it to lago api container i also found another way to install certificate which was installing it directly through rails i e rails s puma b ssl key path to key key cert path to cert crt verify mode none ca path to root bundle crt when i try to install the certificate through puma it says addressport is already in use obiously because the api is running on port it wont start the server on the same port i am stuck here kindly help me with the installation of ssl certificate on the api docker container i did this setup on my personal machine and it was running perfect because the url was localhost but on the instance i am facing this ssl issue need to install my own ssl certificate not from letsencrypt | 0 |
388,676 | 26,777,600,660 | IssuesEvent | 2023-01-31 18:21:16 | uf-mil/mil | https://api.github.com/repos/uf-mil/mil | opened | Add note on receiving packages and sending info to Schwartz | documentation software difficulty: very easy | ### Assignee
_No response_
### Deadline
_No response_
### What needs to change?
Whenever a package is received in MIL, a note needs to be sent to Schwartz - a note on this should be added to the docs.
### How would this task be tested?
1. No testing - just add to docs.
### Contacts
- [ ] We need help from the mechanical team.
- [ ] We need help from the electrical team.
- [ ] We need help from Dr. Schwartz or other faculty.
- [ ] We need help from a company or an organization.
- [ ] We need help from another UF staff member or organization (ex, facilities). | 1.0 | Add note on receiving packages and sending info to Schwartz - ### Assignee
_No response_
### Deadline
_No response_
### What needs to change?
Whenever a package is received in MIL, a note needs to be sent to Schwartz - a note on this should be added to the docs.
### How would this task be tested?
1. No testing - just add to docs.
### Contacts
- [ ] We need help from the mechanical team.
- [ ] We need help from the electrical team.
- [ ] We need help from Dr. Schwartz or other faculty.
- [ ] We need help from a company or an organization.
- [ ] We need help from another UF staff member or organization (ex, facilities). | non_priority | add note on receiving packages and sending info to schwartz assignee no response deadline no response what needs to change whenever a package is received in mil a note needs to be sent to schwartz a note on this should be added to the docs how would this task be tested no testing just add to docs contacts we need help from the mechanical team we need help from the electrical team we need help from dr schwartz or other faculty we need help from a company or an organization we need help from another uf staff member or organization ex facilities | 0 |
301,448 | 22,756,998,663 | IssuesEvent | 2022-07-07 17:26:17 | dagster-io/dagster | https://api.github.com/repos/dagster-io/dagster | closed | Add migration guide to documentation | documentation | ## Advice
We would like to see a structured release planning and a guide\examples to upgrade the dagster platform in production, with major pitfalls covered.
## Ideas of Implementation
Add a session of migration guide in [releases chapter](https://docs.dagster.io/community/releases). | 1.0 | Add migration guide to documentation - ## Advice
We would like to see a structured release planning and a guide\examples to upgrade the dagster platform in production, with major pitfalls covered.
## Ideas of Implementation
Add a session of migration guide in [releases chapter](https://docs.dagster.io/community/releases). | non_priority | add migration guide to documentation advice we would like to see a structured release planning and a guide examples to upgrade the dagster platform in production with major pitfalls covered ideas of implementation add a session of migration guide in | 0 |
5,937 | 2,989,943,077 | IssuesEvent | 2015-07-21 05:05:38 | ecology-rocks/grammaR | https://api.github.com/repos/ecology-rocks/grammaR | opened | spinStory | documentation enhancement generalize testing | I just copied/pasted from the old stuff. Will need to generalize, test, document, etc. Probably take the write() out as default, since that's terrible practice. Also dangerous. | 1.0 | spinStory - I just copied/pasted from the old stuff. Will need to generalize, test, document, etc. Probably take the write() out as default, since that's terrible practice. Also dangerous. | non_priority | spinstory i just copied pasted from the old stuff will need to generalize test document etc probably take the write out as default since that s terrible practice also dangerous | 0 |
398,566 | 27,201,794,087 | IssuesEvent | 2023-02-20 10:14:19 | giantswarm/harbor-app | https://api.github.com/repos/giantswarm/harbor-app | closed | Documentation of operational information | documentation | We need to have some operational information available and updated:
- Disaster recovery of harbor
- Updating to a new version of harbor
- Recovering a failed deployment for harbor
- Debugging runtime issues (where to find logs, which info is exposed where) | 1.0 | Documentation of operational information - We need to have some operational information available and updated:
- Disaster recovery of harbor
- Updating to a new version of harbor
- Recovering a failed deployment for harbor
- Debugging runtime issues (where to find logs, which info is exposed where) | non_priority | documentation of operational information we need to have some operational information available and updated disaster recovery of harbor updating to a new version of harbor recovering a failed deployment for harbor debugging runtime issues where to find logs which info is exposed where | 0 |
104,987 | 13,152,284,058 | IssuesEvent | 2020-08-09 21:20:59 | merenlab/anvio | https://api.github.com/repos/merenlab/anvio | closed | genes_in_contigs table should have a "type" column, which states whether the gene is coding or non-coding | contigs database core design | In the current design, it is very hacky/difficult to work with gene collections when you want codon sequences and values like 'codon_order_in_gene' and 'base_pos_in_codon', because noncoding genes do not have these attributes. This issue is magnified greatly when external gene calls are imported during anvi-gen-contigs-database | 1.0 | genes_in_contigs table should have a "type" column, which states whether the gene is coding or non-coding - In the current design, it is very hacky/difficult to work with gene collections when you want codon sequences and values like 'codon_order_in_gene' and 'base_pos_in_codon', because noncoding genes do not have these attributes. This issue is magnified greatly when external gene calls are imported during anvi-gen-contigs-database | non_priority | genes in contigs table should have a type column which states whether the gene is coding or non coding in the current design it is very hacky difficult to work with gene collections when you want codon sequences and values like codon order in gene and base pos in codon because noncoding genes do not have these attributes this issue is magnified greatly when external gene calls are imported during anvi gen contigs database | 0 |
30,790 | 11,849,415,471 | IssuesEvent | 2020-03-24 15:12:52 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Simplify or remove Kibana Privilege Calculator | Feature:Security/Feature Controls Team:Security chore | ## Background
The role management screen utilizes a Privilege Calculator in order to tell users what their effective privileges are for the role in question. It takes the following into account:
- Global Base Privileges
- Global Feature Privileges
- Space Base Privileges
- Space Feature Privileges
It currently relies on an implicit hierarchy, where certain privilege definitions are assumed to be subsets of other definitions.
A bulk of this complexity comes from the fact that we tell the user *why* a privilege is set to a specific value. For example, we are able to say things like: "Your original `canvas:read` feature privilege for space `x` was superseded by the global base privilege of `all`"
If we remove these explanations from the UI, I believe we can greatly simplify the calculator.
## Problem
The calculator as it exists today is essentially tech debt that we took on to implement the first round of Feature Controls. We knew it wasn't a construct that we could keep around longterm.
Concretely, the implicit hierarchy of privileges is a blocker to implementing https://github.com/elastic/kibana/issues/35616.
## Proposal
We will likely want to continue to show the effective privileges in the UI, on the role management screen, and potentially elsewhere in the future.
Simplifying the calculator by removing the explanations would considerably reduce the complexity, and should allow us to restructure the calculator itself to be easier to reason about and maintain going forward. | True | Simplify or remove Kibana Privilege Calculator - ## Background
The role management screen utilizes a Privilege Calculator in order to tell users what their effective privileges are for the role in question. It takes the following into account:
- Global Base Privileges
- Global Feature Privileges
- Space Base Privileges
- Space Feature Privileges
It currently relies on an implicit hierarchy, where certain privilege definitions are assumed to be subsets of other definitions.
A bulk of this complexity comes from the fact that we tell the user *why* a privilege is set to a specific value. For example, we are able to say things like: "Your original `canvas:read` feature privilege for space `x` was superseded by the global base privilege of `all`"
If we remove these explanations from the UI, I believe we can greatly simplify the calculator.
## Problem
The calculator as it exists today is essentially tech debt that we took on to implement the first round of Feature Controls. We knew it wasn't a construct that we could keep around longterm.
Concretely, the implicit hierarchy of privileges is a blocker to implementing https://github.com/elastic/kibana/issues/35616.
## Proposal
We will likely want to continue to show the effective privileges in the UI, on the role management screen, and potentially elsewhere in the future.
Simplifying the calculator by removing the explanations would considerably reduce the complexity, and should allow us to restructure the calculator itself to be easier to reason about and maintain going forward. | non_priority | simplify or remove kibana privilege calculator background the role management screen utilizes a privilege calculator in order to tell users what their effective privileges are for the role in question it takes the following into account global base privileges global feature privileges space base privileges space feature privileges it currently relies on an implicit hierarchy where certain privilege definitions are assumed to be subsets of other definitions a bulk of this complexity comes from the fact that we tell the user why a privilege is set to a specific value for example we are able to say things like your original canvas read feature privilege for space x was superseded by the global base privilege of all if we remove these explanations from the ui i believe we can greatly simplify the calculator problem the calculator as it exists today is essentially tech debt that we took on to implement the first round of feature controls we knew it wasn t a construct that we could keep around longterm concretely the implicit hierarchy of privileges is a blocker to implementing proposal we will likely want to continue to show the effective privileges in the ui on the role management screen and potentially elsewhere in the future simplifying the calculator by removing the explanations would considerably reduce the complexity and should allow us to restructure the calculator itself to be easier to reason about and maintain going forward | 0 |
345,967 | 30,856,780,967 | IssuesEvent | 2023-08-02 21:21:52 | istio/istio.io | https://api.github.com/repos/istio/istio.io | reopened | Performance doc charts are out of date. | area/test and release kind/docs lifecycle/stale | https://istio.io/latest/docs/ops/deployment/performance-and-scalability/
Docs use {{< istio_release_name >}} so they state 1.15.
Chart svgs were last updated for 1.8 https://github.com/istio/istio.io/pull/8574
The results in the text are likely out of date as well.
| 1.0 | Performance doc charts are out of date. - https://istio.io/latest/docs/ops/deployment/performance-and-scalability/
Docs use {{< istio_release_name >}} so they state 1.15.
Chart svgs were last updated for 1.8 https://github.com/istio/istio.io/pull/8574
The results in the text are likely out of date as well.
| non_priority | performance doc charts are out of date docs use so they state chart svgs were last updated for the results in the text are likely out of date as well | 0 |
26,752 | 5,284,723,939 | IssuesEvent | 2017-02-08 01:26:53 | simplabs/ember-simple-auth | https://api.github.com/repos/simplabs/ember-simple-auth | closed | Feature request - Add demo app | documentation | Hi,
I have been doing a demo app for 0.8.0 version of ESA with a "devise" backend.
Do you plan to add some examples or demo apps inside the repo for the 1.0 version?
I would be interested in helping with this.
| 1.0 | Feature request - Add demo app - Hi,
I have been doing a demo app for 0.8.0 version of ESA with a "devise" backend.
Do you plan to add some examples or demo apps inside the repo for the 1.0 version?
I would be interested in helping with this.
| non_priority | feature request add demo app hi i have been doing a demo app for version of esa with a devise backend do you plan to add some examples or demo apps inside the repo for the version i would be interested in helping with this | 0 |
100,391 | 30,692,602,122 | IssuesEvent | 2023-07-26 16:08:21 | metabase/metabase | https://api.github.com/repos/metabase/metabase | opened | Get the CLJS REPL connecting to Metabase running in the browser | Type:Bug .Building & Releasing .Team/QueryProcessor :hammer_and_wrench: | ### Describe the bug
When working in the CLJS environment, the Node REPL runs in its own world, separate from the browser. Some functionality doesn't work at all there (the DOM for example), and other things are different from the browser environment.
One notable gap is that `metabase.lib.core` doesn't work at all in the Node environment, but works fine in the browser. Without that "kitchen sink" file, `defmethod`s in various `metabase.lib.*` namespaces may not be loaded, which causes odd behavior when trying to debug CLJS-only issues.
In addition, connecting to the live, running browser instance is very powerful because it gives access to the current real metadata, the current query, and more.
### To Reproduce
`yarn cljs-nrepl` starts an impoverished NodeJS environment with an nrepl connection.
### Expected behavior
This (or a similar command) should connect to the live Metabase instance in your browser.
### Logs
_No response_
### Information about your Metabase installation
```JSON
master
```
### Severity
Annoying when debugging CLJS-only issues; FE integration for MLv2.
### Additional context
This doesn't work out of the box because of our nonstandard `shadow-cljs` configuration.
The typical pattern `shadow-cljs` expects for a browser app is to combine some JS dependencies, CLJS dependencies, and our own CLJS code, and compile it. It expects that this output is what ships to the browser. In dev mode, extra libraries and startup code support connecting a Clojure REPL to the browser environment.
Our configuration is to compile our CLJS code into a module, which webpack will combine with the FE code.
There's no reason that we can't include the necessary libraries and startup code in this process, it just doesn't work out of the box and isn't trivial to include. | 1.0 | Get the CLJS REPL connecting to Metabase running in the browser - ### Describe the bug
When working in the CLJS environment, the Node REPL runs in its own world, separate from the browser. Some functionality doesn't work at all there (the DOM for example), and other things are different from the browser environment.
One notable gap is that `metabase.lib.core` doesn't work at all in the Node environment, but works fine in the browser. Without that "kitchen sink" file, `defmethod`s in various `metabase.lib.*` namespaces may not be loaded, which causes odd behavior when trying to debug CLJS-only issues.
In addition, connecting to the live, running browser instance is very powerful because it gives access to the current real metadata, the current query, and more.
### To Reproduce
`yarn cljs-nrepl` starts an impoverished NodeJS environment with an nrepl connection.
### Expected behavior
This (or a similar command) should connect to the live Metabase instance in your browser.
### Logs
_No response_
### Information about your Metabase installation
```JSON
master
```
### Severity
Annoying when debugging CLJS-only issues; FE integration for MLv2.
### Additional context
This doesn't work out of the box because of our nonstandard `shadow-cljs` configuration.
The typical pattern `shadow-cljs` expects for a browser app is to combine some JS dependencies, CLJS dependencies, and our own CLJS code, and compile it. It expects that this output is what ships to the browser. In dev mode, extra libraries and startup code support connecting a Clojure REPL to the browser environment.
Our configuration is to compile our CLJS code into a module, which webpack will combine with the FE code.
There's no reason that we can't include the necessary libraries and startup code in this process, it just doesn't work out of the box and isn't trivial to include. | non_priority | get the cljs repl connecting to metabase running in the browser describe the bug when working in the cljs environment the node repl runs in its own world separate from the browser some functionality doesn t work at all there the dom for example and other things are different from the browser environment one notable gap is that metabase lib core doesn t work at all in the node environment but works fine in the browser without that kitchen sink file defmethod s in various metabase lib namespaces may not be loaded which causes odd behavior when trying to debug cljs only issues in addition connecting to the live running browser instance is very powerful because it gives access to the current real metadata the current query and more to reproduce yarn cljs nrepl starts an impoverished nodejs environment with an nrepl connection expected behavior this or a similar command should connect to the live metabase instance in your browser logs no response information about your metabase installation json master severity annoying when debugging cljs only issues fe integration for additional context this doesn t work out of the box because of our nonstandard shadow cljs configuration the typical pattern shadow cljs expects for a browser app is to combine some js dependencies cljs dependencies and our own cljs code and compile it it expects that this output is what ships to the browser in dev mode extra libraries and startup code support connecting a clojure repl to the browser environment our configuration is to compile our cljs code into a module which webpack will combine with the fe code there s no reason that we can t include the necessary libraries and startup code in this process it just doesn t work out of the box and isn t trivial to include | 0 |
16,674 | 5,270,776,246 | IssuesEvent | 2017-02-06 07:02:40 | learning-unlimited/ESP-Website | https://api.github.com/repos/learning-unlimited/ESP-Website | closed | select_students is bitrotted | Old/unused code | It tries to interact with some weird caching stuff that was deleted from ClassSection years ago, and apparently nobody noticed. We should delete it. | 1.0 | select_students is bitrotted - It tries to interact with some weird caching stuff that was deleted from ClassSection years ago, and apparently nobody noticed. We should delete it. | non_priority | select students is bitrotted it tries to interact with some weird caching stuff that was deleted from classsection years ago and apparently nobody noticed we should delete it | 0 |
247,700 | 26,728,765,941 | IssuesEvent | 2023-01-30 01:04:09 | ThomasRuemmler/openspaceplanner | https://api.github.com/repos/ThomasRuemmler/openspaceplanner | opened | CVE-2022-48285 (Medium) detected in jszip-3.1.5.tgz | security vulnerability | ## CVE-2022-48285 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jszip-3.1.5.tgz</b></p></summary>
<p>Create, read and edit .zip files with JavaScript http://stuartk.com/jszip</p>
<p>Library home page: <a href="https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz">https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz</a></p>
<p>Path to dependency file: /Web/package.json</p>
<p>Path to vulnerable library: /Web/node_modules/jszip/package.json</p>
<p>
Dependency Hierarchy:
- protractor-5.4.2.tgz (Root Library)
- selenium-webdriver-3.6.0.tgz
- :x: **jszip-3.1.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ThomasRuemmler/openspaceplanner/commit/f6c2c84ced43eeee592037f4035255d8f6a450bc">f6c2c84ced43eeee592037f4035255d8f6a450bc</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.
<p>Publish Date: 2023-01-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-48285>CVE-2022-48285</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-48285">https://www.cve.org/CVERecord?id=CVE-2022-48285</a></p>
<p>Release Date: 2023-01-29</p>
<p>Fix Resolution (jszip): 3.8.0</p>
<p>Direct dependency fix Resolution (protractor): 5.4.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-48285 (Medium) detected in jszip-3.1.5.tgz - ## CVE-2022-48285 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jszip-3.1.5.tgz</b></p></summary>
<p>Create, read and edit .zip files with JavaScript http://stuartk.com/jszip</p>
<p>Library home page: <a href="https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz">https://registry.npmjs.org/jszip/-/jszip-3.1.5.tgz</a></p>
<p>Path to dependency file: /Web/package.json</p>
<p>Path to vulnerable library: /Web/node_modules/jszip/package.json</p>
<p>
Dependency Hierarchy:
- protractor-5.4.2.tgz (Root Library)
- selenium-webdriver-3.6.0.tgz
- :x: **jszip-3.1.5.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ThomasRuemmler/openspaceplanner/commit/f6c2c84ced43eeee592037f4035255d8f6a450bc">f6c2c84ced43eeee592037f4035255d8f6a450bc</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
loadAsync in JSZip before 3.8.0 allows Directory Traversal via a crafted ZIP archive.
<p>Publish Date: 2023-01-29
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-48285>CVE-2022-48285</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-48285">https://www.cve.org/CVERecord?id=CVE-2022-48285</a></p>
<p>Release Date: 2023-01-29</p>
<p>Fix Resolution (jszip): 3.8.0</p>
<p>Direct dependency fix Resolution (protractor): 5.4.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in jszip tgz cve medium severity vulnerability vulnerable library jszip tgz create read and edit zip files with javascript library home page a href path to dependency file web package json path to vulnerable library web node modules jszip package json dependency hierarchy protractor tgz root library selenium webdriver tgz x jszip tgz vulnerable library found in head commit a href vulnerability details loadasync in jszip before allows directory traversal via a crafted zip archive publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jszip direct dependency fix resolution protractor step up your open source security game with mend | 0 |
143,168 | 19,143,230,858 | IssuesEvent | 2021-12-02 02:55:59 | n-devs/edit-map | https://api.github.com/repos/n-devs/edit-map | opened | CVE-2021-29059 (High) detected in is-svg-2.1.0.tgz | security vulnerability | ## CVE-2021-29059 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>is-svg-2.1.0.tgz</b></p></summary>
<p>Check if a string or buffer is SVG</p>
<p>Library home page: <a href="https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz">https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz</a></p>
<p>Path to dependency file: /edit-map/v0.4/package.json</p>
<p>Path to vulnerable library: edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-1.0.13.tgz (Root Library)
- css-loader-0.28.4.tgz
- cssnano-3.10.0.tgz
- postcss-svgo-2.1.6.tgz
- :x: **is-svg-2.1.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was discovered in IS-SVG version 2.1.0 to 4.2.2 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
<p>Publish Date: 2021-06-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29059>CVE-2021-29059</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0">https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0</a></p>
<p>Release Date: 2021-06-21</p>
<p>Fix Resolution: is-svg - 4.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-29059 (High) detected in is-svg-2.1.0.tgz - ## CVE-2021-29059 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>is-svg-2.1.0.tgz</b></p></summary>
<p>Check if a string or buffer is SVG</p>
<p>Library home page: <a href="https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz">https://registry.npmjs.org/is-svg/-/is-svg-2.1.0.tgz</a></p>
<p>Path to dependency file: /edit-map/v0.4/package.json</p>
<p>Path to vulnerable library: edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json,edit-map/v0.1/node_modules/is-svg/package.json</p>
<p>
Dependency Hierarchy:
- react-scripts-1.0.13.tgz (Root Library)
- css-loader-0.28.4.tgz
- cssnano-3.10.0.tgz
- postcss-svgo-2.1.6.tgz
- :x: **is-svg-2.1.0.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was discovered in IS-SVG version 2.1.0 to 4.2.2 and below where a Regular Expression Denial of Service (ReDOS) occurs if the application is provided and checks a crafted invalid SVG string.
<p>Publish Date: 2021-06-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29059>CVE-2021-29059</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0">https://github.com/sindresorhus/is-svg/releases/tag/v4.3.0</a></p>
<p>Release Date: 2021-06-21</p>
<p>Fix Resolution: is-svg - 4.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in is svg tgz cve high severity vulnerability vulnerable library is svg tgz check if a string or buffer is svg library home page a href path to dependency file edit map package json path to vulnerable library edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json edit map node modules is svg package json dependency hierarchy react scripts tgz root library css loader tgz cssnano tgz postcss svgo tgz x is svg tgz vulnerable library vulnerability details a vulnerability was discovered in is svg version to and below where a regular expression denial of service redos occurs if the application is provided and checks a crafted invalid svg string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution is svg step up your open source security game with whitesource | 0 |
166,120 | 26,284,886,089 | IssuesEvent | 2023-01-07 18:20:14 | edenia/eden-spend-explorer | https://api.github.com/repos/edenia/eden-spend-explorer | closed | Check the margin space of the charts | enhancement UI / UX Design | **Description and expected**
We need to resize the margin spaces between the charts. This will give the user more breath when observe the information | 1.0 | Check the margin space of the charts - **Description and expected**
We need to resize the margin spaces between the charts. This will give the user more breath when observe the information | non_priority | check the margin space of the charts description and expected we need to resize the margin spaces between the charts this will give the user more breath when observe the information | 0 |
52,780 | 13,050,473,908 | IssuesEvent | 2020-07-29 15:32:54 | golang/go | https://api.github.com/repos/golang/go | closed | x/build/cmd/releasebot: remove obsolete check that the major version is listed on the project page | Builders NeedsFix release-blocker | The https://golang.org/project/ page has a "Version history" section that lists major Go releases that have been released. Prior to [CL 229483](https://golang.org/cl/229483), it needed to be manually updated before each final major release, and so to catch potential mistakes releasebot has a safety check that aborts the release process if the major version isn't listed:
```Go
func (w *Work) checkDocs() {
// Check that the major version is listed on the project page.
data, err := ioutil.ReadFile(filepath.Join(w.Dir, "gitwork", "doc/contrib.html"))
if err != nil {
w.log.Panic(err)
}
major := major(w.Version)
if !strings.Contains(string(data), major) {
w.logError("doc/contrib.html does not list major version %s", major)
}
}
```
_(Source: [golang.org/x/build/cmd/releasebot/main.go#L595-L605](https://github.com/golang/build/blob/b405858d836876f4a9391a8c61cb626a47a3fea1/cmd/releasebot/main.go#L595-L605).)_
The doc/contrib.html file no longer needs to be manually updated, and it [doesn't even exist](https://github.com/golang/go/tree/master/doc) in the main repo as it was moved to x/website in [CL 229485](https://golang.org/cl/229485). The check needs to be removed.
/cc @toothrot @cagedmantis @andybons | 1.0 | x/build/cmd/releasebot: remove obsolete check that the major version is listed on the project page - The https://golang.org/project/ page has a "Version history" section that lists major Go releases that have been released. Prior to [CL 229483](https://golang.org/cl/229483), it needed to be manually updated before each final major release, and so to catch potential mistakes releasebot has a safety check that aborts the release process if the major version isn't listed:
```Go
func (w *Work) checkDocs() {
// Check that the major version is listed on the project page.
data, err := ioutil.ReadFile(filepath.Join(w.Dir, "gitwork", "doc/contrib.html"))
if err != nil {
w.log.Panic(err)
}
major := major(w.Version)
if !strings.Contains(string(data), major) {
w.logError("doc/contrib.html does not list major version %s", major)
}
}
```
_(Source: [golang.org/x/build/cmd/releasebot/main.go#L595-L605](https://github.com/golang/build/blob/b405858d836876f4a9391a8c61cb626a47a3fea1/cmd/releasebot/main.go#L595-L605).)_
The doc/contrib.html file no longer needs to be manually updated, and it [doesn't even exist](https://github.com/golang/go/tree/master/doc) in the main repo as it was moved to x/website in [CL 229485](https://golang.org/cl/229485). The check needs to be removed.
/cc @toothrot @cagedmantis @andybons | non_priority | x build cmd releasebot remove obsolete check that the major version is listed on the project page the page has a version history section that lists major go releases that have been released prior to it needed to be manually updated before each final major release and so to catch potential mistakes releasebot has a safety check that aborts the release process if the major version isn t listed go func w work checkdocs check that the major version is listed on the project page data err ioutil readfile filepath join w dir gitwork doc contrib html if err nil w log panic err major major w version if strings contains string data major w logerror doc contrib html does not list major version s major source the doc contrib html file no longer needs to be manually updated and it in the main repo as it was moved to x website in the check needs to be removed cc toothrot cagedmantis andybons | 0 |
139,055 | 18,836,336,409 | IssuesEvent | 2021-11-11 01:39:59 | ElliotChen/spring_boot_example | https://api.github.com/repos/ElliotChen/spring_boot_example | opened | CVE-2021-38153 (Medium) detected in kafka-clients-2.7.1.jar | security vulnerability | ## CVE-2021-38153 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kafka-clients-2.7.1.jar</b></p></summary>
<p></p>
<p>Library home page: <a href="https://kafka.apache.org">https://kafka.apache.org</a></p>
<p>Path to dependency file: spring_boot_example/13nettyserver/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- spring-kafka-2.7.7.jar (Root Library)
- :x: **kafka-clients-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ElliotChen/spring_boot_example/commit/da8540b4a5b6bc433eb5555e9f1ee407307bab84">da8540b4a5b6bc433eb5555e9f1ee407307bab84</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.
<p>Publish Date: 2021-09-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-38153>CVE-2021-38153</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153</a></p>
<p>Release Date: 2021-09-22</p>
<p>Fix Resolution: org.apache.kafka:kafka-clients:2.8.1,3.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-38153 (Medium) detected in kafka-clients-2.7.1.jar - ## CVE-2021-38153 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kafka-clients-2.7.1.jar</b></p></summary>
<p></p>
<p>Library home page: <a href="https://kafka.apache.org">https://kafka.apache.org</a></p>
<p>Path to dependency file: spring_boot_example/13nettyserver/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar,/home/wss-scanner/.m2/repository/org/apache/kafka/kafka-clients/2.7.1/kafka-clients-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- spring-kafka-2.7.7.jar (Root Library)
- :x: **kafka-clients-2.7.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ElliotChen/spring_boot_example/commit/da8540b4a5b6bc433eb5555e9f1ee407307bab84">da8540b4a5b6bc433eb5555e9f1ee407307bab84</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, 2.2.2, 2.3.0, 2.3.1, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.6.0, 2.6.1, 2.6.2, 2.7.0, 2.7.1, and 2.8.0.
<p>Publish Date: 2021-09-22
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-38153>CVE-2021-38153</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38153</a></p>
<p>Release Date: 2021-09-22</p>
<p>Fix Resolution: org.apache.kafka:kafka-clients:2.8.1,3.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in kafka clients jar cve medium severity vulnerability vulnerable library kafka clients jar library home page a href path to dependency file spring boot example pom xml path to vulnerable library home wss scanner repository org apache kafka kafka clients kafka clients jar home wss scanner repository org apache kafka kafka clients kafka clients jar home wss scanner repository org apache kafka kafka clients kafka clients jar dependency hierarchy spring kafka jar root library x kafka clients jar vulnerable library found in head commit a href found in base branch master vulnerability details some components in apache kafka use arrays equals to validate a password or key which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful users should upgrade to or higher or or higher where this vulnerability has been fixed the affected versions include apache kafka and publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache kafka kafka clients step up your open source security game with whitesource | 0 |
347,946 | 24,904,603,997 | IssuesEvent | 2022-10-29 04:33:04 | CHAMPION316/coffee-forest | https://api.github.com/repos/CHAMPION316/coffee-forest | closed | GENERAL: Creating less padding on about.html | documentation could have | Too much padding is causing the test to be too centered. Decrease padding for better viewability. | 1.0 | GENERAL: Creating less padding on about.html - Too much padding is causing the test to be too centered. Decrease padding for better viewability. | non_priority | general creating less padding on about html too much padding is causing the test to be too centered decrease padding for better viewability | 0 |
64,515 | 12,474,824,755 | IssuesEvent | 2020-05-29 10:21:55 | WesselSmit/education-portal | https://api.github.com/repos/WesselSmit/education-portal | closed | Build new mobile/tablet menu (with toggle?) | code design wontfix | Build the new menu design if the user tests are positive | 1.0 | Build new mobile/tablet menu (with toggle?) - Build the new menu design if the user tests are positive | non_priority | build new mobile tablet menu with toggle build the new menu design if the user tests are positive | 0 |
33,493 | 7,132,454,114 | IssuesEvent | 2018-01-22 14:40:17 | primefaces/primeng | https://api.github.com/repos/primefaces/primeng | closed | onLazyLoad event not fired when a text filter is cleared out | defect | ```
[X] bug report => Search github for a similar issue or PR before submitting
[ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap
[ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35
```
**Current behavior**
When the last character or the whole text string in a text filter is removed there is no onLazyLoad event fired.
**Expected behavior**
The onLazyLoad event should fire when a text filter is cleared.
**Minimal reproduction of the problem with instructions**
This bug is shown in the following Plunk: http://plnkr.co/edit/iJdn8ZKx5dqAs5o8aCjE?p=preview
* **Angular version:** 5.2.1
* **PrimeNG version:** 5.2.0-rc.1
* **Browser:** Tested in Chrome v63.0.3239.132 (Official Build) (64-bit) on macOS High Sierra
| 1.0 | onLazyLoad event not fired when a text filter is cleared out - ```
[X] bug report => Search github for a similar issue or PR before submitting
[ ] feature request => Please check if request is not on the roadmap already https://github.com/primefaces/primeng/wiki/Roadmap
[ ] support request => Please do not submit support request here, instead see http://forum.primefaces.org/viewforum.php?f=35
```
**Current behavior**
When the last character or the whole text string in a text filter is removed there is no onLazyLoad event fired.
**Expected behavior**
The onLazyLoad event should fire when a text filter is cleared.
**Minimal reproduction of the problem with instructions**
This bug is shown in the following Plunk: http://plnkr.co/edit/iJdn8ZKx5dqAs5o8aCjE?p=preview
* **Angular version:** 5.2.1
* **PrimeNG version:** 5.2.0-rc.1
* **Browser:** Tested in Chrome v63.0.3239.132 (Official Build) (64-bit) on macOS High Sierra
| non_priority | onlazyload event not fired when a text filter is cleared out bug report search github for a similar issue or pr before submitting feature request please check if request is not on the roadmap already support request please do not submit support request here instead see current behavior when the last character or the whole text string in a text filter is removed there is no onlazyload event fired expected behavior the onlazyload event should fire when a text filter is cleared minimal reproduction of the problem with instructions this bug is shown in the following plunk angular version primeng version rc browser tested in chrome official build bit on macos high sierra | 0 |
33,938 | 12,229,047,999 | IssuesEvent | 2020-05-03 22:10:21 | YANG-DB/yang-db | https://api.github.com/repos/YANG-DB/yang-db | opened | CVE-2020-11111 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2020-11111 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /yang-db/distrib/dragon-dragon/lib/jackson-databind-2.9.8.jar,/yang-db/distrib/knowledge-knowledge/lib/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/YANG-DB/yang-db/commit/fb4688fc73077d82b1716f0af8303e34cb1e6d25">fb4688fc73077d82b1716f0af8303e34cb1e6d25</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
<p>Publish Date: 2020-03-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p>
<p>Release Date: 2020-03-31</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-11111 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-11111 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /yang-db/distrib/dragon-dragon/lib/jackson-databind-2.9.8.jar,/yang-db/distrib/knowledge-knowledge/lib/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/YANG-DB/yang-db/commit/fb4688fc73077d82b1716f0af8303e34cb1e6d25">fb4688fc73077d82b1716f0af8303e34cb1e6d25</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.activemq.* (aka activemq-jms, activemq-core, activemq-pool, and activemq-pool-jms).
<p>Publish Date: 2020-03-31
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11111>CVE-2020-11111</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11113</a></p>
<p>Release Date: 2020-03-31</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4,2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library yang db distrib dragon dragon lib jackson databind jar yang db distrib knowledge knowledge lib jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache activemq aka activemq jms activemq core activemq pool and activemq pool jms publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
222,948 | 17,514,208,588 | IssuesEvent | 2021-08-11 03:44:31 | pingcap/ticdc | https://api.github.com/repos/pingcap/ticdc | closed | Capture list increased 1 unexpected after all PD restarting | type/bug component/status-server difficulty/easy severity/minor bug-from-internal-test | ## Bug Report
Please answer these questions before submitting your issue. Thanks!
1. What did you do? If possible, provide a recipe for reproducing the error.
- 2x capture:
Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379
[
{
"id": "3378b726-26cb-4963-8280-3ee679024a76",
"is-owner": false,
"address": "172.16.6.32:8300"
},
{
"id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7",
"is-owner": true,
"address": "172.16.6.31:8300"
}
]
- Restart all PD: $ tiup cluster restart 360UP -R pd
- Check capture list
2. What did you expect to see?
- 2x capture, and their status is normal.
3. What did you see instead?
- 3x capture list unexpected in a short time after PD restarting:
Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379
[
{
"id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e",
"is-owner": false,
"address": "172.16.6.32:8300"
},
{
"id": "3378b726-26cb-4963-8280-3ee679024a76",
"is-owner": false,
"address": "172.16.6.32:8300"
},
{
"id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7",
"is-owner": true,
"address": "172.16.6.31:8300"
}
]
Waiting for several seconds, 2x capture list as expected:
Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379
[
{
"id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e",
"is-owner": true,
"address": "172.16.6.32:8300"
},
{
"id": "4b8e6f29-847d-4caf-bc7a-ea8cba317a28",
"is-owner": false,
"address": "172.16.6.31:8300"
}
]
4. Versions of the cluster
- Upstream TiDB cluster version (execute `SELECT tidb_version();` in a MySQL client):
```
4.0.14
```
- TiCDC version (execute `cdc version`):
```
[release-version=v4.0.14] [git-hash=5a7851967f686da896b45acd3f3e968bfe53d6bd] [git-branch=heads/refs/tags/v4.0.14]
```
| 1.0 | Capture list increased 1 unexpected after all PD restarting - ## Bug Report
Please answer these questions before submitting your issue. Thanks!
1. What did you do? If possible, provide a recipe for reproducing the error.
- 2x capture:
Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379
[
{
"id": "3378b726-26cb-4963-8280-3ee679024a76",
"is-owner": false,
"address": "172.16.6.32:8300"
},
{
"id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7",
"is-owner": true,
"address": "172.16.6.31:8300"
}
]
- Restart all PD: $ tiup cluster restart 360UP -R pd
- Check capture list
2. What did you expect to see?
- 2x capture, and their status is normal.
3. What did you see instead?
- 3x capture list unexpected in a short time after PD restarting:
Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379
[
{
"id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e",
"is-owner": false,
"address": "172.16.6.32:8300"
},
{
"id": "3378b726-26cb-4963-8280-3ee679024a76",
"is-owner": false,
"address": "172.16.6.32:8300"
},
{
"id": "d2600da4-cdc4-4420-84a4-e57e826ffbc7",
"is-owner": true,
"address": "172.16.6.31:8300"
}
]
Waiting for several seconds, 2x capture list as expected:
Starting component `cdc`: /root/.tiup/components/cdc/v5.1.0/cdc cli capture list --pd=http://172.16.6.24:2379
[
{
"id": "2b0211bd-f3fc-4551-b4d1-a5c6bba5818e",
"is-owner": true,
"address": "172.16.6.32:8300"
},
{
"id": "4b8e6f29-847d-4caf-bc7a-ea8cba317a28",
"is-owner": false,
"address": "172.16.6.31:8300"
}
]
4. Versions of the cluster
- Upstream TiDB cluster version (execute `SELECT tidb_version();` in a MySQL client):
```
4.0.14
```
- TiCDC version (execute `cdc version`):
```
[release-version=v4.0.14] [git-hash=5a7851967f686da896b45acd3f3e968bfe53d6bd] [git-branch=heads/refs/tags/v4.0.14]
```
| non_priority | capture list increased unexpected after all pd restarting bug report please answer these questions before submitting your issue thanks what did you do if possible provide a recipe for reproducing the error capture starting component cdc root tiup components cdc cdc cli capture list pd id is owner false address id is owner true address restart all pd tiup cluster restart r pd check capture list what did you expect to see capture and their status is normal what did you see instead capture list unexpected in a short time after pd restarting starting component cdc root tiup components cdc cdc cli capture list pd id is owner false address id is owner false address id is owner true address waiting for several seconds capture list as expected starting component cdc root tiup components cdc cdc cli capture list pd id is owner true address id is owner false address versions of the cluster upstream tidb cluster version execute select tidb version in a mysql client ticdc version execute cdc version | 0 |
26,213 | 4,622,767,866 | IssuesEvent | 2016-09-27 08:46:29 | siddhartha-gadgil/ProvingGround | https://api.github.com/repos/siddhartha-gadgil/ProvingGround | closed | Very poor performance due to cascade of replacements. | defect | In generating from _Monoids_, but not from just _logic_, there is a huge slowdown, with most of the time spent in replace methods. This appears to be because:
* for the sake of safety, lambdas:
* create an inner variable
* in the case of lambda-fixed, check independence.
* both these involve replacements for lambdas
* if the replaced values are `IdentityTyp` etc., then the terms themselves contain a lot of lambdas, so we get a cascade of replacements.
* We can avoid creating inner variables and checking for dependence if we are using a new synthesized variable (and are careful about dependence). | 1.0 | Very poor performance due to cascade of replacements. - In generating from _Monoids_, but not from just _logic_, there is a huge slowdown, with most of the time spent in replace methods. This appears to be because:
* for the sake of safety, lambdas:
* create an inner variable
* in the case of lambda-fixed, check independence.
* both these involve replacements for lambdas
* if the replaced values are `IdentityTyp` etc., then the terms themselves contain a lot of lambdas, so we get a cascade of replacements.
* We can avoid creating inner variables and checking for dependence if we are using a new synthesized variable (and are careful about dependence). | non_priority | very poor performance due to cascade of replacements in generating from monoids but not from just logic there is a huge slowdown with most of the time spent in replace methods this appears to be because for the sake of safety lambdas create an inner variable in the case of lambda fixed check independence both these involve replacements for lambdas if the replaced values are identitytyp etc then the terms themselves contain a lot of lambdas so we get a cascade of replacements we can avoid creating inner variables and checking for dependence if we are using a new synthesized variable and are careful about dependence | 0 |
106,223 | 9,122,408,375 | IssuesEvent | 2019-02-23 07:39:25 | ChrisCScott/forecaster | https://api.github.com/repos/ChrisCScott/forecaster | closed | Add tests for SubForecast subclasses | ContributionForecast Forecast IncomeForecast LivingExpensesForecast ReductionForecast SubForecast TaxForecast WithdrawalForecast tests | With `IncomeForecast`, `LivingExpensesForecast`, `ReductionForecast` (rename this `LifecycleForecast`?), `ContributionForecast`, `WithdrawalForecast`, and `TaxForecast` now implemented, we need to test them (or, in the cast of `IncomeForecast`, reimplement its tests).
Thanks to relatively rigorous encapsulation (pending resolution of #54), tests should be much more straightforward than the existing `Forecast` testing framework. | 1.0 | Add tests for SubForecast subclasses - With `IncomeForecast`, `LivingExpensesForecast`, `ReductionForecast` (rename this `LifecycleForecast`?), `ContributionForecast`, `WithdrawalForecast`, and `TaxForecast` now implemented, we need to test them (or, in the cast of `IncomeForecast`, reimplement its tests).
Thanks to relatively rigorous encapsulation (pending resolution of #54), tests should be much more straightforward than the existing `Forecast` testing framework. | non_priority | add tests for subforecast subclasses with incomeforecast livingexpensesforecast reductionforecast rename this lifecycleforecast contributionforecast withdrawalforecast and taxforecast now implemented we need to test them or in the cast of incomeforecast reimplement its tests thanks to relatively rigorous encapsulation pending resolution of tests should be much more straightforward than the existing forecast testing framework | 0 |
19,500 | 3,774,201,492 | IssuesEvent | 2016-03-17 08:03:23 | quantmind/pulsar | https://api.github.com/repos/quantmind/pulsar | closed | Exception message in tests | test won't fix | In `tests/async/events.py` we see at line 24 the line
h.bind_event('finish', lambda f, exc=None: 'OK'+4)
This raises exceptions, which result in the unintelligible output `"Exception ignored in:"` in the middle of the test output stream. If it's intended to raise that exception, could the message be suppressed, or at least identify the exception? | 1.0 | Exception message in tests - In `tests/async/events.py` we see at line 24 the line
h.bind_event('finish', lambda f, exc=None: 'OK'+4)
This raises exceptions, which result in the unintelligible output `"Exception ignored in:"` in the middle of the test output stream. If it's intended to raise that exception, could the message be suppressed, or at least identify the exception? | non_priority | exception message in tests in tests async events py we see at line the line h bind event finish lambda f exc none ok this raises exceptions which result in the unintelligible output exception ignored in in the middle of the test output stream if it s intended to raise that exception could the message be suppressed or at least identify the exception | 0 |
109,895 | 16,903,293,840 | IssuesEvent | 2021-06-24 02:02:46 | turkdevops/teletype | https://api.github.com/repos/turkdevops/teletype | closed | CVE-2021-33502 (High) detected in normalize-url-4.5.0.tgz - autoclosed | security vulnerability | ## CVE-2021-33502 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>normalize-url-4.5.0.tgz</b></p></summary>
<p>Normalize a URL</p>
<p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz</a></p>
<p>Path to dependency file: teletype/package.json</p>
<p>Path to vulnerable library: teletype/node_modules/normalize-url/package.json</p>
<p>
Dependency Hierarchy:
- snyk-1.514.0.tgz (Root Library)
- snyk-nodejs-lockfile-parser-1.31.1.tgz
- got-11.4.0.tgz
- cacheable-request-7.0.1.tgz
- :x: **normalize-url-4.5.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/turkdevops/teletype/commit/282acd838c0ad91b000caf2a2d48ae64a37b72f6">282acd838c0ad91b000caf2a2d48ae64a37b72f6</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
<p>Publish Date: 2021-05-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33502>CVE-2021-33502</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502</a></p>
<p>Release Date: 2021-05-24</p>
<p>Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-33502 (High) detected in normalize-url-4.5.0.tgz - autoclosed - ## CVE-2021-33502 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>normalize-url-4.5.0.tgz</b></p></summary>
<p>Normalize a URL</p>
<p>Library home page: <a href="https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz">https://registry.npmjs.org/normalize-url/-/normalize-url-4.5.0.tgz</a></p>
<p>Path to dependency file: teletype/package.json</p>
<p>Path to vulnerable library: teletype/node_modules/normalize-url/package.json</p>
<p>
Dependency Hierarchy:
- snyk-1.514.0.tgz (Root Library)
- snyk-nodejs-lockfile-parser-1.31.1.tgz
- got-11.4.0.tgz
- cacheable-request-7.0.1.tgz
- :x: **normalize-url-4.5.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/turkdevops/teletype/commit/282acd838c0ad91b000caf2a2d48ae64a37b72f6">282acd838c0ad91b000caf2a2d48ae64a37b72f6</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The normalize-url package before 4.5.1, 5.x before 5.3.1, and 6.x before 6.0.1 for Node.js has a ReDoS (regular expression denial of service) issue because it has exponential performance for data: URLs.
<p>Publish Date: 2021-05-24
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-33502>CVE-2021-33502</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33502</a></p>
<p>Release Date: 2021-05-24</p>
<p>Fix Resolution: normalize-url - 4.5.1, 5.3.1, 6.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in normalize url tgz autoclosed cve high severity vulnerability vulnerable library normalize url tgz normalize a url library home page a href path to dependency file teletype package json path to vulnerable library teletype node modules normalize url package json dependency hierarchy snyk tgz root library snyk nodejs lockfile parser tgz got tgz cacheable request tgz x normalize url tgz vulnerable library found in head commit a href found in base branch master vulnerability details the normalize url package before x before and x before for node js has a redos regular expression denial of service issue because it has exponential performance for data urls publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution normalize url step up your open source security game with whitesource | 0 |
166,123 | 12,891,369,249 | IssuesEvent | 2020-07-13 17:36:27 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | roachtest: sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed | C-test-failure O-roachtest O-robot branch-master release-blocker | [(roachtest).sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=buildLog) on [master@542c83e7db1694208e09c7fea7d350db4993b897](https://github.com/cockroachdb/cockroach/commits/542c83e7db1694208e09c7fea7d350db4993b897):
```
| signal: killed
| (1) signal: killed
| Error types: (1) *exec.ExitError
Wraps: (6) context canceled
Error types: (1) *withstack.withStack (2) *safedetails.withSafeDetails (3) *errutil.withMessage (4) *main.withCommandDetails (5) *secondary.withSecondaryError (6) *errors.errorString
cluster.go:2471,sysbench.go:117,sysbench.go:138,test_runner.go:757: monitor failure: unexpected node event: 3: dead
(1) attached stack trace
| main.(*monitor).WaitE
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2459
| main.(*monitor).Wait
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2467
| main.runSysbench
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:117
| main.registerSysbench.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:138
| main.(*testRunner).runTest.func2
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:757
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1373
Wraps: (2) monitor failure
Wraps: (3) unexpected node event: 3: dead
Error types: (1) *withstack.withStack (2) *errutil.withMessage (3) *errors.errorString
cluster.go:1516,context.go:135,cluster.go:1505,test_runner.go:826: dead node detection: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod monitor teamcity-2079204-1594361493-101-n4cpu32 --oneshot --ignore-empty-nodes: exit status 1 4: skipped
3: dead
2: 4685
1: 4963
Error: UNCLASSIFIED_PROBLEM: 3: dead
(1) UNCLASSIFIED_PROBLEM
Wraps: (2) attached stack trace
| main.glob..func13
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1115
| main.wrap.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:266
| github.com/spf13/cobra.(*Command).execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:830
| github.com/spf13/cobra.(*Command).ExecuteC
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:914
| github.com/spf13/cobra.(*Command).Execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:864
| main.main
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1789
| runtime.main
| /usr/local/go/src/runtime/proc.go:203
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1373
Wraps: (3) 3 safe details enclosed
Wraps: (4) 3: dead
Error types: (1) errors.Unclassified (2) *withstack.withStack (3) *safedetails.withSafeDetails (4) *errors.errorString
```
<details><summary>More</summary><p>
Artifacts: [/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=artifacts#/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128)
[See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Asysbench%2Foltp_write_only%2Fnodes%3D3%2Fcpu%3D32%2Fconc%3D128.%2A&sort=title&restgroup=false&display=lastcommented+project)
<sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
| 2.0 | roachtest: sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed - [(roachtest).sysbench/oltp_write_only/nodes=3/cpu=32/conc=128 failed](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=buildLog) on [master@542c83e7db1694208e09c7fea7d350db4993b897](https://github.com/cockroachdb/cockroach/commits/542c83e7db1694208e09c7fea7d350db4993b897):
```
| signal: killed
| (1) signal: killed
| Error types: (1) *exec.ExitError
Wraps: (6) context canceled
Error types: (1) *withstack.withStack (2) *safedetails.withSafeDetails (3) *errutil.withMessage (4) *main.withCommandDetails (5) *secondary.withSecondaryError (6) *errors.errorString
cluster.go:2471,sysbench.go:117,sysbench.go:138,test_runner.go:757: monitor failure: unexpected node event: 3: dead
(1) attached stack trace
| main.(*monitor).WaitE
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2459
| main.(*monitor).Wait
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/cluster.go:2467
| main.runSysbench
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:117
| main.registerSysbench.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/sysbench.go:138
| main.(*testRunner).runTest.func2
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachtest/test_runner.go:757
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1373
Wraps: (2) monitor failure
Wraps: (3) unexpected node event: 3: dead
Error types: (1) *withstack.withStack (2) *errutil.withMessage (3) *errors.errorString
cluster.go:1516,context.go:135,cluster.go:1505,test_runner.go:826: dead node detection: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod monitor teamcity-2079204-1594361493-101-n4cpu32 --oneshot --ignore-empty-nodes: exit status 1 4: skipped
3: dead
2: 4685
1: 4963
Error: UNCLASSIFIED_PROBLEM: 3: dead
(1) UNCLASSIFIED_PROBLEM
Wraps: (2) attached stack trace
| main.glob..func13
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1115
| main.wrap.func1
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:266
| github.com/spf13/cobra.(*Command).execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:830
| github.com/spf13/cobra.(*Command).ExecuteC
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:914
| github.com/spf13/cobra.(*Command).Execute
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/vendor/github.com/spf13/cobra/command.go:864
| main.main
| /home/agent/work/.go/src/github.com/cockroachdb/cockroach/pkg/cmd/roachprod/main.go:1789
| runtime.main
| /usr/local/go/src/runtime/proc.go:203
| runtime.goexit
| /usr/local/go/src/runtime/asm_amd64.s:1373
Wraps: (3) 3 safe details enclosed
Wraps: (4) 3: dead
Error types: (1) errors.Unclassified (2) *withstack.withStack (3) *safedetails.withSafeDetails (4) *errors.errorString
```
<details><summary>More</summary><p>
Artifacts: [/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128](https://teamcity.cockroachdb.com/viewLog.html?buildId=2079204&tab=artifacts#/sysbench/oltp_write_only/nodes=3/cpu=32/conc=128)
[See this test on roachdash](https://roachdash.crdb.dev/?filter=status%3Aopen+t%3A.%2Asysbench%2Foltp_write_only%2Fnodes%3D3%2Fcpu%3D32%2Fconc%3D128.%2A&sort=title&restgroup=false&display=lastcommented+project)
<sub>powered by [pkg/cmd/internal/issues](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)</sub></p></details>
| non_priority | roachtest sysbench oltp write only nodes cpu conc failed on signal killed signal killed error types exec exiterror wraps context canceled error types withstack withstack safedetails withsafedetails errutil withmessage main withcommanddetails secondary withsecondaryerror errors errorstring cluster go sysbench go sysbench go test runner go monitor failure unexpected node event dead attached stack trace main monitor waite home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main monitor wait home agent work go src github com cockroachdb cockroach pkg cmd roachtest cluster go main runsysbench home agent work go src github com cockroachdb cockroach pkg cmd roachtest sysbench go main registersysbench home agent work go src github com cockroachdb cockroach pkg cmd roachtest sysbench go main testrunner runtest home agent work go src github com cockroachdb cockroach pkg cmd roachtest test runner go runtime goexit usr local go src runtime asm s wraps monitor failure wraps unexpected node event dead error types withstack withstack errutil withmessage errors errorstring cluster go context go cluster go test runner go dead node detection home agent work go src github com cockroachdb cockroach bin roachprod monitor teamcity oneshot ignore empty nodes exit status skipped dead error unclassified problem dead unclassified problem wraps attached stack trace main glob home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go main wrap home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go github com cobra command execute home agent work go src github com cockroachdb cockroach vendor github com cobra command go github com cobra command executec home agent work go src github com cockroachdb cockroach vendor github com cobra command go github com cobra command execute home agent work go src github com cockroachdb cockroach vendor github com cobra command go main main home agent work go src github com cockroachdb cockroach pkg cmd roachprod main go runtime main usr local go src runtime proc go runtime goexit usr local go src runtime asm s wraps safe details enclosed wraps dead error types errors unclassified withstack withstack safedetails withsafedetails errors errorstring more artifacts powered by | 0 |
32,039 | 13,751,942,517 | IssuesEvent | 2020-10-06 13:57:09 | terraform-providers/terraform-provider-aws | https://api.github.com/repos/terraform-providers/terraform-provider-aws | closed | aws_dynamodb_table returns name before resource is even created | bug service/dynamodb upstream-terraform | <!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform CLI and Terraform AWS Provider Version
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
Terraform v0.13.3
provider registry.terraform.io/hashicorp/aws v3.8.0
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* aws_dynamodb_table
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
resource "aws_dynamodb_table" "table" {
name = "somename"
...
}
data "aws_dynamodb_table" "table" {
name = aws_dynamodb_table.table.name
}
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
Data source waits for resource to be created
### Actual Behavior
<!--- What actually happened? --->
```
Error retrieving DynamoDB table: ResourceNotFoundException: Requested resource not found: Table: somename not found
```
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
This happens also during terraform refresh
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
* #0000
| 1.0 | aws_dynamodb_table returns name before resource is even created - <!---
Please note the following potential times when an issue might be in Terraform core:
* [Configuration Language](https://www.terraform.io/docs/configuration/index.html) or resource ordering issues
* [State](https://www.terraform.io/docs/state/index.html) and [State Backend](https://www.terraform.io/docs/backends/index.html) issues
* [Provisioner](https://www.terraform.io/docs/provisioners/index.html) issues
* [Registry](https://registry.terraform.io/) issues
* Spans resources across multiple providers
If you are running into one of these scenarios, we recommend opening an issue in the [Terraform core repository](https://github.com/hashicorp/terraform/) instead.
--->
<!--- Please keep this note for the community --->
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request
* Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
* If you are interested in working on this issue or have submitted a pull request, please leave a comment
<!--- Thank you for keeping this note for the community --->
### Terraform CLI and Terraform AWS Provider Version
<!--- Please run `terraform -v` to show the Terraform core version and provider version(s). If you are not running the latest version of Terraform or the provider, please upgrade because your issue may have already been fixed. [Terraform documentation on provider versioning](https://www.terraform.io/docs/configuration/providers.html#provider-versions). --->
Terraform v0.13.3
provider registry.terraform.io/hashicorp/aws v3.8.0
### Affected Resource(s)
<!--- Please list the affected resources and data sources. --->
* aws_dynamodb_table
### Terraform Configuration Files
<!--- Information about code formatting: https://help.github.com/articles/basic-writing-and-formatting-syntax/#quoting-code --->
```hcl
resource "aws_dynamodb_table" "table" {
name = "somename"
...
}
data "aws_dynamodb_table" "table" {
name = aws_dynamodb_table.table.name
}
```
### Debug Output
<!---
Please provide a link to a GitHub Gist containing the complete debug output. Please do NOT paste the debug output in the issue; just paste a link to the Gist.
To obtain the debug output, see the [Terraform documentation on debugging](https://www.terraform.io/docs/internals/debugging.html).
--->
### Panic Output
<!--- If Terraform produced a panic, please provide a link to a GitHub Gist containing the output of the `crash.log`. --->
### Expected Behavior
<!--- What should have happened? --->
Data source waits for resource to be created
### Actual Behavior
<!--- What actually happened? --->
```
Error retrieving DynamoDB table: ResourceNotFoundException: Requested resource not found: Table: somename not found
```
### Steps to Reproduce
<!--- Please list the steps required to reproduce the issue. --->
1. `terraform apply`
### Important Factoids
<!--- Are there anything atypical about your accounts that we should know? For example: Running in EC2 Classic? --->
This happens also during terraform refresh
### References
<!---
Information about referencing Github Issues: https://help.github.com/articles/basic-writing-and-formatting-syntax/#referencing-issues-and-pull-requests
Are there any other GitHub issues (open or closed) or pull requests that should be linked here? Vendor documentation? For example:
--->
* #0000
| non_priority | aws dynamodb table returns name before resource is even created please note the following potential times when an issue might be in terraform core or resource ordering issues and issues issues issues spans resources across multiple providers if you are running into one of these scenarios we recommend opening an issue in the instead community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform cli and terraform aws provider version terraform provider registry terraform io hashicorp aws affected resource s aws dynamodb table terraform configuration files hcl resource aws dynamodb table table name somename data aws dynamodb table table name aws dynamodb table table name debug output please provide a link to a github gist containing the complete debug output please do not paste the debug output in the issue just paste a link to the gist to obtain the debug output see the panic output expected behavior data source waits for resource to be created actual behavior error retrieving dynamodb table resourcenotfoundexception requested resource not found table somename not found steps to reproduce terraform apply important factoids this happens also during terraform refresh references information about referencing github issues are there any other github issues open or closed or pull requests that should be linked here vendor documentation for example | 0 |
54,860 | 23,346,038,637 | IssuesEvent | 2022-08-09 18:04:16 | cityofaustin/atd-data-tech | https://api.github.com/repos/cityofaustin/atd-data-tech | closed | Explore React Testing Library for testing React components and web maps | Service: Dev Type: Research | **Docs and videos**
- https://testing-library.com/docs/react-testing-library/intro/
- https://blog.sapegin.me/all/react-testing-3-jest-and-react-testing-library/
- https://www.youtube.com/watch?v=7dTTFW7yACQ
- https://github.com/visgl/react-map-gl/issues/210
- https://blog.wick.technology/testing-react-map/
- https://stackoverflow.com/questions/66051265/testing-react-map-gl-with-jest-and-react-testing-library-timeout
Goal
- Add tests to the PR that I've been working on to refactor the user management features in Moped Editor
- Stretch goal: Circle back on the tests for the Moped API and refresh myself on pytest and check in on if those are passing
**Questions**
- Is there any setup that I need to do to get this library working? | 1.0 | Explore React Testing Library for testing React components and web maps - **Docs and videos**
- https://testing-library.com/docs/react-testing-library/intro/
- https://blog.sapegin.me/all/react-testing-3-jest-and-react-testing-library/
- https://www.youtube.com/watch?v=7dTTFW7yACQ
- https://github.com/visgl/react-map-gl/issues/210
- https://blog.wick.technology/testing-react-map/
- https://stackoverflow.com/questions/66051265/testing-react-map-gl-with-jest-and-react-testing-library-timeout
Goal
- Add tests to the PR that I've been working on to refactor the user management features in Moped Editor
- Stretch goal: Circle back on the tests for the Moped API and refresh myself on pytest and check in on if those are passing
**Questions**
- Is there any setup that I need to do to get this library working? | non_priority | explore react testing library for testing react components and web maps docs and videos goal add tests to the pr that i ve been working on to refactor the user management features in moped editor stretch goal circle back on the tests for the moped api and refresh myself on pytest and check in on if those are passing questions is there any setup that i need to do to get this library working | 0 |
171,631 | 20,984,629,066 | IssuesEvent | 2022-03-29 00:49:42 | fdm-monster/fdm-monster-client | https://api.github.com/repos/fdm-monster/fdm-monster-client | opened | cypress-9.5.3.tgz: 1 vulnerabilities (highest severity is: 7.5) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cypress-9.5.3.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/qs/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-44907](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.5.3.tgz | Transitive | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44907</summary>
### Vulnerable Library - <b>qs-6.5.3.tgz</b></p>
<p>A querystring parser that supports nesting and arrays, with a depth limit</p>
<p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.5.3.tgz">https://registry.npmjs.org/qs/-/qs-6.5.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/qs/package.json</p>
<p>
Dependency Hierarchy:
- cypress-9.5.3.tgz (Root Library)
- request-2.88.10.tgz
- :x: **qs-6.5.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.
<p>Publish Date: 2022-03-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907>CVE-2021-44907</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907</a></p>
<p>Release Date: 2022-03-17</p>
<p>Fix Resolution: qs - 6.8.1</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"6.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"cypress:9.5.3;@cypress/request:2.88.10;qs:6.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 6.8.1","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-44907","vulnerabilityDetails":"A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> --> | True | cypress-9.5.3.tgz: 1 vulnerabilities (highest severity is: 7.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cypress-9.5.3.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/qs/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2021-44907](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.5.3.tgz | Transitive | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44907</summary>
### Vulnerable Library - <b>qs-6.5.3.tgz</b></p>
<p>A querystring parser that supports nesting and arrays, with a depth limit</p>
<p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.5.3.tgz">https://registry.npmjs.org/qs/-/qs-6.5.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/qs/package.json</p>
<p>
Dependency Hierarchy:
- cypress-9.5.3.tgz (Root Library)
- request-2.88.10.tgz
- :x: **qs-6.5.3.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fdm-monster/fdm-monster-client/commit/4ff37d1ca626738d4c0fb287afc13a79e8086687">4ff37d1ca626738d4c0fb287afc13a79e8086687</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.
<p>Publish Date: 2022-03-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907>CVE-2021-44907</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907</a></p>
<p>Release Date: 2022-03-17</p>
<p>Fix Resolution: qs - 6.8.1</p>
</p>
<p></p>
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details>
<!-- <REMEDIATE>[{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"qs","packageVersion":"6.5.3","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"cypress:9.5.3;@cypress/request:2.88.10;qs:6.5.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"qs - 6.8.1","isBinary":false}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2021-44907","vulnerabilityDetails":"A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> --> | non_priority | cypress tgz vulnerabilities highest severity is vulnerable library cypress tgz path to dependency file package json path to vulnerable library node modules qs package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high qs tgz transitive n a details cve vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy cypress tgz root library request tgz x qs tgz vulnerable library found in head commit a href found in base branch develop vulnerability details a denial of service vulnerability exists in qs up to due to insufficient sanitization of property in the gs parse function the merge function allows the assignment of properties on an array in the query for any property being assigned a value in the array is converted to an object containing these properties essentially this means that the property whose expected type is array always has to be checked with array isarray by the user this may not be obvious to the user and can cause unexpected behavior publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs step up your open source security game with whitesource istransitivedependency true dependencytree cypress cypress request qs isminimumfixversionavailable true minimumfixversion qs isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a denial of service vulnerability exists in qs up to due to insufficient sanitization of property in the gs parse function the merge function allows the assignment of properties on an array in the query for any property being assigned a value in the array is converted to an object containing these properties essentially this means that the property whose expected type is array always has to be checked with array isarray by the user this may not be obvious to the user and can cause unexpected behavior vulnerabilityurl | 0 |
65,036 | 7,854,315,123 | IssuesEvent | 2018-06-20 20:21:43 | Azure/azure-functions-ux | https://api.github.com/repos/Azure/azure-functions-ux | closed | Validate Azure Files storage account | Runtime pending-design | Today, if a customer deletes the storage account backing the content share, the function app is left in a broken state and the portal doesn't show any information about what is going on.
It would be good if the portal could validate the storage account when failures to talk to Kudu occur (calls to getfunctions, etc) so we can provide a detailed message to the customer so they know what needs to be done. | 1.0 | Validate Azure Files storage account - Today, if a customer deletes the storage account backing the content share, the function app is left in a broken state and the portal doesn't show any information about what is going on.
It would be good if the portal could validate the storage account when failures to talk to Kudu occur (calls to getfunctions, etc) so we can provide a detailed message to the customer so they know what needs to be done. | non_priority | validate azure files storage account today if a customer deletes the storage account backing the content share the function app is left in a broken state and the portal doesn t show any information about what is going on it would be good if the portal could validate the storage account when failures to talk to kudu occur calls to getfunctions etc so we can provide a detailed message to the customer so they know what needs to be done | 0 |
67,162 | 9,011,405,489 | IssuesEvent | 2019-02-05 14:37:28 | Braeden261/kendoSchool | https://api.github.com/repos/Braeden261/kendoSchool | closed | KG-03: Define High Level Resource Plan | Documentation | Use the Estimation Spreadsheet to put a rough plan together for the hours required each week to achieve MVP goals. | 1.0 | KG-03: Define High Level Resource Plan - Use the Estimation Spreadsheet to put a rough plan together for the hours required each week to achieve MVP goals. | non_priority | kg define high level resource plan use the estimation spreadsheet to put a rough plan together for the hours required each week to achieve mvp goals | 0 |
98,539 | 20,752,707,398 | IssuesEvent | 2022-03-15 09:17:01 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | New Menu Item Error: 0 array_key_exists(): Argument #2 ($array) must be of type array, stdClass given | No Code Attached Yet | ### Steps to reproduce the issue
With PHP8 (8.0.8, 8.1.0) I get the above error when i try to add a new menu item
With PHP7 (7.4.28) all works fine
### Expected result
### Actual result
### System information (as much as possible)
Setting Value
PHP Built On Linux
Database Type mysql
Database Version 8.0.26
Database Collation utf8mb4_0900_ai_ci
Database Connection Collation utf8mb4_0900_ai_ci
PHP Version 8.0.8
Web Server Apache
WebServer to PHP Interface cgi-fcgi
Joomla! Version Joomla! 3.10.6 Stable [ Daraja ] 12-February-2022 17:04 GMT
Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT
User Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
### Additional comments
| 1.0 | New Menu Item Error: 0 array_key_exists(): Argument #2 ($array) must be of type array, stdClass given - ### Steps to reproduce the issue
With PHP8 (8.0.8, 8.1.0) I get the above error when i try to add a new menu item
With PHP7 (7.4.28) all works fine
### Expected result
### Actual result
### System information (as much as possible)
Setting Value
PHP Built On Linux
Database Type mysql
Database Version 8.0.26
Database Collation utf8mb4_0900_ai_ci
Database Connection Collation utf8mb4_0900_ai_ci
PHP Version 8.0.8
Web Server Apache
WebServer to PHP Interface cgi-fcgi
Joomla! Version Joomla! 3.10.6 Stable [ Daraja ] 12-February-2022 17:04 GMT
Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT
User Agent Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:98.0) Gecko/20100101 Firefox/98.0
### Additional comments
| non_priority | new menu item error array key exists argument array must be of type array stdclass given steps to reproduce the issue with i get the above error when i try to add a new menu item with all works fine expected result actual result system information as much as possible setting value php built on linux database type mysql database version database collation ai ci database connection collation ai ci php version web server apache webserver to php interface cgi fcgi joomla version joomla stable february gmt joomla platform version joomla platform stable apr gmt user agent mozilla windows nt rv gecko firefox additional comments | 0 |
76,220 | 9,922,959,424 | IssuesEvent | 2019-07-01 05:29:12 | Alexander-Miller/treemacs | https://api.github.com/repos/Alexander-Miller/treemacs | closed | Split readme keymap section | Documentation Enhancement | Now that the keybindings are split over several maps the readme should do the same. | 1.0 | Split readme keymap section - Now that the keybindings are split over several maps the readme should do the same. | non_priority | split readme keymap section now that the keybindings are split over several maps the readme should do the same | 0 |
2,547 | 8,675,068,872 | IssuesEvent | 2018-11-30 09:48:02 | citrusframework/citrus | https://api.github.com/repos/citrusframework/citrus | opened | Breaking change in waitFor().message() | Prio: High READY Type: Maintainance | **Citrus Version**
>= 2.7.7
**Description**
If you upgrade your Citrus version to 2.7.7 or higher, we've a breaking change in the http wait builder API. We'll correct this with one of the future releases to ensure effortless version upgrades
**API before change**
```java
waitFor().message("message");
```
**API after change**
```java
waitFor().message().name("message");
```
**Additional information**
* Issue:#417
* Commit: https://github.com/citrusframework/citrus/commit/515e840f9133383d19304916db197ce5fdb9ac83#diff-f106d4946b18253678933a5267aa2540R82
BR,
Sven | True | Breaking change in waitFor().message() - **Citrus Version**
>= 2.7.7
**Description**
If you upgrade your Citrus version to 2.7.7 or higher, we've a breaking change in the http wait builder API. We'll correct this with one of the future releases to ensure effortless version upgrades
**API before change**
```java
waitFor().message("message");
```
**API after change**
```java
waitFor().message().name("message");
```
**Additional information**
* Issue:#417
* Commit: https://github.com/citrusframework/citrus/commit/515e840f9133383d19304916db197ce5fdb9ac83#diff-f106d4946b18253678933a5267aa2540R82
BR,
Sven | non_priority | breaking change in waitfor message citrus version description if you upgrade your citrus version to or higher we ve a breaking change in the http wait builder api we ll correct this with one of the future releases to ensure effortless version upgrades api before change java waitfor message message api after change java waitfor message name message additional information issue commit br sven | 0 |
11,474 | 9,376,843,829 | IssuesEvent | 2019-04-04 08:56:35 | MicrosoftDocs/azure-docs | https://api.github.com/repos/MicrosoftDocs/azure-docs | closed | When using a User Assigned Managed identity, SQL login fails when the identity is assigned to an Active Directory Group | app-service-web/svc cxp in-progress product-question sql-database/svc triaged | I'm using a User assigned managed identity assigned to an AAD Group. This group is then in turn assigned to the Azure SQL Database using the CREATE USER FROM EXTERNAL PROVIDER call as above. Attempting to connect to the database via a .net core 2.2 application results in SqlException: Login failed for user '<UPN>'.
If I assign the Managed Identity by display name to the same database, the connection succeeds.
Is this a supported scenario - should this be working?
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 31b0d33c-f88e-d50c-2926-7933940f3b92
* Version Independent ID: 4aaef906-f501-6947-5d23-1b704470f09d
* Content: [Secure SQL Database connection with managed identity - Azure App Service](https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-connect-msi)
* Content Source: [articles/app-service/app-service-web-tutorial-connect-msi.md](https://github.com/Microsoft/azure-docs/blob/master/articles/app-service/app-service-web-tutorial-connect-msi.md)
* Service: **app-service-web**
* GitHub Login: @cephalin
* Microsoft Alias: **cephalin** | 1.0 | When using a User Assigned Managed identity, SQL login fails when the identity is assigned to an Active Directory Group - I'm using a User assigned managed identity assigned to an AAD Group. This group is then in turn assigned to the Azure SQL Database using the CREATE USER FROM EXTERNAL PROVIDER call as above. Attempting to connect to the database via a .net core 2.2 application results in SqlException: Login failed for user '<UPN>'.
If I assign the Managed Identity by display name to the same database, the connection succeeds.
Is this a supported scenario - should this be working?
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 31b0d33c-f88e-d50c-2926-7933940f3b92
* Version Independent ID: 4aaef906-f501-6947-5d23-1b704470f09d
* Content: [Secure SQL Database connection with managed identity - Azure App Service](https://docs.microsoft.com/en-us/azure/app-service/app-service-web-tutorial-connect-msi)
* Content Source: [articles/app-service/app-service-web-tutorial-connect-msi.md](https://github.com/Microsoft/azure-docs/blob/master/articles/app-service/app-service-web-tutorial-connect-msi.md)
* Service: **app-service-web**
* GitHub Login: @cephalin
* Microsoft Alias: **cephalin** | non_priority | when using a user assigned managed identity sql login fails when the identity is assigned to an active directory group i m using a user assigned managed identity assigned to an aad group this group is then in turn assigned to the azure sql database using the create user from external provider call as above attempting to connect to the database via a net core application results in sqlexception login failed for user lt upn gt if i assign the managed identity by display name to the same database the connection succeeds is this a supported scenario should this be working document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service app service web github login cephalin microsoft alias cephalin | 0 |
36,630 | 12,418,153,420 | IssuesEvent | 2020-05-22 23:01:13 | wrbejar/wrbejar-Nova8Ksa | https://api.github.com/repos/wrbejar/wrbejar-Nova8Ksa | opened | CVE-2016-1000031 (High) detected in commons-fileupload-1.2.2.jar | security vulnerability | ## CVE-2016-1000031 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-fileupload-1.2.2.jar</b></p></summary>
<p>The FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Path to dependency file: /tmp/ws-scm/wrbejar-Nova8Ksa/ksa-web-root/ksa-finance-web/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/wrbejar-Nova8Ksa/ksa-web-root/ksa-web/target/ROOT/WEB-INF/lib/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar</p>
<p>
Dependency Hierarchy:
- struts2-core-2.3.31.jar (Root Library)
- :x: **commons-fileupload-1.2.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/wrbejar/wrbejar-Nova8Ksa/commit/83ef1f263a13b2d9fe245f311088690d2c3c248d">83ef1f263a13b2d9fe245f311088690d2c3c248d</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
<p>Publish Date: 2016-10-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p>
<p>Release Date: 2016-10-25</p>
<p>Fix Resolution: 1.3.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-fileupload","packageName":"commons-fileupload","packageVersion":"1.2.2","isTransitiveDependency":true,"dependencyTree":"org.apache.struts:struts2-core:2.3.31;commons-fileupload:commons-fileupload:1.2.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.3"}],"vulnerabilityIdentifier":"CVE-2016-1000031","vulnerabilityDetails":"Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2016-1000031 (High) detected in commons-fileupload-1.2.2.jar - ## CVE-2016-1000031 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-fileupload-1.2.2.jar</b></p></summary>
<p>The FileUpload component provides a simple yet flexible means of adding support for multipart
file upload functionality to servlets and web applications.</p>
<p>Path to dependency file: /tmp/ws-scm/wrbejar-Nova8Ksa/ksa-web-root/ksa-finance-web/pom.xml</p>
<p>Path to vulnerable library: /root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/wrbejar-Nova8Ksa/ksa-web-root/ksa-web/target/ROOT/WEB-INF/lib/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar,/root/.m2/repository/commons-fileupload/commons-fileupload/1.2.2/commons-fileupload-1.2.2.jar</p>
<p>
Dependency Hierarchy:
- struts2-core-2.3.31.jar (Root Library)
- :x: **commons-fileupload-1.2.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/wrbejar/wrbejar-Nova8Ksa/commit/83ef1f263a13b2d9fe245f311088690d2c3c248d">83ef1f263a13b2d9fe245f311088690d2c3c248d</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
<p>Publish Date: 2016-10-25
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031>CVE-2016-1000031</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1000031</a></p>
<p>Release Date: 2016-10-25</p>
<p>Fix Resolution: 1.3.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-fileupload","packageName":"commons-fileupload","packageVersion":"1.2.2","isTransitiveDependency":true,"dependencyTree":"org.apache.struts:struts2-core:2.3.31;commons-fileupload:commons-fileupload:1.2.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.3.3"}],"vulnerabilityIdentifier":"CVE-2016-1000031","vulnerabilityDetails":"Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-1000031","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in commons fileupload jar cve high severity vulnerability vulnerable library commons fileupload jar the fileupload component provides a simple yet flexible means of adding support for multipart file upload functionality to servlets and web applications path to dependency file tmp ws scm wrbejar ksa web root ksa finance web pom xml path to vulnerable library root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar wrbejar ksa web root ksa web target root web inf lib commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar root repository commons fileupload commons fileupload commons fileupload jar dependency hierarchy core jar root library x commons fileupload jar vulnerable library found in head commit a href vulnerability details apache commons fileupload before diskfileitem file manipulation remote code execution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails apache commons fileupload before diskfileitem file manipulation remote code execution vulnerabilityurl | 0 |
172,064 | 27,229,461,608 | IssuesEvent | 2023-02-21 12:09:18 | ProgrammingPhilippines/project_rei | https://api.github.com/repos/ProgrammingPhilippines/project_rei | opened | Shop Module & Game Economics | 🎯 Gameplay 💻 Engineering 💬 User Interface 🗯 User Experience 🖼 Game Design | We'll need to implement a shop system that will sell "items" to the player for upgrades, consumables/useables, weapons. This will function similar to an inventory system.
We'll also need to implement currency that goes with purchasing items. | 1.0 | Shop Module & Game Economics - We'll need to implement a shop system that will sell "items" to the player for upgrades, consumables/useables, weapons. This will function similar to an inventory system.
We'll also need to implement currency that goes with purchasing items. | non_priority | shop module game economics we ll need to implement a shop system that will sell items to the player for upgrades consumables useables weapons this will function similar to an inventory system we ll also need to implement currency that goes with purchasing items | 0 |
67,955 | 8,204,155,841 | IssuesEvent | 2018-09-03 04:40:58 | brave/browser-laptop | https://api.github.com/repos/brave/browser-laptop | closed | Tab opening enhancement | design feature/tab-page feature/tabsbar stale suggestion | ### Description
This happens when you're on the last tab at 1st page, and every new tab would be opening on the page 2 (http://prntscr.com/hxmhwm).
If you start opening new tabs from the last tab on page 1, you will know only if the first one opened successfully because an arrow will appear at the end of tab bar.
But after this first tab in the page 2 you won't be getting any other indicators that the new tabs are getting successfully opened in page 2.
### Steps to Reproduce
1. Open 20 tabs to fill page 1
2. Inside the last tab (so that all new tabs get opened in the page 2) start clicking links holding "CTRL+" to open new tabs
3. You'll know that the first tab successfully opened in page 2 because the arrow will appear at the end of the tab bar on the page 1, but there will be no other indicators that you kept opening tabs #22,23,24... successfully.
**Actual result:**
http://prntscr.com/hxmoto
**Expected result:**
In my opinion it would be an enhancement if the arrow which leads to page 2 of tabs would blink every time we click links while we're in opening tabs in the new tab page. | 1.0 | Tab opening enhancement - ### Description
This happens when you're on the last tab at 1st page, and every new tab would be opening on the page 2 (http://prntscr.com/hxmhwm).
If you start opening new tabs from the last tab on page 1, you will know only if the first one opened successfully because an arrow will appear at the end of tab bar.
But after this first tab in the page 2 you won't be getting any other indicators that the new tabs are getting successfully opened in page 2.
### Steps to Reproduce
1. Open 20 tabs to fill page 1
2. Inside the last tab (so that all new tabs get opened in the page 2) start clicking links holding "CTRL+" to open new tabs
3. You'll know that the first tab successfully opened in page 2 because the arrow will appear at the end of the tab bar on the page 1, but there will be no other indicators that you kept opening tabs #22,23,24... successfully.
**Actual result:**
http://prntscr.com/hxmoto
**Expected result:**
In my opinion it would be an enhancement if the arrow which leads to page 2 of tabs would blink every time we click links while we're in opening tabs in the new tab page. | non_priority | tab opening enhancement description this happens when you re on the last tab at page and every new tab would be opening on the page if you start opening new tabs from the last tab on page you will know only if the first one opened successfully because an arrow will appear at the end of tab bar but after this first tab in the page you won t be getting any other indicators that the new tabs are getting successfully opened in page steps to reproduce open tabs to fill page inside the last tab so that all new tabs get opened in the page start clicking links holding ctrl to open new tabs you ll know that the first tab successfully opened in page because the arrow will appear at the end of the tab bar on the page but there will be no other indicators that you kept opening tabs successfully actual result expected result in my opinion it would be an enhancement if the arrow which leads to page of tabs would blink every time we click links while we re in opening tabs in the new tab page | 0 |
385,303 | 26,630,331,527 | IssuesEvent | 2023-01-24 17:20:06 | eclipse/lsp4jakarta | https://api.github.com/repos/eclipse/lsp4jakarta | closed | Document what is supported in which release of LSP4Jakarta | documentation | Document or at least summarise what capabilities (coding assistance) are supported in which release of LSP4Jakarta.
e.g., translate what is captured in https://github.com/eclipse/lsp4jakarta/issues/16 to an end-user (developer) consumable information mapping to the corresponding release(s) of the language server. | 1.0 | Document what is supported in which release of LSP4Jakarta - Document or at least summarise what capabilities (coding assistance) are supported in which release of LSP4Jakarta.
e.g., translate what is captured in https://github.com/eclipse/lsp4jakarta/issues/16 to an end-user (developer) consumable information mapping to the corresponding release(s) of the language server. | non_priority | document what is supported in which release of document or at least summarise what capabilities coding assistance are supported in which release of e g translate what is captured in to an end user developer consumable information mapping to the corresponding release s of the language server | 0 |
27,347 | 11,473,741,583 | IssuesEvent | 2020-02-10 01:00:13 | whitesource-yossi/datahelix | https://api.github.com/repos/whitesource-yossi/datahelix | opened | CVE-2017-18640 (High) detected in snakeyaml-1.23.jar | security vulnerability | ## CVE-2017-18640 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.23.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p>
<p>Path to dependency file: /tmp/ws-scm/datahelix/core/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar,/tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar</p>
<p>
Dependency Hierarchy:
- javafaker-1.0.1.jar (Root Library)
- :x: **snakeyaml-1.23.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
<p>Publish Date: 2019-12-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640>CVE-2017-18640</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.yaml","packageName":"snakeyaml","packageVersion":"1.23","isTransitiveDependency":true,"dependencyTree":"com.github.javafaker:javafaker:1.0.1;org.yaml:snakeyaml:1.23","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2017-18640","vulnerabilityDetails":"The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2017-18640 (High) detected in snakeyaml-1.23.jar - ## CVE-2017-18640 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>snakeyaml-1.23.jar</b></p></summary>
<p>YAML 1.1 parser and emitter for Java</p>
<p>Library home page: <a href="http://www.snakeyaml.org">http://www.snakeyaml.org</a></p>
<p>Path to dependency file: /tmp/ws-scm/datahelix/core/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar,/tmp/ws-ua/downloadResource_44fd4555-ef64-40c5-8555-fa5d37e96ffa/20191229130047/snakeyaml-1.23.jar</p>
<p>
Dependency Hierarchy:
- javafaker-1.0.1.jar (Root Library)
- :x: **snakeyaml-1.23.jar** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.
<p>Publish Date: 2019-12-12
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640>CVE-2017-18640</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.yaml","packageName":"snakeyaml","packageVersion":"1.23","isTransitiveDependency":true,"dependencyTree":"com.github.javafaker:javafaker:1.0.1;org.yaml:snakeyaml:1.23","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2017-18640","vulnerabilityDetails":"The Alias feature in SnakeYAML 1.18 allows entity expansion during a load operation, a related issue to CVE-2003-1564.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-18640","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in snakeyaml jar cve high severity vulnerability vulnerable library snakeyaml jar yaml parser and emitter for java library home page a href path to dependency file tmp ws scm datahelix core build gradle path to vulnerable library tmp ws ua downloadresource snakeyaml jar tmp ws ua downloadresource snakeyaml jar dependency hierarchy javafaker jar root library x snakeyaml jar vulnerable library vulnerability details the alias feature in snakeyaml allows entity expansion during a load operation a related issue to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the alias feature in snakeyaml allows entity expansion during a load operation a related issue to cve vulnerabilityurl | 0 |
189,373 | 15,186,899,772 | IssuesEvent | 2021-02-15 13:03:45 | arturo-lang/arturo | https://api.github.com/repos/arturo-lang/arturo | closed | [Sets\union] add example for documentation | documentation easy library todo | [Sets\union] add example for documentation
https://github.com/arturo-lang/arturo/blob/de6b44acd21e2d88248ccc42e565c2fabc5637a5/src/library/Sets.nim#L90
```text
# (c) 2019-2021 Yanis Zafirópulos
#
# @file: library/Sets.nim
######################################################
#=======================================
# Pragmas
#=======================================
{.used.}
#=======================================
# Libraries
#=======================================
import sequtils, std/sets
import vm/[common, globals, stack, value]
#=======================================
# Methods
#=======================================
proc defineSymbols*() =
when defined(VERBOSE):
echo "- Importing: Sets"
builtin "difference",
alias = unaliased,
rule = PrefixPrecedence,
description = "return the difference of given sets",
args = {
"setA" : {Block,Literal},
"setB" : {Block}
},
attrs = {
"symmetric" : ({Boolean},"get the symmetric difference")
},
returns = {Block,Nothing},
# TODO(Sets\difference) add example for documentation
# labels: library,documentation,easy
example = """
""":
##########################################################
if (popAttr("symmetric")!=VNULL):
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(symmetricDifference(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(symmetricDifference(toHashSet(x.a), toHashSet(y.a)))))
else:
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(difference(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(difference(toHashSet(x.a), toHashSet(y.a)))))
builtin "intersection",
alias = unaliased,
rule = PrefixPrecedence,
description = "return the intersection of given sets",
args = {
"setA" : {Block,Literal},
"setB" : {Block}
},
attrs = NoAttrs,
returns = {Block,Nothing},
# TODO(Sets\intersection) add example for documentation
# labels: library,documentation,easy
example = """
""":
##########################################################
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(intersection(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(intersection(toHashSet(x.a), toHashSet(y.a)))))
builtin "union",
alias = unaliased,
rule = PrefixPrecedence,
description = "return the union of given sets",
args = {
"setA" : {Block,Literal},
"setB" : {Block}
},
attrs = NoAttrs,
returns = {Block,Nothing},
# TODO(Sets\union) add example for documentation
# labels: library,documentation,easy
example = """
""":
##########################################################
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(union(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(union(toHashSet(x.a), toHashSet(y.a)))))
#=======================================
# Add Library
#=======================================
Libraries.add(defineSymbols)
No newline at end of file
ndex 01a4d706..fe6a7c5e 100644
++ b/src/vm/vm.nim
```
1f96271f95cba351d83e4791a12b0df0d72a49c0 | 1.0 | [Sets\union] add example for documentation - [Sets\union] add example for documentation
https://github.com/arturo-lang/arturo/blob/de6b44acd21e2d88248ccc42e565c2fabc5637a5/src/library/Sets.nim#L90
```text
# (c) 2019-2021 Yanis Zafirópulos
#
# @file: library/Sets.nim
######################################################
#=======================================
# Pragmas
#=======================================
{.used.}
#=======================================
# Libraries
#=======================================
import sequtils, std/sets
import vm/[common, globals, stack, value]
#=======================================
# Methods
#=======================================
proc defineSymbols*() =
when defined(VERBOSE):
echo "- Importing: Sets"
builtin "difference",
alias = unaliased,
rule = PrefixPrecedence,
description = "return the difference of given sets",
args = {
"setA" : {Block,Literal},
"setB" : {Block}
},
attrs = {
"symmetric" : ({Boolean},"get the symmetric difference")
},
returns = {Block,Nothing},
# TODO(Sets\difference) add example for documentation
# labels: library,documentation,easy
example = """
""":
##########################################################
if (popAttr("symmetric")!=VNULL):
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(symmetricDifference(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(symmetricDifference(toHashSet(x.a), toHashSet(y.a)))))
else:
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(difference(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(difference(toHashSet(x.a), toHashSet(y.a)))))
builtin "intersection",
alias = unaliased,
rule = PrefixPrecedence,
description = "return the intersection of given sets",
args = {
"setA" : {Block,Literal},
"setB" : {Block}
},
attrs = NoAttrs,
returns = {Block,Nothing},
# TODO(Sets\intersection) add example for documentation
# labels: library,documentation,easy
example = """
""":
##########################################################
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(intersection(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(intersection(toHashSet(x.a), toHashSet(y.a)))))
builtin "union",
alias = unaliased,
rule = PrefixPrecedence,
description = "return the union of given sets",
args = {
"setA" : {Block,Literal},
"setB" : {Block}
},
attrs = NoAttrs,
returns = {Block,Nothing},
# TODO(Sets\union) add example for documentation
# labels: library,documentation,easy
example = """
""":
##########################################################
if x.kind==Literal:
Syms[x.s] = newBlock(toSeq(union(toHashSet(Syms[x.s].a), toHashSet(y.a))))
else:
stack.push(newBlock(toSeq(union(toHashSet(x.a), toHashSet(y.a)))))
#=======================================
# Add Library
#=======================================
Libraries.add(defineSymbols)
No newline at end of file
ndex 01a4d706..fe6a7c5e 100644
++ b/src/vm/vm.nim
```
1f96271f95cba351d83e4791a12b0df0d72a49c0 | non_priority | add example for documentation add example for documentation text c yanis zafirópulos file library sets nim pragmas used libraries import sequtils std sets import vm methods proc definesymbols when defined verbose echo importing sets builtin difference alias unaliased rule prefixprecedence description return the difference of given sets args seta block literal setb block attrs symmetric boolean get the symmetric difference returns block nothing todo sets difference add example for documentation labels library documentation easy example if popattr symmetric vnull if x kind literal syms newblock toseq symmetricdifference tohashset syms a tohashset y a else stack push newblock toseq symmetricdifference tohashset x a tohashset y a else if x kind literal syms newblock toseq difference tohashset syms a tohashset y a else stack push newblock toseq difference tohashset x a tohashset y a builtin intersection alias unaliased rule prefixprecedence description return the intersection of given sets args seta block literal setb block attrs noattrs returns block nothing todo sets intersection add example for documentation labels library documentation easy example if x kind literal syms newblock toseq intersection tohashset syms a tohashset y a else stack push newblock toseq intersection tohashset x a tohashset y a builtin union alias unaliased rule prefixprecedence description return the union of given sets args seta block literal setb block attrs noattrs returns block nothing todo sets union add example for documentation labels library documentation easy example if x kind literal syms newblock toseq union tohashset syms a tohashset y a else stack push newblock toseq union tohashset x a tohashset y a add library libraries add definesymbols no newline at end of file ndex b src vm vm nim | 0 |
173,842 | 21,182,114,020 | IssuesEvent | 2022-04-08 08:58:55 | OTTIN-T/OttinTimothe_5_27112020 | https://api.github.com/repos/OTTIN-T/OttinTimothe_5_27112020 | closed | WS-2019-0605 (Medium) detected in CSS::Sassv3.4.11 - autoclosed | security vulnerability | ## WS-2019-0605 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>CSS::Sassv3.4.11</b></p></summary>
<p>
<p>Library home page: <a href=https://metacpan.org/pod/CSS::Sass>https://metacpan.org/pod/CSS::Sass</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/node_modules/node-sass/src/libsass/src/lexer.cpp</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In sass versions between 3.2.0 to 3.6.3 may read 1 byte outside an allocated buffer while parsing a specially crafted css rule.
<p>Publish Date: 2019-07-16
<p>URL: <a href=https://github.com/sass/libsass/commit/7a21c79e321927363a153dc5d7e9c492365faf9b>WS-2019-0605</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/OSV-2020-734">https://osv.dev/vulnerability/OSV-2020-734</a></p>
<p>Release Date: 2019-07-16</p>
<p>Fix Resolution: 3.6.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2019-0605 (Medium) detected in CSS::Sassv3.4.11 - autoclosed - ## WS-2019-0605 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>CSS::Sassv3.4.11</b></p></summary>
<p>
<p>Library home page: <a href=https://metacpan.org/pod/CSS::Sass>https://metacpan.org/pod/CSS::Sass</a></p>
<p>Found in base branch: <b>main</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/node_modules/node-sass/src/libsass/src/lexer.cpp</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In sass versions between 3.2.0 to 3.6.3 may read 1 byte outside an allocated buffer while parsing a specially crafted css rule.
<p>Publish Date: 2019-07-16
<p>URL: <a href=https://github.com/sass/libsass/commit/7a21c79e321927363a153dc5d7e9c492365faf9b>WS-2019-0605</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://osv.dev/vulnerability/OSV-2020-734">https://osv.dev/vulnerability/OSV-2020-734</a></p>
<p>Release Date: 2019-07-16</p>
<p>Fix Resolution: 3.6.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in css autoclosed ws medium severity vulnerability vulnerable library css library home page a href found in base branch main vulnerable source files node modules node sass src libsass src lexer cpp vulnerability details in sass versions between to may read byte outside an allocated buffer while parsing a specially crafted css rule publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
62,147 | 15,170,050,117 | IssuesEvent | 2021-02-12 22:21:44 | lbl-srg/modelica-buildings | https://api.github.com/repos/lbl-srg/modelica-buildings | opened | Add default vendor annotation to generate point list | OpenBuildingControl | This issue is to add vendor annotation to the cdl control sequences, for generating point list. See [section 7.7.4 Point list](http://obc.lbl.gov/specification/cdl.html#point-list) of OBC specification. | 1.0 | Add default vendor annotation to generate point list - This issue is to add vendor annotation to the cdl control sequences, for generating point list. See [section 7.7.4 Point list](http://obc.lbl.gov/specification/cdl.html#point-list) of OBC specification. | non_priority | add default vendor annotation to generate point list this issue is to add vendor annotation to the cdl control sequences for generating point list see of obc specification | 0 |
50,934 | 7,644,731,498 | IssuesEvent | 2018-05-08 16:18:39 | dealii/dealii | https://api.github.com/repos/dealii/dealii | closed | Review all documentation related to GridGenerator | Documentation Manifold Meta Triangulation | GridGenerator functions have changed their default behaviour.
This should be reflected anywhere we discuss about manifold descriptions (e.g., tutorials, modules, etc.). | 1.0 | Review all documentation related to GridGenerator - GridGenerator functions have changed their default behaviour.
This should be reflected anywhere we discuss about manifold descriptions (e.g., tutorials, modules, etc.). | non_priority | review all documentation related to gridgenerator gridgenerator functions have changed their default behaviour this should be reflected anywhere we discuss about manifold descriptions e g tutorials modules etc | 0 |
22,170 | 10,731,372,471 | IssuesEvent | 2019-10-28 19:24:18 | melsorg/github-scanner-test | https://api.github.com/repos/melsorg/github-scanner-test | opened | CVE-2014-3509 (Medium) detected in openssl-OpenSSL_1_0_1 | security vulnerability | ## CVE-2014-3509 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1</b></p></summary>
<p>
<p>Akamai fork of openssl master.</p>
<p>Library home page: <a href=https://github.com/akamai/openssl.git>https://github.com/akamai/openssl.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/melsorg/github-scanner-test/commit/38c8615a6d0a047787b5e7401328782154ba03e4">38c8615a6d0a047787b5e7401328782154ba03e4</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (13)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /github-scanner-test/openssl/ssl/t1_enc.c
- /github-scanner-test/openssl/ssl/ssl.h
- /github-scanner-test/openssl/ssl/d1_lib.c
- /github-scanner-test/openssl/ssl/s3_srvr.c
- /github-scanner-test/openssl/ssl/s23_clnt.c
- /github-scanner-test/openssl/ssl/s3_pkt.c
- /github-scanner-test/openssl/ssl/s3_clnt.c
- /github-scanner-test/openssl/ssl/bio_ssl.c
- /github-scanner-test/openssl/ssl/ssl_ciph.c
- /github-scanner-test/openssl/ssl/d1_srvr.c
- /github-scanner-test/openssl/ssl/s3_lib.c
- /github-scanner-test/openssl/ssl/ssl_err.c
- /github-scanner-test/openssl/ssl/t1_lib.c
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
<p>Publish Date: 2014-08-13
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509>CVE-2014-3509</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.8</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">https://nvd.nist.gov/vuln/detail/CVE-2014-3509</a></p>
<p>Release Date: 2014-08-13</p>
<p>Fix Resolution: 1.0.0n,1.0.1i</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2014-3509 (Medium) detected in openssl-OpenSSL_1_0_1 - ## CVE-2014-3509 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>opensslOpenSSL_1_0_1</b></p></summary>
<p>
<p>Akamai fork of openssl master.</p>
<p>Library home page: <a href=https://github.com/akamai/openssl.git>https://github.com/akamai/openssl.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/melsorg/github-scanner-test/commit/38c8615a6d0a047787b5e7401328782154ba03e4">38c8615a6d0a047787b5e7401328782154ba03e4</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Library Source Files (13)</summary>
<p></p>
<p> * The source files were matched to this source library based on a best effort match. Source libraries are selected from a list of probable public libraries.</p>
<p>
- /github-scanner-test/openssl/ssl/t1_enc.c
- /github-scanner-test/openssl/ssl/ssl.h
- /github-scanner-test/openssl/ssl/d1_lib.c
- /github-scanner-test/openssl/ssl/s3_srvr.c
- /github-scanner-test/openssl/ssl/s23_clnt.c
- /github-scanner-test/openssl/ssl/s3_pkt.c
- /github-scanner-test/openssl/ssl/s3_clnt.c
- /github-scanner-test/openssl/ssl/bio_ssl.c
- /github-scanner-test/openssl/ssl/ssl_ciph.c
- /github-scanner-test/openssl/ssl/d1_srvr.c
- /github-scanner-test/openssl/ssl/s3_lib.c
- /github-scanner-test/openssl/ssl/ssl_err.c
- /github-scanner-test/openssl/ssl/t1_lib.c
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Race condition in the ssl_parse_serverhello_tlsext function in t1_lib.c in OpenSSL 1.0.0 before 1.0.0n and 1.0.1 before 1.0.1i, when multithreading and session resumption are used, allows remote SSL servers to cause a denial of service (memory overwrite and client application crash) or possibly have unspecified other impact by sending Elliptic Curve (EC) Supported Point Formats Extension data.
<p>Publish Date: 2014-08-13
<p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3509>CVE-2014-3509</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.8</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2014-3509">https://nvd.nist.gov/vuln/detail/CVE-2014-3509</a></p>
<p>Release Date: 2014-08-13</p>
<p>Fix Resolution: 1.0.0n,1.0.1i</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in openssl openssl cve medium severity vulnerability vulnerable library opensslopenssl akamai fork of openssl master library home page a href found in head commit a href library source files the source files were matched to this source library based on a best effort match source libraries are selected from a list of probable public libraries github scanner test openssl ssl enc c github scanner test openssl ssl ssl h github scanner test openssl ssl lib c github scanner test openssl ssl srvr c github scanner test openssl ssl clnt c github scanner test openssl ssl pkt c github scanner test openssl ssl clnt c github scanner test openssl ssl bio ssl c github scanner test openssl ssl ssl ciph c github scanner test openssl ssl srvr c github scanner test openssl ssl lib c github scanner test openssl ssl ssl err c github scanner test openssl ssl lib c vulnerability details race condition in the ssl parse serverhello tlsext function in lib c in openssl before and before when multithreading and session resumption are used allows remote ssl servers to cause a denial of service memory overwrite and client application crash or possibly have unspecified other impact by sending elliptic curve ec supported point formats extension data publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
224,271 | 17,170,789,792 | IssuesEvent | 2021-07-15 03:54:33 | NREL-SIIP/PowerSimulationsDynamics.jl | https://api.github.com/repos/NREL-SIIP/PowerSimulationsDynamics.jl | closed | Inconsistent label for outer control angle | documentation | In the meta-model figure, the angle appears as δ<sub>olc</sub>, in the Virtual inertia model it appears as δθ<sub>olc</sub>, and in the Droop model it appears as θ<sub>olc</sub>:



Can we label this angle as θ<sub>olc</sub> in each part of the documentation? | 1.0 | Inconsistent label for outer control angle - In the meta-model figure, the angle appears as δ<sub>olc</sub>, in the Virtual inertia model it appears as δθ<sub>olc</sub>, and in the Droop model it appears as θ<sub>olc</sub>:



Can we label this angle as θ<sub>olc</sub> in each part of the documentation? | non_priority | inconsistent label for outer control angle in the meta model figure the angle appears as δ olc in the virtual inertia model it appears as δθ olc and in the droop model it appears as θ olc can we label this angle as θ olc in each part of the documentation | 0 |
282,573 | 30,889,370,435 | IssuesEvent | 2023-08-04 02:37:23 | maddyCode23/linux-4.1.15 | https://api.github.com/repos/maddyCode23/linux-4.1.15 | reopened | CVE-2020-0431 (Medium) detected in linux-stable-rtv4.1.33 | Mend: dependency security vulnerability | ## CVE-2020-0431 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
<p>Publish Date: 2020-09-17
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0431>CVE-2020-0431</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-0431">https://www.linuxkernelcves.com/cves/CVE-2020-0431</a></p>
<p>Release Date: 2020-09-17</p>
<p>Fix Resolution: v3.16.83,4.4.210,v4.9.210,v4.14.165,v4.19.96,v5.4.12</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-0431 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2020-0431 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/hid/hid-input.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
In kbd_keycode of keyboard.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-144161459
<p>Publish Date: 2020-09-17
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-0431>CVE-2020-0431</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-0431">https://www.linuxkernelcves.com/cves/CVE-2020-0431</a></p>
<p>Release Date: 2020-09-17</p>
<p>Fix Resolution: v3.16.83,4.4.210,v4.9.210,v4.14.165,v4.19.96,v5.4.12</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files drivers hid hid input c drivers hid hid input c vulnerability details in kbd keycode of keyboard c there is a possible out of bounds write due to a missing bounds check this could lead to local escalation of privilege with no additional execution privileges needed user interaction is not needed for exploitation product androidversions android kernelandroid id a publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
157,624 | 13,697,709,992 | IssuesEvent | 2020-10-01 03:51:47 | msandfor/10-Easy-Steps | https://api.github.com/repos/msandfor/10-Easy-Steps | closed | [Bug]: Broken Links in emoji-key.md | documentation :memo: good first issue hacktoberfest :children_crossing: | **Describe the bug**
The links redirect to 404 page
**To Reproduce**
Steps to reproduce the behavior:
1. Go to '10-Easy-Steps/docs/emoji-key.md'
3. Scroll down to 'What's next'
4. Click on 'Notes for repository maintainers' and 'Automating the process using tools'
**Expected behavior**
Clicking on these links lead to a 404 page
**Screenshots**

**Desktop (please complete the following information):**
- Browser: Microsoft Edge
- Version: Version 85.0.564.63
| 1.0 | [Bug]: Broken Links in emoji-key.md - **Describe the bug**
The links redirect to 404 page
**To Reproduce**
Steps to reproduce the behavior:
1. Go to '10-Easy-Steps/docs/emoji-key.md'
3. Scroll down to 'What's next'
4. Click on 'Notes for repository maintainers' and 'Automating the process using tools'
**Expected behavior**
Clicking on these links lead to a 404 page
**Screenshots**

**Desktop (please complete the following information):**
- Browser: Microsoft Edge
- Version: Version 85.0.564.63
| non_priority | broken links in emoji key md describe the bug the links redirect to page to reproduce steps to reproduce the behavior go to easy steps docs emoji key md scroll down to what s next click on notes for repository maintainers and automating the process using tools expected behavior clicking on these links lead to a page screenshots desktop please complete the following information browser microsoft edge version version | 0 |
258,559 | 27,564,311,386 | IssuesEvent | 2023-03-08 01:43:10 | cluesblues/didactic-pancake | https://api.github.com/repos/cluesblues/didactic-pancake | opened | CVE-2021-23337 (High) detected in lodash-4.17.4.tgz, lodash-1.3.1.tgz | security vulnerability | ## CVE-2021-23337 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.4.tgz</b>, <b>lodash-1.3.1.tgz</b></p></summary>
<p>
<details><summary><b>lodash-4.17.4.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- nyc-10.3.2.tgz (Root Library)
- istanbul-lib-instrument-1.7.1.tgz
- babel-generator-6.24.1.tgz
- :x: **lodash-4.17.4.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-1.3.1.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, and extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz">https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- travis-ci-2.2.0.tgz (Root Library)
- :x: **lodash-1.3.1.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23337>CVE-2021-23337</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution (lodash): 4.17.21</p>
<p>Direct dependency fix Resolution (nyc): 11.0.0-candidate.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-23337 (High) detected in lodash-4.17.4.tgz, lodash-1.3.1.tgz - ## CVE-2021-23337 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>lodash-4.17.4.tgz</b>, <b>lodash-1.3.1.tgz</b></p></summary>
<p>
<details><summary><b>lodash-4.17.4.tgz</b></p></summary>
<p>Lodash modular utilities.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.4.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/nyc/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- nyc-10.3.2.tgz (Root Library)
- istanbul-lib-instrument-1.7.1.tgz
- babel-generator-6.24.1.tgz
- :x: **lodash-4.17.4.tgz** (Vulnerable Library)
</details>
<details><summary><b>lodash-1.3.1.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, and extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz">https://registry.npmjs.org/lodash/-/lodash-1.3.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- travis-ci-2.2.0.tgz (Root Library)
- :x: **lodash-1.3.1.tgz** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Command Injection via the template function.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23337>CVE-2021-23337</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution (lodash): 4.17.21</p>
<p>Direct dependency fix Resolution (nyc): 11.0.0-candidate.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in lodash tgz lodash tgz cve high severity vulnerability vulnerable libraries lodash tgz lodash tgz lodash tgz lodash modular utilities library home page a href path to dependency file package json path to vulnerable library node modules nyc node modules lodash package json dependency hierarchy nyc tgz root library istanbul lib instrument tgz babel generator tgz x lodash tgz vulnerable library lodash tgz a utility library delivering consistency customization performance and extras library home page a href path to dependency file package json path to vulnerable library node modules lodash package json dependency hierarchy travis ci tgz root library x lodash tgz vulnerable library found in base branch master vulnerability details lodash versions prior to are vulnerable to command injection via the template function publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution lodash direct dependency fix resolution nyc candidate step up your open source security game with mend | 0 |
154,963 | 12,235,064,961 | IssuesEvent | 2020-05-04 14:21:40 | WoWManiaUK/Blackwing-Lair | https://api.github.com/repos/WoWManiaUK/Blackwing-Lair | opened | [NPC][FIRELANDS] Blazing Monstrosity | Confirmed By Tester Dungeon/Raid Later Patch | **Links:**
https://www.wowhead.com/npc=53791/blazing-monstrosity
from WoWHead or our Armory
**What is happening:**
When encounter start they just stand there.
**What should happen:**
These should be mountable and be able to use ablitities
**Is it crashing the server?:**
No
**Other Information:**
| 1.0 | [NPC][FIRELANDS] Blazing Monstrosity - **Links:**
https://www.wowhead.com/npc=53791/blazing-monstrosity
from WoWHead or our Armory
**What is happening:**
When encounter start they just stand there.
**What should happen:**
These should be mountable and be able to use ablitities
**Is it crashing the server?:**
No
**Other Information:**
| non_priority | blazing monstrosity links from wowhead or our armory what is happening when encounter start they just stand there what should happen these should be mountable and be able to use ablitities is it crashing the server no other information | 0 |
32,585 | 4,777,779,475 | IssuesEvent | 2016-10-27 17:15:59 | DynamoRIO/dynamorio | https://api.github.com/repos/DynamoRIO/dynamorio | opened | drcachesim sometimes fails to open pipe file | Bug-Assert Component-DRTool Component-Tests OpSys-Linux | This happened once for a test that passed many many times:
http://dynamorio.org/CDash/testDetails.php?test=141155&build=13692
ASSERT FAILURE: /work/dr/nightly/src/clients/drcachesim/tracer/tracer.cpp:766: fd != -1 ()
| 1.0 | drcachesim sometimes fails to open pipe file - This happened once for a test that passed many many times:
http://dynamorio.org/CDash/testDetails.php?test=141155&build=13692
ASSERT FAILURE: /work/dr/nightly/src/clients/drcachesim/tracer/tracer.cpp:766: fd != -1 ()
| non_priority | drcachesim sometimes fails to open pipe file this happened once for a test that passed many many times assert failure work dr nightly src clients drcachesim tracer tracer cpp fd | 0 |
442,875 | 30,861,448,972 | IssuesEvent | 2023-08-03 03:40:08 | froblesl/git_web_practice_branch | https://api.github.com/repos/froblesl/git_web_practice_branch | opened | Un commit que no sigue la convención de código o arreglo a realizar | documentation | La convención del mensaje del último commit no es la esperada:
`FIX2: Error2`
Recuerde que debe tener el siguiente formato: `<Identificador de la corrección>: <Comentario>`
Para realizar la corrección del mensaje de commit ejecute los comandos `git commit --amend` y `git push -f`
Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado. | 1.0 | Un commit que no sigue la convención de código o arreglo a realizar - La convención del mensaje del último commit no es la esperada:
`FIX2: Error2`
Recuerde que debe tener el siguiente formato: `<Identificador de la corrección>: <Comentario>`
Para realizar la corrección del mensaje de commit ejecute los comandos `git commit --amend` y `git push -f`
Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado. | non_priority | un commit que no sigue la convención de código o arreglo a realizar la convención del mensaje del último commit no es la esperada recuerde que debe tener el siguiente formato para realizar la corrección del mensaje de commit ejecute los comandos git commit amend y git push f este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado | 0 |
58,187 | 8,233,680,374 | IssuesEvent | 2018-09-08 04:09:30 | gatsbyjs/gatsby | https://api.github.com/repos/gatsbyjs/gatsby | closed | Add documentation about service workers | type: documentation | gatsby-plugin-offline adds amazing service worker caching functionality that should be mentioned in the project documentation. | 1.0 | Add documentation about service workers - gatsby-plugin-offline adds amazing service worker caching functionality that should be mentioned in the project documentation. | non_priority | add documentation about service workers gatsby plugin offline adds amazing service worker caching functionality that should be mentioned in the project documentation | 0 |
36,088 | 6,516,011,081 | IssuesEvent | 2017-08-27 00:31:58 | Zimmi48/bugzilla-test | https://api.github.com/repos/Zimmi48/bugzilla-test | closed | firstorder doc variants 2/3 are confused | kind: documentation | Note: the issue was created automatically with bugzilla2github tool
# Bugzilla Bug ID: 4887
Date: 2016-07-02 16:47:34 +0200
From: Jonathan Leivent <<jonikelee@gmail.com>>
To:
CC: coq-bugs-redist@lists.gforge.inria.fr
Last updated: 2016-09-27 17:34:57 +0200
## Bugzilla Comment ID: 12959
Date: 2016-07-02 16:47:34 +0200
From: Jonathan Leivent <<jonikelee@gmail.com>>
The doc for variants 2 and 3 of firstorder in section 8.10.4 of the refman is confused. It says:
"2. firstorder with ident 1 ... ident n
Adds lemmas ident 1 . . . ident n to the proof-search environment.
3. firstorder using qualid 1 , ... , qualid n
Adds lemmas in auto hints bases qualid 1 . . . qualid n to the proof-search environment. If qualid i
refers to an inductive type, it is the collection of its constructors which is added as hints."
But, "firstorder with" looks for hint dbs while "firstorder using" looks for lemmas. And that makes sense with respect to other tactics like auto that have with and using variants. Also note the second sentence about inductive types in variant 3 seems to be about the using variant (3) and not the with variant (2), and so is correct.
## Bugzilla Comment ID: 13951
Date: 2016-09-27 17:34:57 +0200
From: @_herbelin
Fixed in v8.5.
| 1.0 | firstorder doc variants 2/3 are confused - Note: the issue was created automatically with bugzilla2github tool
# Bugzilla Bug ID: 4887
Date: 2016-07-02 16:47:34 +0200
From: Jonathan Leivent <<jonikelee@gmail.com>>
To:
CC: coq-bugs-redist@lists.gforge.inria.fr
Last updated: 2016-09-27 17:34:57 +0200
## Bugzilla Comment ID: 12959
Date: 2016-07-02 16:47:34 +0200
From: Jonathan Leivent <<jonikelee@gmail.com>>
The doc for variants 2 and 3 of firstorder in section 8.10.4 of the refman is confused. It says:
"2. firstorder with ident 1 ... ident n
Adds lemmas ident 1 . . . ident n to the proof-search environment.
3. firstorder using qualid 1 , ... , qualid n
Adds lemmas in auto hints bases qualid 1 . . . qualid n to the proof-search environment. If qualid i
refers to an inductive type, it is the collection of its constructors which is added as hints."
But, "firstorder with" looks for hint dbs while "firstorder using" looks for lemmas. And that makes sense with respect to other tactics like auto that have with and using variants. Also note the second sentence about inductive types in variant 3 seems to be about the using variant (3) and not the with variant (2), and so is correct.
## Bugzilla Comment ID: 13951
Date: 2016-09-27 17:34:57 +0200
From: @_herbelin
Fixed in v8.5.
| non_priority | firstorder doc variants are confused note the issue was created automatically with tool bugzilla bug id date from jonathan leivent lt gt to cc coq bugs redist lists gforge inria fr last updated bugzilla comment id date from jonathan leivent lt gt the doc for variants and of firstorder in section of the refman is confused it says firstorder with ident ident n adds lemmas ident ident n to the proof search environment firstorder using qualid qualid n adds lemmas in auto hints bases qualid qualid n to the proof search environment if qualid i refers to an inductive type it is the collection of its constructors which is added as hints but firstorder with looks for hint dbs while firstorder using looks for lemmas and that makes sense with respect to other tactics like auto that have with and using variants also note the second sentence about inductive types in variant seems to be about the using variant and not the with variant and so is correct bugzilla comment id date from herbelin fixed in | 0 |
81,815 | 10,260,843,661 | IssuesEvent | 2019-08-22 08:26:52 | architecture-building-systems/CityEnergyAnalyst | https://api.github.com/repos/architecture-building-systems/CityEnergyAnalyst | closed | Solar radiation documentation correction | documentation | The solar radiation in the dashboard is placed at:
Tools/Energy potentials/Solar radiation (Daysim engine)
But in the documentation it is stated that it can be found at:
tools/Resources/Solar Radiation
| 1.0 | Solar radiation documentation correction - The solar radiation in the dashboard is placed at:
Tools/Energy potentials/Solar radiation (Daysim engine)
But in the documentation it is stated that it can be found at:
tools/Resources/Solar Radiation
| non_priority | solar radiation documentation correction the solar radiation in the dashboard is placed at tools energy potentials solar radiation daysim engine but in the documentation it is stated that it can be found at tools resources solar radiation | 0 |
58,045 | 14,231,037,413 | IssuesEvent | 2020-11-18 09:00:53 | ams0/openhack-containers | https://api.github.com/repos/ams0/openhack-containers | opened | CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2019-14893 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: openhack-containers/src/user-java/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- jackson-datatype-threetenbp-2.6.4.jar (Root Library)
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ams0/openhack-containers/commit/43171928fbf0aa46e304f2aef2bc7c65732f286b">43171928fbf0aa46e304f2aef2bc7c65732f286b</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-14893 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2019-14893 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: openhack-containers/src/user-java/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- jackson-datatype-threetenbp-2.6.4.jar (Root Library)
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ams0/openhack-containers/commit/43171928fbf0aa46e304f2aef2bc7c65732f286b">43171928fbf0aa46e304f2aef2bc7c65732f286b</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A flaw was discovered in FasterXML jackson-databind in all versions before 2.9.10 and 2.10.0, where it would permit polymorphic deserialization of malicious objects using the xalan JNDI gadget when used in conjunction with polymorphic type handling methods such as `enableDefaultTyping()` or when @JsonTypeInfo is using `Id.CLASS` or `Id.MINIMAL_CLASS` or in any other way which ObjectMapper.readValue might instantiate objects from unsafe sources. An attacker could use this flaw to execute arbitrary code.
<p>Publish Date: 2020-03-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14893>CVE-2019-14893</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14893</a></p>
<p>Release Date: 2020-03-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.10.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file openhack containers src user java pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jackson datatype threetenbp jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a flaw was discovered in fasterxml jackson databind in all versions before and where it would permit polymorphic deserialization of malicious objects using the xalan jndi gadget when used in conjunction with polymorphic type handling methods such as enabledefaulttyping or when jsontypeinfo is using id class or id minimal class or in any other way which objectmapper readvalue might instantiate objects from unsafe sources an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
7,931 | 8,124,454,778 | IssuesEvent | 2018-08-16 17:36:39 | MicrosoftDocs/azure-docs | https://api.github.com/repos/MicrosoftDocs/azure-docs | closed | Service Fabric Mesh in EU/UK Regions ? | cxp in-progress needs-more-info product-question service-fabric-mesh/svc triaged | Is there any way can I get preview from EU / UK Regions ? or when this will become available as preview in EU / UK Regions ?
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 1772867c-92c7-f8ae-e19a-929478763da3
* Version Independent ID: 2df08f43-c2be-63e3-1b6f-99932ddd593f
* Content: [Overview of Azure Service Fabric Mesh](https://docs.microsoft.com/en-us/azure/service-fabric-mesh/service-fabric-mesh-overview)
* Content Source: [articles/service-fabric-mesh/service-fabric-mesh-overview.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-fabric-mesh/service-fabric-mesh-overview.md)
* Service: **service-fabric-mesh**
* GitHub Login: @rwike77
* Microsoft Alias: **ryanwi** | 1.0 | Service Fabric Mesh in EU/UK Regions ? - Is there any way can I get preview from EU / UK Regions ? or when this will become available as preview in EU / UK Regions ?
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 1772867c-92c7-f8ae-e19a-929478763da3
* Version Independent ID: 2df08f43-c2be-63e3-1b6f-99932ddd593f
* Content: [Overview of Azure Service Fabric Mesh](https://docs.microsoft.com/en-us/azure/service-fabric-mesh/service-fabric-mesh-overview)
* Content Source: [articles/service-fabric-mesh/service-fabric-mesh-overview.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-fabric-mesh/service-fabric-mesh-overview.md)
* Service: **service-fabric-mesh**
* GitHub Login: @rwike77
* Microsoft Alias: **ryanwi** | non_priority | service fabric mesh in eu uk regions is there any way can i get preview from eu uk regions or when this will become available as preview in eu uk regions document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service service fabric mesh github login microsoft alias ryanwi | 0 |
19,578 | 4,424,460,379 | IssuesEvent | 2016-08-16 12:39:08 | PerfCake/PerfCake | https://api.github.com/repos/PerfCake/PerfCake | opened | Create standalone execution section in user guide | documentation | Make the information more clear and available. | 1.0 | Create standalone execution section in user guide - Make the information more clear and available. | non_priority | create standalone execution section in user guide make the information more clear and available | 0 |
215,529 | 24,177,217,925 | IssuesEvent | 2022-09-23 04:09:12 | bcgov/CONN-CCBC-portal | https://api.github.com/repos/bcgov/CONN-CCBC-portal | closed | Container Scanning | Blocked inSprint Security | Discuss with Nick Corcoran about container scanning.
This will scan the OS level code that we have imported. | True | Container Scanning - Discuss with Nick Corcoran about container scanning.
This will scan the OS level code that we have imported. | non_priority | container scanning discuss with nick corcoran about container scanning this will scan the os level code that we have imported | 0 |
235,732 | 19,424,876,547 | IssuesEvent | 2021-12-21 03:12:28 | go-gitea/gitea | https://api.github.com/repos/go-gitea/gitea | closed | Integration tests fail if LANG is not "" | kind/bug kind/testing | gitea version: 9296baf
to reproduce:
```
export LANG=de_DE.UTF-8
make test-sqlite
```
expected: they should pass
affected tests:
- TestAPILFSBatch/Download/MetaNotFound (api_repo_lfs_test.go:186 - should be false)
- TestAPILFSUpload/AlreadyExistsInStore (api_repo_lfs_test.go:360 - should be false)
- TestMirrorPush (mirror_push_test.go:51 - hould have 1 item(s), but has 2; mirror_push_test.go:54 - should be true)
- TestCreateNewTagProtected/API (repo_tag_test.go:33, unexpected error) | 1.0 | Integration tests fail if LANG is not "" - gitea version: 9296baf
to reproduce:
```
export LANG=de_DE.UTF-8
make test-sqlite
```
expected: they should pass
affected tests:
- TestAPILFSBatch/Download/MetaNotFound (api_repo_lfs_test.go:186 - should be false)
- TestAPILFSUpload/AlreadyExistsInStore (api_repo_lfs_test.go:360 - should be false)
- TestMirrorPush (mirror_push_test.go:51 - hould have 1 item(s), but has 2; mirror_push_test.go:54 - should be true)
- TestCreateNewTagProtected/API (repo_tag_test.go:33, unexpected error) | non_priority | integration tests fail if lang is not gitea version to reproduce export lang de de utf make test sqlite expected they should pass affected tests testapilfsbatch download metanotfound api repo lfs test go should be false testapilfsupload alreadyexistsinstore api repo lfs test go should be false testmirrorpush mirror push test go hould have item s but has mirror push test go should be true testcreatenewtagprotected api repo tag test go unexpected error | 0 |
130,972 | 18,214,366,228 | IssuesEvent | 2021-09-30 01:02:56 | brogers588/netflix_conductor_fork | https://api.github.com/repos/brogers588/netflix_conductor_fork | opened | CVE-2021-37136 (High) detected in multiple libraries | security vulnerability | ## CVE-2021-37136 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-codec-4.1.41.Final.jar</b>, <b>netty-codec-4.1.27.Final.jar</b>, <b>netty-codec-4.1.32.Final.jar</b>, <b>netty-codec-4.1.13.Final.jar</b>, <b>netty-codec-4.0.56.Final.jar</b></p></summary>
<p>
<details><summary><b>netty-codec-4.1.41.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/redis-lock/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.41.Final/d2dceabcd4097d068a318e24542897d455b0729b/netty-codec-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- redisson-3.11.4.jar (Root Library)
- netty-handler-4.1.41.Final.jar
- :x: **netty-codec-4.1.41.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.1.27.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/grpc-client/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210708151457_ISTDYJ/downloadResource_GJPGFO/20210708154202/netty-codec-4.1.27.Final.jar</p>
<p>
Dependency Hierarchy:
- grpc-netty-1.14.0.jar (Root Library)
- netty-handler-proxy-4.1.27.Final.jar
- netty-codec-socks-4.1.27.Final.jar
- :x: **netty-codec-4.1.27.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.1.32.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/es6-persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.32.Final/8f32bd79c5a16f014a4372ed979dc62b39ede33a/netty-codec-4.1.32.Final.jar</p>
<p>
Dependency Hierarchy:
- transport-6.8.12.jar (Root Library)
- transport-netty4-client-6.8.12.jar
- :x: **netty-codec-4.1.32.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.1.13.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/es5-persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.13.Final/370eeb6e9d92495a2a3be096ab6102755af76730/netty-codec-4.1.13.Final.jar</p>
<p>
Dependency Hierarchy:
- transport-5.6.8.jar (Root Library)
- transport-netty4-client-5.6.8.jar
- :x: **netty-codec-4.1.13.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.0.56.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/cassandra-persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.0.56.Final/bd9ecf1cf3721bbedfd2fb0c52d4f56803ff270d/netty-codec-4.0.56.Final.jar</p>
<p>
Dependency Hierarchy:
- cassandra-driver-core-3.6.0.jar (Root Library)
- netty-handler-4.0.56.Final.jar
- :x: **netty-codec-4.0.56.Final.jar** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
<p>Publish Date: 2021-07-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136>CVE-2021-37136</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-grg4-wf29-r9vv">https://github.com/advisories/GHSA-grg4-wf29-r9vv</a></p>
<p>Release Date: 2021-07-21</p>
<p>Fix Resolution: io.netty:netty-codec:4.1.68.Final</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.41.Final","packageFilePaths":["/redis-lock/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.redisson:redisson:3.11.4;io.netty:netty-handler:4.1.41.Final;io.netty:netty-codec:4.1.41.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.27.Final","packageFilePaths":["/grpc-client/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.grpc:grpc-netty:1.14.0;io.netty:netty-handler-proxy:4.1.27.Final;io.netty:netty-codec-socks:4.1.27.Final;io.netty:netty-codec:4.1.27.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.32.Final","packageFilePaths":["/es6-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:6.8.12;org.elasticsearch.plugin:transport-netty4-client:6.8.12;io.netty:netty-codec:4.1.32.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.13.Final","packageFilePaths":["/es5-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:5.6.8;org.elasticsearch.plugin:transport-netty4-client:5.6.8;io.netty:netty-codec:4.1.13.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.0.56.Final","packageFilePaths":["/cassandra-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"com.datastax.cassandra:cassandra-driver-core:3.6.0;io.netty:netty-handler:4.0.56.Final;io.netty:netty-codec:4.0.56.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-37136","vulnerabilityDetails":"The Bzip2 decompression decoder function doesn\u0027t allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).\n\nAll users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2021-37136 (High) detected in multiple libraries - ## CVE-2021-37136 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>netty-codec-4.1.41.Final.jar</b>, <b>netty-codec-4.1.27.Final.jar</b>, <b>netty-codec-4.1.32.Final.jar</b>, <b>netty-codec-4.1.13.Final.jar</b>, <b>netty-codec-4.0.56.Final.jar</b></p></summary>
<p>
<details><summary><b>netty-codec-4.1.41.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/redis-lock/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.41.Final/d2dceabcd4097d068a318e24542897d455b0729b/netty-codec-4.1.41.Final.jar</p>
<p>
Dependency Hierarchy:
- redisson-3.11.4.jar (Root Library)
- netty-handler-4.1.41.Final.jar
- :x: **netty-codec-4.1.41.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.1.27.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/grpc-client/build.gradle</p>
<p>Path to vulnerable library: /tmp/ws-ua_20210708151457_ISTDYJ/downloadResource_GJPGFO/20210708154202/netty-codec-4.1.27.Final.jar</p>
<p>
Dependency Hierarchy:
- grpc-netty-1.14.0.jar (Root Library)
- netty-handler-proxy-4.1.27.Final.jar
- netty-codec-socks-4.1.27.Final.jar
- :x: **netty-codec-4.1.27.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.1.32.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/es6-persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.32.Final/8f32bd79c5a16f014a4372ed979dc62b39ede33a/netty-codec-4.1.32.Final.jar</p>
<p>
Dependency Hierarchy:
- transport-6.8.12.jar (Root Library)
- transport-netty4-client-6.8.12.jar
- :x: **netty-codec-4.1.32.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.1.13.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/es5-persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.1.13.Final/370eeb6e9d92495a2a3be096ab6102755af76730/netty-codec-4.1.13.Final.jar</p>
<p>
Dependency Hierarchy:
- transport-5.6.8.jar (Root Library)
- transport-netty4-client-5.6.8.jar
- :x: **netty-codec-4.1.13.Final.jar** (Vulnerable Library)
</details>
<details><summary><b>netty-codec-4.0.56.Final.jar</b></p></summary>
<p>Netty is an asynchronous event-driven network application framework for
rapid development of maintainable high performance protocol servers and
clients.</p>
<p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p>
<p>Path to dependency file: netflix_conductor_fork/cassandra-persistence/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/io.netty/netty-codec/4.0.56.Final/bd9ecf1cf3721bbedfd2fb0c52d4f56803ff270d/netty-codec-4.0.56.Final.jar</p>
<p>
Dependency Hierarchy:
- cassandra-driver-core-3.6.0.jar (Root Library)
- netty-handler-4.0.56.Final.jar
- :x: **netty-codec-4.0.56.Final.jar** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Bzip2 decompression decoder function doesn't allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).
All users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack
<p>Publish Date: 2021-07-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136>CVE-2021-37136</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-grg4-wf29-r9vv">https://github.com/advisories/GHSA-grg4-wf29-r9vv</a></p>
<p>Release Date: 2021-07-21</p>
<p>Fix Resolution: io.netty:netty-codec:4.1.68.Final</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.41.Final","packageFilePaths":["/redis-lock/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.redisson:redisson:3.11.4;io.netty:netty-handler:4.1.41.Final;io.netty:netty-codec:4.1.41.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.27.Final","packageFilePaths":["/grpc-client/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"io.grpc:grpc-netty:1.14.0;io.netty:netty-handler-proxy:4.1.27.Final;io.netty:netty-codec-socks:4.1.27.Final;io.netty:netty-codec:4.1.27.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.32.Final","packageFilePaths":["/es6-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:6.8.12;org.elasticsearch.plugin:transport-netty4-client:6.8.12;io.netty:netty-codec:4.1.32.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.1.13.Final","packageFilePaths":["/es5-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"org.elasticsearch.client:transport:5.6.8;org.elasticsearch.plugin:transport-netty4-client:5.6.8;io.netty:netty-codec:4.1.13.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"},{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec","packageVersion":"4.0.56.Final","packageFilePaths":["/cassandra-persistence/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"com.datastax.cassandra:cassandra-driver-core:3.6.0;io.netty:netty-handler:4.0.56.Final;io.netty:netty-codec:4.0.56.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec:4.1.68.Final"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-37136","vulnerabilityDetails":"The Bzip2 decompression decoder function doesn\u0027t allow setting size restrictions on the decompressed output data (which affects the allocation size used during decompression).\n\nAll users of Bzip2Decoder are affected. The malicious input can trigger an OOME and so a DoS attack","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-37136","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries netty codec final jar netty codec final jar netty codec final jar netty codec final jar netty codec final jar netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork redis lock build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy redisson jar root library netty handler final jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork grpc client build gradle path to vulnerable library tmp ws ua istdyj downloadresource gjpgfo netty codec final jar dependency hierarchy grpc netty jar root library netty handler proxy final jar netty codec socks final jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy transport jar root library transport client jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy transport jar root library transport client jar x netty codec final jar vulnerable library netty codec final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to dependency file netflix conductor fork cassandra persistence build gradle path to vulnerable library home wss scanner gradle caches modules files io netty netty codec final netty codec final jar dependency hierarchy cassandra driver core jar root library netty handler final jar x netty codec final jar vulnerable library found in base branch master vulnerability details the decompression decoder function doesn t allow setting size restrictions on the decompressed output data which affects the allocation size used during decompression all users of are affected the malicious input can trigger an oome and so a dos attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io netty netty codec final isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org redisson redisson io netty netty handler final io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree io grpc grpc netty io netty netty handler proxy final io netty netty codec socks final io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree org elasticsearch client transport org elasticsearch plugin transport client io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree org elasticsearch client transport org elasticsearch plugin transport client io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final packagetype java groupid io netty packagename netty codec packageversion final packagefilepaths istransitivedependency true dependencytree com datastax cassandra cassandra driver core io netty netty handler final io netty netty codec final isminimumfixversionavailable true minimumfixversion io netty netty codec final basebranches vulnerabilityidentifier cve vulnerabilitydetails the decompression decoder function doesn allow setting size restrictions on the decompressed output data which affects the allocation size used during decompression n nall users of are affected the malicious input can trigger an oome and so a dos attack vulnerabilityurl | 0 |
100,470 | 8,744,467,747 | IssuesEvent | 2018-12-12 22:21:08 | ampproject/amphtml | https://api.github.com/repos/ampproject/amphtml | closed | Fix broken tests 'should show the body in error test' in `test-errors.js` | P2: Soon Related to: Flaky Tests Type: Bug | This test brakes on multiple browsers in SauceLabs, and was disabled in #19782. Please triage and fix
Disabled test: https://github.com/ampproject/amphtml/pull/19782/files#diff-5bd3d5b9ed366abf44094456feef5f6aR55 | 1.0 | Fix broken tests 'should show the body in error test' in `test-errors.js` - This test brakes on multiple browsers in SauceLabs, and was disabled in #19782. Please triage and fix
Disabled test: https://github.com/ampproject/amphtml/pull/19782/files#diff-5bd3d5b9ed366abf44094456feef5f6aR55 | non_priority | fix broken tests should show the body in error test in test errors js this test brakes on multiple browsers in saucelabs and was disabled in please triage and fix disabled test | 0 |
233,028 | 17,839,636,277 | IssuesEvent | 2021-09-03 08:23:02 | facebookresearch/detectron2 | https://api.github.com/repos/facebookresearch/detectron2 | opened | Multi-Node distributed training with SLURM | documentation | Hi everybody,
I'm wondering how can I run a distributed training on 2 machines from a cluster managed with SLURM?
I read that you have to manually specify the machine rank when you run the `tools/train_net.py` script, but in my case it should be managed by SLURM.
Somebody had the same issue? :smile: | 1.0 | Multi-Node distributed training with SLURM - Hi everybody,
I'm wondering how can I run a distributed training on 2 machines from a cluster managed with SLURM?
I read that you have to manually specify the machine rank when you run the `tools/train_net.py` script, but in my case it should be managed by SLURM.
Somebody had the same issue? :smile: | non_priority | multi node distributed training with slurm hi everybody i m wondering how can i run a distributed training on machines from a cluster managed with slurm i read that you have to manually specify the machine rank when you run the tools train net py script but in my case it should be managed by slurm somebody had the same issue smile | 0 |
5,307 | 3,198,481,697 | IssuesEvent | 2015-10-01 12:31:23 | owncloud/gallery | https://api.github.com/repos/owncloud/gallery | closed | Add images located on external storage if we already have a thumbnail | coder wanted enhancement | This might slow down the initial discovery operation, but it could be possible to check the thumbnails cache to see if we already have the max preview. If we do, we could show the image despite the fact that it's located on external storage.
<bountysource-plugin>
---
Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/10786486-add-images-located-on-external-storage-if-we-already-have-a-thumbnail?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github).
</bountysource-plugin> | 1.0 | Add images located on external storage if we already have a thumbnail - This might slow down the initial discovery operation, but it could be possible to check the thumbnails cache to see if we already have the max preview. If we do, we could show the image despite the fact that it's located on external storage.
<bountysource-plugin>
---
Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/10786486-add-images-located-on-external-storage-if-we-already-have-a-thumbnail?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F9328526&utm_medium=issues&utm_source=github).
</bountysource-plugin> | non_priority | add images located on external storage if we already have a thumbnail this might slow down the initial discovery operation but it could be possible to check the thumbnails cache to see if we already have the max preview if we do we could show the image despite the fact that it s located on external storage want to back this issue we accept bounties via | 0 |
43,172 | 5,581,534,855 | IssuesEvent | 2017-03-28 19:05:15 | gustafl/youtube-blacklist-chrome-extension | https://api.github.com/repos/gustafl/youtube-blacklist-chrome-extension | opened | Show a live data stream on the web page | design future | Because it's fun and attractive. Ideally, we want to get the images from YouTube too. Websockets is probably the technology I need to learn for this. | 1.0 | Show a live data stream on the web page - Because it's fun and attractive. Ideally, we want to get the images from YouTube too. Websockets is probably the technology I need to learn for this. | non_priority | show a live data stream on the web page because it s fun and attractive ideally we want to get the images from youtube too websockets is probably the technology i need to learn for this | 0 |
98,460 | 12,325,529,452 | IssuesEvent | 2020-05-13 15:10:52 | department-of-veterans-affairs/va.gov-cms | https://api.github.com/repos/department-of-veterans-affairs/va.gov-cms | closed | Iteration on Assignments wireframes, pre-usability testing | Design Research ⭐️ Content ops | ## Description
## Acceptance Criteria
* Wireframe prototype is ready for user testing
| 1.0 | Iteration on Assignments wireframes, pre-usability testing - ## Description
## Acceptance Criteria
* Wireframe prototype is ready for user testing
| non_priority | iteration on assignments wireframes pre usability testing description acceptance criteria wireframe prototype is ready for user testing | 0 |
312,715 | 26,873,909,894 | IssuesEvent | 2023-02-04 20:13:19 | MPMG-DCC-UFMG/F01 | https://api.github.com/repos/MPMG-DCC-UFMG/F01 | closed | Teste de generalizacao para a tag Informações Institucionais - Leis Municipais - Santana do Riacho | generalization test development template - Síntese tecnologia e informatica (88) tag - Informações Institucionais subtag - Leis Municipais | DoD: Realizar o teste de Generalização do validador da tag Informações Institucionais - Leis Municipais para o Município de Santana do Riacho. | 1.0 | Teste de generalizacao para a tag Informações Institucionais - Leis Municipais - Santana do Riacho - DoD: Realizar o teste de Generalização do validador da tag Informações Institucionais - Leis Municipais para o Município de Santana do Riacho. | non_priority | teste de generalizacao para a tag informações institucionais leis municipais santana do riacho dod realizar o teste de generalização do validador da tag informações institucionais leis municipais para o município de santana do riacho | 0 |
47,193 | 10,053,105,797 | IssuesEvent | 2019-07-21 14:08:30 | chungwei/imiao | https://api.github.com/repos/chungwei/imiao | opened | LeetCode-217. 存在重复元素 | LeetCode | 原文链接 [217. 存在重复元素](https://leetcode-cn.com/problems/contains-duplicate/)
```go
func containsDuplicate(nums []int) bool {
m := make(map[int]int)
for _, v := range nums {
if _, ok := m[v]; ok {
return true
}
m[v]++
}
return false
}
``` | 1.0 | LeetCode-217. 存在重复元素 - 原文链接 [217. 存在重复元素](https://leetcode-cn.com/problems/contains-duplicate/)
```go
func containsDuplicate(nums []int) bool {
m := make(map[int]int)
for _, v := range nums {
if _, ok := m[v]; ok {
return true
}
m[v]++
}
return false
}
``` | non_priority | leetcode 存在重复元素 原文链接 go func containsduplicate nums int bool m make map int for v range nums if ok m ok return true m return false | 0 |
262,971 | 27,989,595,348 | IssuesEvent | 2023-03-27 01:45:28 | samq-ghdemo/apache-logging-log4j-kotlin | https://api.github.com/repos/samq-ghdemo/apache-logging-log4j-kotlin | opened | CVE-2020-29582 (Medium) detected in kotlin-stdlib-1.3.72.jar | Mend: dependency security vulnerability | ## CVE-2020-29582 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kotlin-stdlib-1.3.72.jar</b></p></summary>
<p>Kotlin Standard Library for JVM</p>
<p>Library home page: <a href="https://kotlinlang.org/">https://kotlinlang.org/</a></p>
<p>Path to dependency file: /log4j-api-kotlin/pom.xml</p>
<p>Path to vulnerable library: /tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar</p>
<p>
Dependency Hierarchy:
- :x: **kotlin-stdlib-1.3.72.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/apache-logging-log4j-kotlin/commit/347374860a480afb0a67d8f053795cb2a2920d88">347374860a480afb0a67d8f053795cb2a2920d88</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
<p>Publish Date: 2021-02-03
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-29582>CVE-2020-29582</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-cqj8-47ch-rvvq">https://github.com/advisories/GHSA-cqj8-47ch-rvvq</a></p>
<p>Release Date: 2021-02-03</p>
<p>Fix Resolution: 1.4.21</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | True | CVE-2020-29582 (Medium) detected in kotlin-stdlib-1.3.72.jar - ## CVE-2020-29582 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>kotlin-stdlib-1.3.72.jar</b></p></summary>
<p>Kotlin Standard Library for JVM</p>
<p>Library home page: <a href="https://kotlinlang.org/">https://kotlinlang.org/</a></p>
<p>Path to dependency file: /log4j-api-kotlin/pom.xml</p>
<p>Path to vulnerable library: /tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar,/tbrains/kotlin/kotlin-stdlib/1.3.72/kotlin-stdlib-1.3.72.jar</p>
<p>
Dependency Hierarchy:
- :x: **kotlin-stdlib-1.3.72.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/samq-ghdemo/apache-logging-log4j-kotlin/commit/347374860a480afb0a67d8f053795cb2a2920d88">347374860a480afb0a67d8f053795cb2a2920d88</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In JetBrains Kotlin before 1.4.21, a vulnerable Java API was used for temporary file and folder creation. An attacker was able to read data from such files and list directories due to insecure permissions.
<p>Publish Date: 2021-02-03
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-29582>CVE-2020-29582</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-cqj8-47ch-rvvq">https://github.com/advisories/GHSA-cqj8-47ch-rvvq</a></p>
<p>Release Date: 2021-02-03</p>
<p>Fix Resolution: 1.4.21</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue | non_priority | cve medium detected in kotlin stdlib jar cve medium severity vulnerability vulnerable library kotlin stdlib jar kotlin standard library for jvm library home page a href path to dependency file api kotlin pom xml path to vulnerable library tbrains kotlin kotlin stdlib kotlin stdlib jar tbrains kotlin kotlin stdlib kotlin stdlib jar tbrains kotlin kotlin stdlib kotlin stdlib jar dependency hierarchy x kotlin stdlib jar vulnerable library found in head commit a href found in base branch main vulnerability details in jetbrains kotlin before a vulnerable java api was used for temporary file and folder creation an attacker was able to read data from such files and list directories due to insecure permissions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue | 0 |
6,491 | 3,398,444,727 | IssuesEvent | 2015-12-02 03:50:17 | ProjectFacet/facet | https://api.github.com/repos/ProjectFacet/facet | opened | Series | code | A user can view all series of any status that's current. Series are organized by creation date. Meta information about a series should be available in the display or through a modal window or popover.
**View:**
Create a view to return series.
**Template:**
Create a template to display a series. | 1.0 | Series - A user can view all series of any status that's current. Series are organized by creation date. Meta information about a series should be available in the display or through a modal window or popover.
**View:**
Create a view to return series.
**Template:**
Create a template to display a series. | non_priority | series a user can view all series of any status that s current series are organized by creation date meta information about a series should be available in the display or through a modal window or popover view create a view to return series template create a template to display a series | 0 |
167,838 | 20,726,426,016 | IssuesEvent | 2022-03-14 02:51:43 | valdisiljuconoks/FeatureSwitch | https://api.github.com/repos/valdisiljuconoks/FeatureSwitch | opened | CVE-2020-28500 (Medium) detected in lodash-2.4.2.tgz | security vulnerability | ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p>
<p>Path to dependency file: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json</p>
<p>Path to vulnerable library: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- intern-geezer-2.2.3.tgz (Root Library)
- digdug-1.4.0.tgz
- decompress-0.2.3.tgz
- map-key-0.1.5.tgz
- :x: **lodash-2.4.2.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
WhiteSource Note: After conducting further research, WhiteSource has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution: lodash - 4.17.21</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-28500 (Medium) detected in lodash-2.4.2.tgz - ## CVE-2020-28500 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-2.4.2.tgz</b></p></summary>
<p>A utility library delivering consistency, customization, performance, & extras.</p>
<p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz">https://registry.npmjs.org/lodash/-/lodash-2.4.2.tgz</a></p>
<p>Path to dependency file: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/package.json</p>
<p>Path to vulnerable library: /EpiSample/modules/_protected/Shell/Shell/11.1.0.0/ClientResources/lib/xstyle/node_modules/lodash/package.json</p>
<p>
Dependency Hierarchy:
- intern-geezer-2.2.3.tgz (Root Library)
- digdug-1.4.0.tgz
- decompress-0.2.3.tgz
- map-key-0.1.5.tgz
- :x: **lodash-2.4.2.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Lodash versions prior to 4.17.21 are vulnerable to Regular Expression Denial of Service (ReDoS) via the toNumber, trim and trimEnd functions.
WhiteSource Note: After conducting further research, WhiteSource has determined that CVE-2020-28500 only affects environments with versions 4.0.0 to 4.17.20 of Lodash.
<p>Publish Date: 2021-02-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28500>CVE-2020-28500</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28500</a></p>
<p>Release Date: 2021-02-15</p>
<p>Fix Resolution: lodash - 4.17.21</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in lodash tgz cve medium severity vulnerability vulnerable library lodash tgz a utility library delivering consistency customization performance extras library home page a href path to dependency file episample modules protected shell shell clientresources lib xstyle package json path to vulnerable library episample modules protected shell shell clientresources lib xstyle node modules lodash package json dependency hierarchy intern geezer tgz root library digdug tgz decompress tgz map key tgz x lodash tgz vulnerable library vulnerability details lodash versions prior to are vulnerable to regular expression denial of service redos via the tonumber trim and trimend functions whitesource note after conducting further research whitesource has determined that cve only affects environments with versions to of lodash publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource | 0 |
57,783 | 14,217,865,708 | IssuesEvent | 2020-11-17 10:57:40 | SAP/spartacus | https://api.github.com/repos/SAP/spartacus | closed | Cannot remove coupon if the coupon code is ".." | backend-dependency fellows-friendly security | Cannot remove coupon if the coupon code is ".."
## Environment Details
- Spartacus: development environment
- Browser: Chrome 76.0.3809.132
- OS: macOS Mojave 10.14.6
- Device: macbook
## Steps to Reproduce
1. Create a coupon with code ".."
2. Apply this coupon to a cart
3. Remove this coupon from cart
## Observed Results
Cart is deleted
## Expected Results
The coupon is deleted
## Offer to Fix
NO.
## Additional Information
1. It seems that the browser treat ".." as super path. The url should be XXXX/cart/cartid/voucher/.., but the url which browser sent out is XXXX/cart/cartid
2. When testing this via Swagger UI, the cart will be deleted as well
| True | Cannot remove coupon if the coupon code is ".." - Cannot remove coupon if the coupon code is ".."
## Environment Details
- Spartacus: development environment
- Browser: Chrome 76.0.3809.132
- OS: macOS Mojave 10.14.6
- Device: macbook
## Steps to Reproduce
1. Create a coupon with code ".."
2. Apply this coupon to a cart
3. Remove this coupon from cart
## Observed Results
Cart is deleted
## Expected Results
The coupon is deleted
## Offer to Fix
NO.
## Additional Information
1. It seems that the browser treat ".." as super path. The url should be XXXX/cart/cartid/voucher/.., but the url which browser sent out is XXXX/cart/cartid
2. When testing this via Swagger UI, the cart will be deleted as well
| non_priority | cannot remove coupon if the coupon code is cannot remove coupon if the coupon code is environment details spartacus development environment browser chrome os macos mojave device macbook steps to reproduce create a coupon with code apply this coupon to a cart remove this coupon from cart observed results cart is deleted expected results the coupon is deleted offer to fix no additional information it seems that the browser treat as super path the url should be xxxx cart cartid voucher but the url which browser sent out is xxxx cart cartid when testing this via swagger ui the cart will be deleted as well | 0 |
326,027 | 24,070,421,896 | IssuesEvent | 2022-09-18 04:32:57 | jupyterlite/demo | https://api.github.com/repos/jupyterlite/demo | closed | pre-install pure python package in static html site | documentation | ### Problem
Not sure if this is possible but I could not figure how to pre-install a pure python package on my jupyterlite static html site.
The example is here:
https://marcocaggioni.github.io/rheolite/lab/index.html
in the notebook the first cell is to micropip install lmfit which works fine but takes some time:
```python
import micropip
await micropip.install('lmfit')
```
### Suggested Improvement
If not yet there and if possible would be nice to have in the documentation a section explaining how to pre-install packages
thanks!
| 1.0 | pre-install pure python package in static html site - ### Problem
Not sure if this is possible but I could not figure how to pre-install a pure python package on my jupyterlite static html site.
The example is here:
https://marcocaggioni.github.io/rheolite/lab/index.html
in the notebook the first cell is to micropip install lmfit which works fine but takes some time:
```python
import micropip
await micropip.install('lmfit')
```
### Suggested Improvement
If not yet there and if possible would be nice to have in the documentation a section explaining how to pre-install packages
thanks!
| non_priority | pre install pure python package in static html site problem not sure if this is possible but i could not figure how to pre install a pure python package on my jupyterlite static html site the example is here in the notebook the first cell is to micropip install lmfit which works fine but takes some time python import micropip await micropip install lmfit suggested improvement if not yet there and if possible would be nice to have in the documentation a section explaining how to pre install packages thanks | 0 |
350,175 | 24,971,792,036 | IssuesEvent | 2022-11-02 02:20:15 | Nuclei-Software/nuclei-linux-sdk | https://api.github.com/repos/Nuclei-Software/nuclei-linux-sdk | opened | opensbi boot traped with a lot of sbi_trap_error | documentation | ## Issue Description and Solution
As image below described:

You can see `mcause = 0x7, mtval = 0x08000000`
mcause check riscv privilege manual is **Store/AMO access fault**,

mtval means whether the store access fault happened, which is 0x08000000, it is the previous Nuclei DemoSoC using cpu without iregion feature(iregion feature reallocate plic/timer base address).
- nuclei cpu in demosoc without iregion: plic0: interrupt-controller@8000000
- nuclei cpu in evalsoc with iregion: plic0: interrupt-controller@1c000000
See https://github.com/Nuclei-Software/nuclei-linux-sdk#modify-build-configuration about evalsoc/demosoc.
So the answer is change the SOC from demosoc to evalsoc.
For example, you want to test ux900fd, then build with the following command.
~~~shell
make SOC=evalsoc CORE=ux900fd freeloader
make SOC=evalsoc CORE=ux900fd bootimages
~~~
## Known issues
currently evalsoc can't run in qemu, if you really want to run in qemu, please change the evalsoc dts you are using like this.
> Caused by plic/timer base address changed.
> If you changed this, opensbi will not run on your hardware, please remember change it back.
~~~diff
index b04d0a2..947d56c 100644
--- a/conf/evalsoc/nuclei_rv64imafdc.dts
+++ b/conf/evalsoc/nuclei_rv64imafdc.dts
@@ -171,7 +171,7 @@
clock-output-names = "hfclk";
};
- plic0: interrupt-controller@1c000000 {
+ plic0: interrupt-controller@8000000 {
#interrupt-cells = <1>;
compatible = "riscv,plic0";
interrupt-controller;
@@ -185,13 +185,13 @@
&cpu5_intc 11 &cpu5_intc 9
&cpu6_intc 11 &cpu6_intc 9
&cpu7_intc 11 &cpu7_intc 9>;
- reg = <0x0 0x1c000000 0x0 0x4000000>;
+ reg = <0x0 0x8000000 0x0 0x4000000>;
};
- clint0: clint@18031000 {
+ clint0: clint@2001000 {
#interrupt-cells = <1>;
compatible = "riscv,clint0";
- reg = <0x0 0x18031000 0x0 0xC000>;
+ reg = <0x0 0x2001000 0x0 0xC000>;
interrupts-extended =
<&cpu0_intc 3 &cpu0_intc 7
&cpu1_intc 3 &cpu1_intc 7
~~~
| 1.0 | opensbi boot traped with a lot of sbi_trap_error - ## Issue Description and Solution
As image below described:

You can see `mcause = 0x7, mtval = 0x08000000`
mcause check riscv privilege manual is **Store/AMO access fault**,

mtval means whether the store access fault happened, which is 0x08000000, it is the previous Nuclei DemoSoC using cpu without iregion feature(iregion feature reallocate plic/timer base address).
- nuclei cpu in demosoc without iregion: plic0: interrupt-controller@8000000
- nuclei cpu in evalsoc with iregion: plic0: interrupt-controller@1c000000
See https://github.com/Nuclei-Software/nuclei-linux-sdk#modify-build-configuration about evalsoc/demosoc.
So the answer is change the SOC from demosoc to evalsoc.
For example, you want to test ux900fd, then build with the following command.
~~~shell
make SOC=evalsoc CORE=ux900fd freeloader
make SOC=evalsoc CORE=ux900fd bootimages
~~~
## Known issues
currently evalsoc can't run in qemu, if you really want to run in qemu, please change the evalsoc dts you are using like this.
> Caused by plic/timer base address changed.
> If you changed this, opensbi will not run on your hardware, please remember change it back.
~~~diff
index b04d0a2..947d56c 100644
--- a/conf/evalsoc/nuclei_rv64imafdc.dts
+++ b/conf/evalsoc/nuclei_rv64imafdc.dts
@@ -171,7 +171,7 @@
clock-output-names = "hfclk";
};
- plic0: interrupt-controller@1c000000 {
+ plic0: interrupt-controller@8000000 {
#interrupt-cells = <1>;
compatible = "riscv,plic0";
interrupt-controller;
@@ -185,13 +185,13 @@
&cpu5_intc 11 &cpu5_intc 9
&cpu6_intc 11 &cpu6_intc 9
&cpu7_intc 11 &cpu7_intc 9>;
- reg = <0x0 0x1c000000 0x0 0x4000000>;
+ reg = <0x0 0x8000000 0x0 0x4000000>;
};
- clint0: clint@18031000 {
+ clint0: clint@2001000 {
#interrupt-cells = <1>;
compatible = "riscv,clint0";
- reg = <0x0 0x18031000 0x0 0xC000>;
+ reg = <0x0 0x2001000 0x0 0xC000>;
interrupts-extended =
<&cpu0_intc 3 &cpu0_intc 7
&cpu1_intc 3 &cpu1_intc 7
~~~
| non_priority | opensbi boot traped with a lot of sbi trap error issue description and solution as image below described you can see mcause mtval mcause check riscv privilege manual is store amo access fault mtval means whether the store access fault happened which is it is the previous nuclei demosoc using cpu without iregion feature iregion feature reallocate plic timer base address nuclei cpu in demosoc without iregion interrupt controller nuclei cpu in evalsoc with iregion interrupt controller see about evalsoc demosoc so the answer is change the soc from demosoc to evalsoc for example you want to test then build with the following command shell make soc evalsoc core freeloader make soc evalsoc core bootimages known issues currently evalsoc can t run in qemu if you really want to run in qemu please change the evalsoc dts you are using like this caused by plic timer base address changed if you changed this opensbi will not run on your hardware please remember change it back diff index a conf evalsoc nuclei dts b conf evalsoc nuclei dts clock output names hfclk interrupt controller interrupt controller interrupt cells compatible riscv interrupt controller intc intc intc intc intc intc reg reg clint clint interrupt cells compatible riscv reg reg interrupts extended intc intc intc intc | 0 |
29,281 | 23,875,910,808 | IssuesEvent | 2022-09-07 19:02:10 | accessibility-exchange/platform | https://api.github.com/repos/accessibility-exchange/platform | closed | File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923... | help wanted infrastructure | **`Illuminate\Contracts\Filesystem\FileNotFoundException`**
File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923b3.php.
:dart: Illuminate\Filesystem\Filesystem::getRequire
:page_facing_up: /app/vendor/laravel/framework/src/Illuminate/Filesystem/Filesystem.php
```php
109 }
110
111* throw new FileNotFoundException("File does not exist at path {$path}.");
112 }
113
```
[Open in Flare](https://flareapp.io/errors/1495843/latest) | 1.0 | File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923... - **`Illuminate\Contracts\Filesystem\FileNotFoundException`**
File does not exist at path /opt/data/storage/framework/views/61cb24237d9772f79862641d9038616e2af923b3.php.
:dart: Illuminate\Filesystem\Filesystem::getRequire
:page_facing_up: /app/vendor/laravel/framework/src/Illuminate/Filesystem/Filesystem.php
```php
109 }
110
111* throw new FileNotFoundException("File does not exist at path {$path}.");
112 }
113
```
[Open in Flare](https://flareapp.io/errors/1495843/latest) | non_priority | file does not exist at path opt data storage framework views illuminate contracts filesystem filenotfoundexception file does not exist at path opt data storage framework views php dart illuminate filesystem filesystem getrequire page facing up app vendor laravel framework src illuminate filesystem filesystem php php throw new filenotfoundexception file does not exist at path path | 0 |
68,424 | 13,129,893,590 | IssuesEvent | 2020-08-06 14:34:10 | Abbassihraf/P-curiosity-LAB | https://api.github.com/repos/Abbassihraf/P-curiosity-LAB | opened | Popups what we offer section | Code In progress home_page | > ### Desktop
**To Rural Communities**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To idea-holders**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To business**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To researchers & scientifics**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
> ### Tablet
**To Rural Communities**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To idea-holders**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To business**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To researchers & scientifics**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
`### Mobile`
**To Rural Communities**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To idea-holders**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To business**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To researchers & scientifics**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
| 1.0 | Popups what we offer section - > ### Desktop
**To Rural Communities**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To idea-holders**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To business**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To researchers & scientifics**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
> ### Tablet
**To Rural Communities**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To idea-holders**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To business**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To researchers & scientifics**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
`### Mobile`
**To Rural Communities**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To idea-holders**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To business**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
**To researchers & scientifics**
- [ ] Popup markup
- [ ] Popup styling
- [ ] Popup testing
| non_priority | popups what we offer section desktop to rural communities popup markup popup styling popup testing to idea holders popup markup popup styling popup testing to business popup markup popup styling popup testing to researchers scientifics popup markup popup styling popup testing tablet to rural communities popup markup popup styling popup testing to idea holders popup markup popup styling popup testing to business popup markup popup styling popup testing to researchers scientifics popup markup popup styling popup testing mobile to rural communities popup markup popup styling popup testing to idea holders popup markup popup styling popup testing to business popup markup popup styling popup testing to researchers scientifics popup markup popup styling popup testing | 0 |
175,298 | 14,522,809,352 | IssuesEvent | 2020-12-14 09:18:19 | fweik/nrng | https://api.github.com/repos/fweik/nrng | closed | State Goals | documentation | Update the documentation to state what the goals of the library are.
So far planned
1. Range and constrained versions of the stl numerics algorithms
2. Additional numeric algorithms like weighted sums, statistical moments, ...
Maybe
3. Parallel versions
4. Integrations of `std::experimenta::simd`.
Ideas are welcome. | 1.0 | State Goals - Update the documentation to state what the goals of the library are.
So far planned
1. Range and constrained versions of the stl numerics algorithms
2. Additional numeric algorithms like weighted sums, statistical moments, ...
Maybe
3. Parallel versions
4. Integrations of `std::experimenta::simd`.
Ideas are welcome. | non_priority | state goals update the documentation to state what the goals of the library are so far planned range and constrained versions of the stl numerics algorithms additional numeric algorithms like weighted sums statistical moments maybe parallel versions integrations of std experimenta simd ideas are welcome | 0 |
73,513 | 9,668,962,656 | IssuesEvent | 2019-05-21 16:12:06 | itechub/jane | https://api.github.com/repos/itechub/jane | closed | Add prefix to environment variables | backend documentation refactor | In order to avoid collisions with OS environment variables, rename these variables by adding a `JANE_` prefix.
```
export SECRET_KEY='z1q=7ixu5&o=2lj05uziiemvhi)!z1-d9fwmyo(sqsyzpvg2u_'
export USERNAME='root'
export PASSWORD='123456'
export NAME='jane'
export HOST='localhost'
export PORT=3306
export DEBUG=Ture
# sentry 用于辅助追踪生产环境运行时错误
export SENTRY='https://......'
```
- [x] variables in `settings.py`
- [x] variables in backend's `README.md`
- [x] variables in docker | 1.0 | Add prefix to environment variables - In order to avoid collisions with OS environment variables, rename these variables by adding a `JANE_` prefix.
```
export SECRET_KEY='z1q=7ixu5&o=2lj05uziiemvhi)!z1-d9fwmyo(sqsyzpvg2u_'
export USERNAME='root'
export PASSWORD='123456'
export NAME='jane'
export HOST='localhost'
export PORT=3306
export DEBUG=Ture
# sentry 用于辅助追踪生产环境运行时错误
export SENTRY='https://......'
```
- [x] variables in `settings.py`
- [x] variables in backend's `README.md`
- [x] variables in docker | non_priority | add prefix to environment variables in order to avoid collisions with os environment variables rename these variables by adding a jane prefix export secret key o export username root export password export name jane export host localhost export port export debug ture sentry 用于辅助追踪生产环境运行时错误 export sentry variables in settings py variables in backend s readme md variables in docker | 0 |
334,543 | 24,423,504,963 | IssuesEvent | 2022-10-05 23:05:18 | aws/aws-sdk-java-v2 | https://api.github.com/repos/aws/aws-sdk-java-v2 | closed | "IN" Statement doesn't work with StringSet | service-api documentation service:dynamodb | ## Describe the bug
We are trying to do a query with a `IN` Statement and setting a StringSet in Query Expression
e.g.:
```
--filter-expression 'field1 IN (:fieldList)'
--expression-attribute-values '{":fieldList": {"SS":["value1", "value2"]}}'
```
Documentation isn't clear about this scenario
## Expected Behavior
The Query to actually return some values
## Current Behavior
We need to manually set value1 and value2 as variables, e.g.:
```
--filter-expression 'field1 IN (:fieldValue1,:fieldValue2)'
--expression-attribute-values '{":fieldValue1": {"S":"value1"}, ":fieldValue2": {"S":":value2"}}'
```
## Steps to Reproduce
See Description
## Possible Solution
I believe it's DynamoDb backend related
## Context
<!--- How has this issue affected you? What are you trying to accomplish? -->
We are trying to execute a query
## Your Environment
<!--- Include as many relevant details about the environment where the bug was discovered -->
* AWS Java SDK version used: 2.15.63
* JDK version used: 11
* Operating System and version: N/A
| 1.0 | "IN" Statement doesn't work with StringSet - ## Describe the bug
We are trying to do a query with a `IN` Statement and setting a StringSet in Query Expression
e.g.:
```
--filter-expression 'field1 IN (:fieldList)'
--expression-attribute-values '{":fieldList": {"SS":["value1", "value2"]}}'
```
Documentation isn't clear about this scenario
## Expected Behavior
The Query to actually return some values
## Current Behavior
We need to manually set value1 and value2 as variables, e.g.:
```
--filter-expression 'field1 IN (:fieldValue1,:fieldValue2)'
--expression-attribute-values '{":fieldValue1": {"S":"value1"}, ":fieldValue2": {"S":":value2"}}'
```
## Steps to Reproduce
See Description
## Possible Solution
I believe it's DynamoDb backend related
## Context
<!--- How has this issue affected you? What are you trying to accomplish? -->
We are trying to execute a query
## Your Environment
<!--- Include as many relevant details about the environment where the bug was discovered -->
* AWS Java SDK version used: 2.15.63
* JDK version used: 11
* Operating System and version: N/A
| non_priority | in statement doesn t work with stringset describe the bug we are trying to do a query with a in statement and setting a stringset in query expression e g filter expression in fieldlist expression attribute values fieldlist ss documentation isn t clear about this scenario expected behavior the query to actually return some values current behavior we need to manually set and as variables e g filter expression in expression attribute values s s steps to reproduce see description possible solution i believe it s dynamodb backend related context we are trying to execute a query your environment aws java sdk version used jdk version used operating system and version n a | 0 |
63,712 | 15,707,410,440 | IssuesEvent | 2021-03-26 18:50:27 | tensorflow/tensorflow | https://api.github.com/repos/tensorflow/tensorflow | opened | Please help Conda package tensorflow for OSX | type:build/install | (I get that this is a weird thing to put in an issue)
Right now it's hard for the Anaconda people to make conda packages of Tensorflow for OSX because of gcc-versus-clang issues:
https://github.com/ContinuumIO/anaconda-issues/issues/11697
This is impacting downstream packages that want to use tensorflow, as we can't specify conda environments that come with tensorflow included; installing it with pip afterwards severely limits our ability to sanely package it.
If you can spare the time to work this out with them, a lot of us who maintain downstream packages would really appreciate it. | 1.0 | Please help Conda package tensorflow for OSX - (I get that this is a weird thing to put in an issue)
Right now it's hard for the Anaconda people to make conda packages of Tensorflow for OSX because of gcc-versus-clang issues:
https://github.com/ContinuumIO/anaconda-issues/issues/11697
This is impacting downstream packages that want to use tensorflow, as we can't specify conda environments that come with tensorflow included; installing it with pip afterwards severely limits our ability to sanely package it.
If you can spare the time to work this out with them, a lot of us who maintain downstream packages would really appreciate it. | non_priority | please help conda package tensorflow for osx i get that this is a weird thing to put in an issue right now it s hard for the anaconda people to make conda packages of tensorflow for osx because of gcc versus clang issues this is impacting downstream packages that want to use tensorflow as we can t specify conda environments that come with tensorflow included installing it with pip afterwards severely limits our ability to sanely package it if you can spare the time to work this out with them a lot of us who maintain downstream packages would really appreciate it | 0 |
198,278 | 22,621,115,053 | IssuesEvent | 2022-06-30 06:26:51 | ioana-nicolae/keycloak | https://api.github.com/repos/ioana-nicolae/keycloak | opened | CVE-2021-41973 (Medium) detected in mina-core-2.1.3.jar | security vulnerability | ## CVE-2021-41973 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mina-core-2.1.3.jar</b></p></summary>
<p>Apache MINA is a network application framework which helps users develop high performance and highly scalable network applications easily. It provides an abstract event-driven asynchronous API over various transports such as TCP/IP and UDP/IP via Java NIO.</p>
<p>Library home page: <a href="https://mina.apache.org/">https://mina.apache.org/</a></p>
<p>Path to dependency file: /testsuite/model/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar</p>
<p>
Dependency Hierarchy:
- keycloak-util-embedded-ldap-13.0.0-SNAPSHOT.jar (Root Library)
- apacheds-server-annotations-2.0.0.AM26.jar
- :x: **mina-core-2.1.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ioana-nicolae/keycloak/commit/34eee947640ca637662cb41e649c6acf8b6d8c2e">34eee947640ca637662cb41e649c6acf8b6d8c2e</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.
<p>Publish Date: 2021-11-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41973>CVE-2021-41973</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-6mcm-j9cj-3vc3">https://github.com/advisories/GHSA-6mcm-j9cj-3vc3</a></p>
<p>Release Date: 2021-11-01</p>
<p>Fix Resolution: org.apache.mina:mina-core:2.0.22,2.1.5</p>
</p>
</details>
<p></p>
| True | CVE-2021-41973 (Medium) detected in mina-core-2.1.3.jar - ## CVE-2021-41973 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mina-core-2.1.3.jar</b></p></summary>
<p>Apache MINA is a network application framework which helps users develop high performance and highly scalable network applications easily. It provides an abstract event-driven asynchronous API over various transports such as TCP/IP and UDP/IP via Java NIO.</p>
<p>Library home page: <a href="https://mina.apache.org/">https://mina.apache.org/</a></p>
<p>Path to dependency file: /testsuite/model/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar,/home/wss-scanner/.m2/repository/org/apache/mina/mina-core/2.1.3/mina-core-2.1.3.jar</p>
<p>
Dependency Hierarchy:
- keycloak-util-embedded-ldap-13.0.0-SNAPSHOT.jar (Root Library)
- apacheds-server-annotations-2.0.0.AM26.jar
- :x: **mina-core-2.1.3.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/ioana-nicolae/keycloak/commit/34eee947640ca637662cb41e649c6acf8b6d8c2e">34eee947640ca637662cb41e649c6acf8b6d8c2e</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Apache MINA, a specifically crafted, malformed HTTP request may cause the HTTP Header decoder to loop indefinitely. The decoder assumed that the HTTP Header begins at the beginning of the buffer and loops if there is more data than expected. Please update MINA to 2.1.5 or greater.
<p>Publish Date: 2021-11-01
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-41973>CVE-2021-41973</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-6mcm-j9cj-3vc3">https://github.com/advisories/GHSA-6mcm-j9cj-3vc3</a></p>
<p>Release Date: 2021-11-01</p>
<p>Fix Resolution: org.apache.mina:mina-core:2.0.22,2.1.5</p>
</p>
</details>
<p></p>
| non_priority | cve medium detected in mina core jar cve medium severity vulnerability vulnerable library mina core jar apache mina is a network application framework which helps users develop high performance and highly scalable network applications easily it provides an abstract event driven asynchronous api over various transports such as tcp ip and udp ip via java nio library home page a href path to dependency file testsuite model pom xml path to vulnerable library home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar home wss scanner repository org apache mina mina core mina core jar dependency hierarchy keycloak util embedded ldap snapshot jar root library apacheds server annotations jar x mina core jar vulnerable library found in head commit a href found in base branch master vulnerability details in apache mina a specifically crafted malformed http request may cause the http header decoder to loop indefinitely the decoder assumed that the http header begins at the beginning of the buffer and loops if there is more data than expected please update mina to or greater publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache mina mina core | 0 |
12,026 | 3,250,500,664 | IssuesEvent | 2015-10-19 00:51:23 | photonstorm/phaser | https://api.github.com/repos/photonstorm/phaser | closed | With WebGL, adding child text to button renders text to other buttons | user to test | Creating multiple Phaser.Buttons and giving them Phaser.Text children will result in both the buttons and children to be rendered and subsequent labels to be rendered on previously created buttons.
This problem is only reproducible when using WebGL (and not Canvas) as Phaser's renderer.
This bug is seen as a regression between 2.4.3 and 2.4.4 (introduced by 99751a5).
Example code:
http://phaser.io/sandbox/rscQDbmR
```
function create()
{
var buttonStyle = { font: "32px Arial", fill: "#ffffff" };
var button1 = game.add.button( 0, 0 );
var buttonLabel1 = game.make.text( 0, 0, "Button1", buttonStyle );
button1.addChild( buttonLabel1 );
var button2 = game.add.button( 0, 32 );
var buttonLabel2 = game.make.text( 64, 256, "Button2", buttonStyle );
button2.addChild( buttonLabel2 );
var button3 = game.add.button( 0, 64 );
game.add.tween( button2.position ).to( { x: 256 }, 2500, Phaser.Easing.Linear.None, true );
//game.add.tween( buttonLabel2.position ).to( { y: 128 }, 1500, Phaser.Easing.Linear.None, true );
}
```
| 1.0 | With WebGL, adding child text to button renders text to other buttons - Creating multiple Phaser.Buttons and giving them Phaser.Text children will result in both the buttons and children to be rendered and subsequent labels to be rendered on previously created buttons.
This problem is only reproducible when using WebGL (and not Canvas) as Phaser's renderer.
This bug is seen as a regression between 2.4.3 and 2.4.4 (introduced by 99751a5).
Example code:
http://phaser.io/sandbox/rscQDbmR
```
function create()
{
var buttonStyle = { font: "32px Arial", fill: "#ffffff" };
var button1 = game.add.button( 0, 0 );
var buttonLabel1 = game.make.text( 0, 0, "Button1", buttonStyle );
button1.addChild( buttonLabel1 );
var button2 = game.add.button( 0, 32 );
var buttonLabel2 = game.make.text( 64, 256, "Button2", buttonStyle );
button2.addChild( buttonLabel2 );
var button3 = game.add.button( 0, 64 );
game.add.tween( button2.position ).to( { x: 256 }, 2500, Phaser.Easing.Linear.None, true );
//game.add.tween( buttonLabel2.position ).to( { y: 128 }, 1500, Phaser.Easing.Linear.None, true );
}
```
| non_priority | with webgl adding child text to button renders text to other buttons creating multiple phaser buttons and giving them phaser text children will result in both the buttons and children to be rendered and subsequent labels to be rendered on previously created buttons this problem is only reproducible when using webgl and not canvas as phaser s renderer this bug is seen as a regression between and introduced by example code function create var buttonstyle font arial fill ffffff var game add button var game make text buttonstyle addchild var game add button var game make text buttonstyle addchild var game add button game add tween position to x phaser easing linear none true game add tween position to y phaser easing linear none true | 0 |
387,415 | 26,722,807,189 | IssuesEvent | 2023-01-29 10:51:01 | PerimeterX/marshmallow | https://api.github.com/repos/PerimeterX/marshmallow | closed | Is there a way to marshal de JSON | documentation | Hi!
I am looking for a way to read, modify and save a JSON of which I am only interested in part of its content.
This package looks like it could be useful for the first two steps, but I'm not sure about the last one.
Is there any way to do it? Either through the API of the package or in some recommended way.
Thanks!
(P.S. I tried to open a discussion instead of an issue but I can't do it) | 1.0 | Is there a way to marshal de JSON - Hi!
I am looking for a way to read, modify and save a JSON of which I am only interested in part of its content.
This package looks like it could be useful for the first two steps, but I'm not sure about the last one.
Is there any way to do it? Either through the API of the package or in some recommended way.
Thanks!
(P.S. I tried to open a discussion instead of an issue but I can't do it) | non_priority | is there a way to marshal de json hi i am looking for a way to read modify and save a json of which i am only interested in part of its content this package looks like it could be useful for the first two steps but i m not sure about the last one is there any way to do it either through the api of the package or in some recommended way thanks p s i tried to open a discussion instead of an issue but i can t do it | 0 |
74,598 | 20,250,091,212 | IssuesEvent | 2022-02-14 17:03:00 | bottlerocket-os/bottlerocket-test-system | https://api.github.com/repos/bottlerocket-os/bottlerocket-test-system | closed | certificates missing in agents | bug resource-agent test-agent build |
```
kubectl logs x86-64-aws-k8s-121-creation-s2h8k
[2022-02-14T01:30:43Z INFO eks_resource_agent::eks_provider] Beginning creation of EKS cluster 'x86-64-aws-k8s-121' with creation policy 'Some(IfNotExists)'
thread 'main' panicked at 'no CA certificates found', /src/.cargo/registry/src/github.com-1ecc6299db9ec823/hyper-rustls-0.22.1/src/connector.rs:45:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
``` | 1.0 | certificates missing in agents -
```
kubectl logs x86-64-aws-k8s-121-creation-s2h8k
[2022-02-14T01:30:43Z INFO eks_resource_agent::eks_provider] Beginning creation of EKS cluster 'x86-64-aws-k8s-121' with creation policy 'Some(IfNotExists)'
thread 'main' panicked at 'no CA certificates found', /src/.cargo/registry/src/github.com-1ecc6299db9ec823/hyper-rustls-0.22.1/src/connector.rs:45:13
note: run with `RUST_BACKTRACE=1` environment variable to display a backtrace
``` | non_priority | certificates missing in agents kubectl logs aws creation beginning creation of eks cluster aws with creation policy some ifnotexists thread main panicked at no ca certificates found src cargo registry src github com hyper rustls src connector rs note run with rust backtrace environment variable to display a backtrace | 0 |
84,919 | 10,421,311,023 | IssuesEvent | 2019-09-16 05:35:37 | trevorld/r-optparse | https://api.github.com/repos/trevorld/r-optparse | closed | Throw error if short flag more than one character long | documentation | Hello,
The opt list contains different values while executing a script by command-line (Rscript) versus RStudio. Here's the code:
```
#!/usr/bin/env Rscript
suppressMessages(library('optparse'))
options(show.error.locations = TRUE)
#### ARGUMENTS ####
option_list = list(
make_option(c("-i","--input"), type="character", default=NULL,
help="", metavar="character"),
make_option(c("--output", "-o"), type="character", default=NULL,
help="", metavar="character"),
make_option(c("--bootstraps", "-b"), type="integer", default=1000,
help="", metavar="integer"),
make_option(c("--predictionsNumber", "-m"), type="integer", default=NULL,
help="", metavar="integer"),
make_option(c("--bootstrapsCI", "-c"), type="numeric", default=0.95,
help="", metavar="numeric"),
make_option(c("--CPU", "-p"), type="integer", default=4,
help="", metavar="integer"),
make_option(c("--wilcoxStartBin", "-wilcoxStart"), type="numeric", default=NULL,
help="", metavar="numeric"),
make_option(c("--wilcoxEndBin", "-wilcoxEnd"), type="numeric", default=NULL,
help="", metavar="numeric"),
make_option(c("--wilcoxThreshold", "-wilcoxT"), type="numeric", default=0.05,
help="", metavar="numeric"),
make_option(c("--firstRegionName", "-name1"), type="character", default="Region1",
help="", metavar="character"),
make_option(c("--secondRegionName", "-name2"), type="character", default="Region2",
help="", metavar="character"),
make_option(c("--bootPlotWidth", "-bootW"), type="numeric", default=6,
help="", metavar="numeric"),
make_option(c("--bootPlotHeight", "-bootH"), type="numeric", default=3.7,
help="", metavar="numeric"),
make_option(c("--bootPlotColors", "-bootC"), type="character", default=NULL,
help="", metavar="character"),
make_option(c("--wilcoxPlotWidth", "-wilcoxW"), type="numeric", default=4.6,
help="", metavar="numeric"),
make_option(c("--wilcoxPlotHeight", "-wilcoxH"), type="numeric", default=3.7,
help="", metavar="numeric"),
make_option(c("--signalName", "-signal"), type="character", default="Genomic signal",
help="", metavar="character"),
make_option(c("--font", "-f"), type="character", default=NULL,
help=".", metavar="character")
);
opt_parser = OptionParser(description= "", usage = "", option_list=option_list);
opt = parse_args(opt_parser);
opt
```
Under RStudio, the none given arguments are NULL in the `opt` list (they don't exist), while when executed under command line, they are not null and even take other arguments values, for instance:
Rscript script.R -i file.txt -o output_test -b 1000 -p 40 --firstRegionName "Selection" --signalName ""
```
$input
[1] "file.txt"
$output
[1] "output_test"
$bootstraps
[1] 1000
$bootstrapsCI
[1] 0.95
$CPU
[1] 40
$wilcoxStartBin
[1] "output_test"
$wilcoxEndBin
[1] "output_test"
$wilcoxThreshold
[1] "output_test"
$firstRegionName
[1] "Selection"
$secondRegionName
[1] "Region2"
$bootPlotWidth
[1] 1000
$bootPlotHeight
[1] 1000
$bootPlotColors
[1] 1000
$wilcoxPlotWidth
[1] "output_test"
$wilcoxPlotHeight
[1] "output_test"
$signalName
[1] "A"
$help
[1] FALSE
```
When just executing `script.R` without any arguments, then `opt` has the correct default values and the default NULL are correctly assigned.
```
$bootstraps
[1] 1000
$bootstrapsCI
[1] 0.95
$CPU
[1] 4
$wilcoxThreshold
[1] 0.05
$firstRegionName
[1] "Region1"
$secondRegionName
[1] "Region2"
$bootPlotWidth
[1] 6
$bootPlotHeight
[1] 3.7
$wilcoxPlotWidth
[1] 4.6
$wilcoxPlotHeight
[1] 3.7
$signalName
[1] "Genomic signal"
$help
[1] FALSE
``` | 1.0 | Throw error if short flag more than one character long - Hello,
The opt list contains different values while executing a script by command-line (Rscript) versus RStudio. Here's the code:
```
#!/usr/bin/env Rscript
suppressMessages(library('optparse'))
options(show.error.locations = TRUE)
#### ARGUMENTS ####
option_list = list(
make_option(c("-i","--input"), type="character", default=NULL,
help="", metavar="character"),
make_option(c("--output", "-o"), type="character", default=NULL,
help="", metavar="character"),
make_option(c("--bootstraps", "-b"), type="integer", default=1000,
help="", metavar="integer"),
make_option(c("--predictionsNumber", "-m"), type="integer", default=NULL,
help="", metavar="integer"),
make_option(c("--bootstrapsCI", "-c"), type="numeric", default=0.95,
help="", metavar="numeric"),
make_option(c("--CPU", "-p"), type="integer", default=4,
help="", metavar="integer"),
make_option(c("--wilcoxStartBin", "-wilcoxStart"), type="numeric", default=NULL,
help="", metavar="numeric"),
make_option(c("--wilcoxEndBin", "-wilcoxEnd"), type="numeric", default=NULL,
help="", metavar="numeric"),
make_option(c("--wilcoxThreshold", "-wilcoxT"), type="numeric", default=0.05,
help="", metavar="numeric"),
make_option(c("--firstRegionName", "-name1"), type="character", default="Region1",
help="", metavar="character"),
make_option(c("--secondRegionName", "-name2"), type="character", default="Region2",
help="", metavar="character"),
make_option(c("--bootPlotWidth", "-bootW"), type="numeric", default=6,
help="", metavar="numeric"),
make_option(c("--bootPlotHeight", "-bootH"), type="numeric", default=3.7,
help="", metavar="numeric"),
make_option(c("--bootPlotColors", "-bootC"), type="character", default=NULL,
help="", metavar="character"),
make_option(c("--wilcoxPlotWidth", "-wilcoxW"), type="numeric", default=4.6,
help="", metavar="numeric"),
make_option(c("--wilcoxPlotHeight", "-wilcoxH"), type="numeric", default=3.7,
help="", metavar="numeric"),
make_option(c("--signalName", "-signal"), type="character", default="Genomic signal",
help="", metavar="character"),
make_option(c("--font", "-f"), type="character", default=NULL,
help=".", metavar="character")
);
opt_parser = OptionParser(description= "", usage = "", option_list=option_list);
opt = parse_args(opt_parser);
opt
```
Under RStudio, the none given arguments are NULL in the `opt` list (they don't exist), while when executed under command line, they are not null and even take other arguments values, for instance:
Rscript script.R -i file.txt -o output_test -b 1000 -p 40 --firstRegionName "Selection" --signalName ""
```
$input
[1] "file.txt"
$output
[1] "output_test"
$bootstraps
[1] 1000
$bootstrapsCI
[1] 0.95
$CPU
[1] 40
$wilcoxStartBin
[1] "output_test"
$wilcoxEndBin
[1] "output_test"
$wilcoxThreshold
[1] "output_test"
$firstRegionName
[1] "Selection"
$secondRegionName
[1] "Region2"
$bootPlotWidth
[1] 1000
$bootPlotHeight
[1] 1000
$bootPlotColors
[1] 1000
$wilcoxPlotWidth
[1] "output_test"
$wilcoxPlotHeight
[1] "output_test"
$signalName
[1] "A"
$help
[1] FALSE
```
When just executing `script.R` without any arguments, then `opt` has the correct default values and the default NULL are correctly assigned.
```
$bootstraps
[1] 1000
$bootstrapsCI
[1] 0.95
$CPU
[1] 4
$wilcoxThreshold
[1] 0.05
$firstRegionName
[1] "Region1"
$secondRegionName
[1] "Region2"
$bootPlotWidth
[1] 6
$bootPlotHeight
[1] 3.7
$wilcoxPlotWidth
[1] 4.6
$wilcoxPlotHeight
[1] 3.7
$signalName
[1] "Genomic signal"
$help
[1] FALSE
``` | non_priority | throw error if short flag more than one character long hello the opt list contains different values while executing a script by command line rscript versus rstudio here s the code usr bin env rscript suppressmessages library optparse options show error locations true arguments option list list make option c i input type character default null help metavar character make option c output o type character default null help metavar character make option c bootstraps b type integer default help metavar integer make option c predictionsnumber m type integer default null help metavar integer make option c bootstrapsci c type numeric default help metavar numeric make option c cpu p type integer default help metavar integer make option c wilcoxstartbin wilcoxstart type numeric default null help metavar numeric make option c wilcoxendbin wilcoxend type numeric default null help metavar numeric make option c wilcoxthreshold wilcoxt type numeric default help metavar numeric make option c firstregionname type character default help metavar character make option c secondregionname type character default help metavar character make option c bootplotwidth bootw type numeric default help metavar numeric make option c bootplotheight booth type numeric default help metavar numeric make option c bootplotcolors bootc type character default null help metavar character make option c wilcoxplotwidth wilcoxw type numeric default help metavar numeric make option c wilcoxplotheight wilcoxh type numeric default help metavar numeric make option c signalname signal type character default genomic signal help metavar character make option c font f type character default null help metavar character opt parser optionparser description usage option list option list opt parse args opt parser opt under rstudio the none given arguments are null in the opt list they don t exist while when executed under command line they are not null and even take other arguments values for instance rscript script r i file txt o output test b p firstregionname selection signalname input file txt output output test bootstraps bootstrapsci cpu wilcoxstartbin output test wilcoxendbin output test wilcoxthreshold output test firstregionname selection secondregionname bootplotwidth bootplotheight bootplotcolors wilcoxplotwidth output test wilcoxplotheight output test signalname a help false when just executing script r without any arguments then opt has the correct default values and the default null are correctly assigned bootstraps bootstrapsci cpu wilcoxthreshold firstregionname secondregionname bootplotwidth bootplotheight wilcoxplotwidth wilcoxplotheight signalname genomic signal help false | 0 |
69,166 | 14,973,457,354 | IssuesEvent | 2021-01-28 01:07:34 | TreyM-WSS/catalog-profiler-examples | https://api.github.com/repos/TreyM-WSS/catalog-profiler-examples | opened | CVE-2020-35490 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2020-35490 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: catalog-profiler-examples/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- jersey-media-json-jackson-2.27.jar (Root Library)
- jackson-module-jaxb-annotations-2.8.10.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
<p>Publish Date: 2020-12-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490>CVE-2020-35490</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2986">https://github.com/FasterXML/jackson-databind/issues/2986</a></p>
<p>Release Date: 2020-12-17</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":true,"dependencyTree":"org.glassfish.jersey.media:jersey-media-json-jackson:2.27;com.fasterxml.jackson.module:jackson-module-jaxb-annotations:2.8.10;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"vulnerabilityIdentifier":"CVE-2020-35490","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-35490 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-35490 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: catalog-profiler-examples/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- jersey-media-json-jackson-2.27.jar (Root Library)
- jackson-module-jaxb-annotations-2.8.10.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.
<p>Publish Date: 2020-12-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490>CVE-2020-35490</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2986">https://github.com/FasterXML/jackson-databind/issues/2986</a></p>
<p>Release Date: 2020-12-17</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.8</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":true,"dependencyTree":"org.glassfish.jersey.media:jersey-media-json-jackson:2.27;com.fasterxml.jackson.module:jackson-module-jaxb-annotations:2.8.10;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.8"}],"vulnerabilityIdentifier":"CVE-2020-35490","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.dbcp2.datasources.PerUserPoolDataSource.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35490","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file catalog profiler examples build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy jersey media json jackson jar root library jackson module jaxb annotations jar x jackson databind jar vulnerable library found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache commons datasources peruserpooldatasource publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to org apache commons datasources peruserpooldatasource vulnerabilityurl | 0 |
83,170 | 10,329,221,959 | IssuesEvent | 2019-09-02 11:37:22 | mhmdtshref/portfolio | https://api.github.com/repos/mhmdtshref/portfolio | closed | Create language page component | design feature technical | Using Figma design, create the service page component which gets services from the backend. | 1.0 | Create language page component - Using Figma design, create the service page component which gets services from the backend. | non_priority | create language page component using figma design create the service page component which gets services from the backend | 0 |
2,814 | 12,641,414,202 | IssuesEvent | 2020-06-16 06:05:55 | Shirataki2/WebBash | https://api.github.com/repos/Shirataki2/WebBash | closed | Test on Predeployでの条件変更とRelease Drafterの微修正 | Automation Chore | `.github/release-drafter.yml`
```yml
name-template: "v$NEXT_PATCH_VERSION"
tag-template: "v$NEXT_PATCH_VERSION"
categories:
- title: "🚀 新機能"
labels:
- "Feature"
- title: "🐛 バグ修正"
labels:
- "Bug"
- title: "🧰 メンテナンス"
labels:
- "chore" <- 大文字にする
- title: "🤖 自動化"
labels:
- "Automation"
...
```
### Test on Predeploy
コミットメッセージに[No CI]があれば実行しない | 1.0 | Test on Predeployでの条件変更とRelease Drafterの微修正 - `.github/release-drafter.yml`
```yml
name-template: "v$NEXT_PATCH_VERSION"
tag-template: "v$NEXT_PATCH_VERSION"
categories:
- title: "🚀 新機能"
labels:
- "Feature"
- title: "🐛 バグ修正"
labels:
- "Bug"
- title: "🧰 メンテナンス"
labels:
- "chore" <- 大文字にする
- title: "🤖 自動化"
labels:
- "Automation"
...
```
### Test on Predeploy
コミットメッセージに[No CI]があれば実行しない | non_priority | test on predeployでの条件変更とrelease drafterの微修正 github release drafter yml yml name template v next patch version tag template v next patch version categories title 🚀 新機能 labels feature title 🐛 バグ修正 labels bug title 🧰 メンテナンス labels chore 大文字にする title 🤖 自動化 labels automation test on predeploy コミットメッセージに があれば実行しない | 0 |
41,290 | 6,899,094,556 | IssuesEvent | 2017-11-24 12:16:24 | bio2bel/ec | https://api.github.com/repos/bio2bel/ec | closed | Fill out all rtype in manager | documentation | It's a lot of the time more informative to have the `:rtype:` filled out in the documentation because then PyCharm can introspect and give better suggestions | 1.0 | Fill out all rtype in manager - It's a lot of the time more informative to have the `:rtype:` filled out in the documentation because then PyCharm can introspect and give better suggestions | non_priority | fill out all rtype in manager it s a lot of the time more informative to have the rtype filled out in the documentation because then pycharm can introspect and give better suggestions | 0 |
137,986 | 11,171,920,734 | IssuesEvent | 2019-12-29 00:23:51 | HRSEVESOSK/cide-ionic-app | https://api.github.com/repos/HRSEVESOSK/cide-ionic-app | opened | Correct names of Institutions | testing | Name of institutions should be in Croatian. The name of institution for ICZ/Inspekcije civilne zaštite” is missing and should be: „Ministsrstvo unutarnjih poslova Ravnateljstvo civilne zaštite“.

Note 14.6.2019. This should be corrected. Please provide us a procedure how to do that.
| 1.0 | Correct names of Institutions - Name of institutions should be in Croatian. The name of institution for ICZ/Inspekcije civilne zaštite” is missing and should be: „Ministsrstvo unutarnjih poslova Ravnateljstvo civilne zaštite“.

Note 14.6.2019. This should be corrected. Please provide us a procedure how to do that.
| non_priority | correct names of institutions name of institutions should be in croatian the name of institution for icz inspekcije civilne zaštite” is missing and should be „ministsrstvo unutarnjih poslova ravnateljstvo civilne zaštite“ note this should be corrected please provide us a procedure how to do that | 0 |
15,232 | 19,340,074,462 | IssuesEvent | 2021-12-15 02:43:11 | PG85/OpenTerrainGenerator | https://api.github.com/repos/PG85/OpenTerrainGenerator | closed | Bug: /locate not working for some Forge mods | Bug - Issue Forge Mod Compatibility Commands | #### OTG Plugin or Mod
[Please specify if it's about Forge Mod or Spigot server Plugin placing "x" into []]
- [x] OTG Mod for Forge
- [ ] OTG Plugin for Spigot
#### OTG Version
[Please specify the full OTG version that you are running by placing "x" into []]
- [x] 1.16.5
- [ ] 1.17.1
- [ ] 1.12.2_v8_r1
- [ ] 1.12.2_v7_DEV_r26
- [ ] 1.12.2-v6
- [ ] 1.12.2-v5
- [ ] 1.11.2-v8
- [ ] 1.11.2-v9
- [ ] 1.10.2-v21
- [ ] Other - specify here
#### Forge or Spigot Versions
Forge 1.16.5 / 36.2.8
#### What other plugins are you running?
1) The Graveyard - 2.1
2) Awesome dungeons - 1.1.2
3) Illagers plus - 1.7.2
#### Description
A tester of ours, haeihaeihaei#4660, reported to the discord that he had experienced issues with structures.
Apparently, certain mods mess up the /locate command, presumably, it says where the structures would be located if this were vanilla, but they wind up being in different places entirely. | True | Bug: /locate not working for some Forge mods - #### OTG Plugin or Mod
[Please specify if it's about Forge Mod or Spigot server Plugin placing "x" into []]
- [x] OTG Mod for Forge
- [ ] OTG Plugin for Spigot
#### OTG Version
[Please specify the full OTG version that you are running by placing "x" into []]
- [x] 1.16.5
- [ ] 1.17.1
- [ ] 1.12.2_v8_r1
- [ ] 1.12.2_v7_DEV_r26
- [ ] 1.12.2-v6
- [ ] 1.12.2-v5
- [ ] 1.11.2-v8
- [ ] 1.11.2-v9
- [ ] 1.10.2-v21
- [ ] Other - specify here
#### Forge or Spigot Versions
Forge 1.16.5 / 36.2.8
#### What other plugins are you running?
1) The Graveyard - 2.1
2) Awesome dungeons - 1.1.2
3) Illagers plus - 1.7.2
#### Description
A tester of ours, haeihaeihaei#4660, reported to the discord that he had experienced issues with structures.
Apparently, certain mods mess up the /locate command, presumably, it says where the structures would be located if this were vanilla, but they wind up being in different places entirely. | non_priority | bug locate not working for some forge mods otg plugin or mod otg mod for forge otg plugin for spigot otg version dev other specify here forge or spigot versions forge what other plugins are you running the graveyard awesome dungeons illagers plus description a tester of ours haeihaeihaei reported to the discord that he had experienced issues with structures apparently certain mods mess up the locate command presumably it says where the structures would be located if this were vanilla but they wind up being in different places entirely | 0 |
442,556 | 30,842,304,666 | IssuesEvent | 2023-08-02 11:32:15 | wirDesign-communication-AG/wirhub-app | https://api.github.com/repos/wirDesign-communication-AG/wirhub-app | closed | v3.0.8 | documentation | 🗓 Voraussichtlicher Release: 31.07.
# Bugs
- [x] #649
- [x] #658
# Features
#### 2WD
- [x] #644
- [x] #646
# Enhancements
- [x] #655 | 1.0 | v3.0.8 - 🗓 Voraussichtlicher Release: 31.07.
# Bugs
- [x] #649
- [x] #658
# Features
#### 2WD
- [x] #644
- [x] #646
# Enhancements
- [x] #655 | non_priority | 🗓 voraussichtlicher release bugs features enhancements | 0 |
190,298 | 22,047,378,086 | IssuesEvent | 2022-05-30 04:22:54 | pazhanivel07/linux-4.19.72 | https://api.github.com/repos/pazhanivel07/linux-4.19.72 | closed | CVE-2018-20669 (High) detected in linux-yoctov5.4.51 - autoclosed | security vulnerability | ## CVE-2018-20669 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20669>CVE-2018-20669</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: v5.0-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-20669 (High) detected in linux-yoctov5.4.51 - autoclosed - ## CVE-2018-20669 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yoctov5.4.51</b></p></summary>
<p>
<p>Yocto Linux Embedded kernel</p>
<p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto>https://git.yoctoproject.org/git/linux-yocto</a></p>
<p>Found in HEAD commit: <a href="https://github.com/pazhanivel07/linux-4.19.72/commit/ce28e4f7a922d93d9b737061ae46827305c8c30a">ce28e4f7a922d93d9b737061ae46827305c8c30a</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue where a provided address with access_ok() is not checked was discovered in i915_gem_execbuffer2_ioctl in drivers/gpu/drm/i915/i915_gem_execbuffer.c in the Linux kernel through 4.19.13. A local attacker can craft a malicious IOCTL function call to overwrite arbitrary kernel memory, resulting in a Denial of Service or privilege escalation.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20669>CVE-2018-20669</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20669</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: v5.0-rc1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linux autoclosed cve high severity vulnerability vulnerable library linux yocto linux embedded kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details an issue where a provided address with access ok is not checked was discovered in gem ioctl in drivers gpu drm gem execbuffer c in the linux kernel through a local attacker can craft a malicious ioctl function call to overwrite arbitrary kernel memory resulting in a denial of service or privilege escalation publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
27,705 | 4,326,601,532 | IssuesEvent | 2016-07-26 07:14:20 | QualiSystems/AWS-Shell | https://api.github.com/repos/QualiSystems/AWS-Shell | closed | Delete Instance command | Blocked by Bug F-deployment Test Plan Version 7.1 | Terminate the AWS instance only
this command should be hidden and will be called by RemoveResourceFromReservation
we should delete all entities related to this instance as part of this command.
For now only delete the exclusive Security Group.
The deletion of storage will be handled in another story.
**there will be only a hidden command! no command exposed to the user.
**need to consider supporting bulk deletion using this command (should be aligned with the Server) | 1.0 | Delete Instance command - Terminate the AWS instance only
this command should be hidden and will be called by RemoveResourceFromReservation
we should delete all entities related to this instance as part of this command.
For now only delete the exclusive Security Group.
The deletion of storage will be handled in another story.
**there will be only a hidden command! no command exposed to the user.
**need to consider supporting bulk deletion using this command (should be aligned with the Server) | non_priority | delete instance command terminate the aws instance only this command should be hidden and will be called by removeresourcefromreservation we should delete all entities related to this instance as part of this command for now only delete the exclusive security group the deletion of storage will be handled in another story there will be only a hidden command no command exposed to the user need to consider supporting bulk deletion using this command should be aligned with the server | 0 |
4,740 | 2,871,982,018 | IssuesEvent | 2015-06-08 08:51:33 | dotse/zonemaster-backend | https://api.github.com/repos/dotse/zonemaster-backend | closed | Method #5 (start_domain_test) cant be run using API.md | documentation Prio High | This document (https://github.com/dotse/zonemaster-backend/blob/master/docs/API.md) needs to have functioning examples (that are always updated if the API changes). When I try to run method "start_domain_test" it returns:
{"error":{"message":"Failed to parse json","code":-32700}}
Please add a working example to the document (if some API-calls need a previous call to work, like "get_test" etc, then please note that in the document and try to have an existing call to create a test exists before that).
| 1.0 | Method #5 (start_domain_test) cant be run using API.md - This document (https://github.com/dotse/zonemaster-backend/blob/master/docs/API.md) needs to have functioning examples (that are always updated if the API changes). When I try to run method "start_domain_test" it returns:
{"error":{"message":"Failed to parse json","code":-32700}}
Please add a working example to the document (if some API-calls need a previous call to work, like "get_test" etc, then please note that in the document and try to have an existing call to create a test exists before that).
| non_priority | method start domain test cant be run using api md this document needs to have functioning examples that are always updated if the api changes when i try to run method start domain test it returns error message failed to parse json code please add a working example to the document if some api calls need a previous call to work like get test etc then please note that in the document and try to have an existing call to create a test exists before that | 0 |
5,473 | 12,543,953,875 | IssuesEvent | 2020-06-05 16:24:39 | MicrosoftDocs/architecture-center | https://api.github.com/repos/MicrosoftDocs/architecture-center | closed | Typo in Reference Architecture | Pri1 architecture-center/svc assigned-to-author cxp doc-enhancement solution-idea/subsvc triaged | In the reference architecture diagram for the first step it mentions as Azure Data Lake Storage but in the Data Flow step 1 it mentions as Azure Blob Storage.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 1b68d40f-4b98-396b-f4c3-b8650fc4633f
* Version Independent ID: 26b362d7-b46a-fa03-c2aa-48b581b67bf0
* Content: [Advanced Analytics Architecture - Azure Solution Ideas](https://docs.microsoft.com/en-us/azure/architecture/solution-ideas/articles/advanced-analytics-on-big-data#feedback)
* Content Source: [docs/solution-ideas/articles/advanced-analytics-on-big-data.md](https://github.com/microsoftdocs/architecture-center/blob/master/docs/solution-ideas/articles/advanced-analytics-on-big-data.md)
* Service: **architecture-center**
* Sub-service: **solution-idea**
* GitHub Login: @adamboeglin
* Microsoft Alias: **pnp** | 1.0 | Typo in Reference Architecture - In the reference architecture diagram for the first step it mentions as Azure Data Lake Storage but in the Data Flow step 1 it mentions as Azure Blob Storage.
---
#### Document Details
⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.*
* ID: 1b68d40f-4b98-396b-f4c3-b8650fc4633f
* Version Independent ID: 26b362d7-b46a-fa03-c2aa-48b581b67bf0
* Content: [Advanced Analytics Architecture - Azure Solution Ideas](https://docs.microsoft.com/en-us/azure/architecture/solution-ideas/articles/advanced-analytics-on-big-data#feedback)
* Content Source: [docs/solution-ideas/articles/advanced-analytics-on-big-data.md](https://github.com/microsoftdocs/architecture-center/blob/master/docs/solution-ideas/articles/advanced-analytics-on-big-data.md)
* Service: **architecture-center**
* Sub-service: **solution-idea**
* GitHub Login: @adamboeglin
* Microsoft Alias: **pnp** | non_priority | typo in reference architecture in the reference architecture diagram for the first step it mentions as azure data lake storage but in the data flow step it mentions as azure blob storage document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service architecture center sub service solution idea github login adamboeglin microsoft alias pnp | 0 |
50,645 | 21,263,150,651 | IssuesEvent | 2022-04-13 07:20:24 | BlackstarDigitalTeam/KetteringReleases | https://api.github.com/repos/BlackstarDigitalTeam/KetteringReleases | closed | [Architect v1.1.2] - Error Connecting | Customer Service | Architect: v1.1.2
OS: Windows 10
Device Model: Not connected
Device Version:
Description:I have a connection problem with my amp it is on and it is connected to the both devices. You can even hear the computer sounds through the amp but yet still the software does not recognize my amp. | 1.0 | [Architect v1.1.2] - Error Connecting - Architect: v1.1.2
OS: Windows 10
Device Model: Not connected
Device Version:
Description:I have a connection problem with my amp it is on and it is connected to the both devices. You can even hear the computer sounds through the amp but yet still the software does not recognize my amp. | non_priority | error connecting architect os windows device model not connected device version description i have a connection problem with my amp it is on and it is connected to the both devices you can even hear the computer sounds through the amp but yet still the software does not recognize my amp | 0 |
217,616 | 16,723,146,622 | IssuesEvent | 2021-06-10 09:43:35 | djfoster21/mcDuckBroker | https://api.github.com/repos/djfoster21/mcDuckBroker | opened | Webs para ver volumen y liquidaciones de un activo (pools de liquidez) (Futuros) | documentation | https://www.paguertrading.com/pools/
https://btcusd.aggr.trade/#
El precio va a tender a llegar a donde se encuentran la mayor cantidad de liquidaciones.
Esto sirve más que nada para abrir posiciones en futuros, aunque también se podría usar para spot.
| 1.0 | Webs para ver volumen y liquidaciones de un activo (pools de liquidez) (Futuros) - https://www.paguertrading.com/pools/
https://btcusd.aggr.trade/#
El precio va a tender a llegar a donde se encuentran la mayor cantidad de liquidaciones.
Esto sirve más que nada para abrir posiciones en futuros, aunque también se podría usar para spot.
| non_priority | webs para ver volumen y liquidaciones de un activo pools de liquidez futuros el precio va a tender a llegar a donde se encuentran la mayor cantidad de liquidaciones esto sirve más que nada para abrir posiciones en futuros aunque también se podría usar para spot | 0 |
7,464 | 6,965,245,703 | IssuesEvent | 2017-12-09 03:35:24 | nyu-devops-customers/customers | https://api.github.com/repos/nyu-devops-customers/customers | closed | MySQL data backup mechanism | infrastructure performance | **As a** developer
**I need** to backup users' data
**So that** to avoid unexpected data loss
**Assumptions:**
* Use a static SQL file as a backup
**Acceptance Criteria:**
When I backup my database
Then I delete my original tables and restore it with my backup file
I can get all my data back
| 1.0 | MySQL data backup mechanism - **As a** developer
**I need** to backup users' data
**So that** to avoid unexpected data loss
**Assumptions:**
* Use a static SQL file as a backup
**Acceptance Criteria:**
When I backup my database
Then I delete my original tables and restore it with my backup file
I can get all my data back
| non_priority | mysql data backup mechanism as a developer i need to backup users data so that to avoid unexpected data loss assumptions use a static sql file as a backup acceptance criteria when i backup my database then i delete my original tables and restore it with my backup file i can get all my data back | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.