Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
76,423
15,496,022,779
IssuesEvent
2021-03-11 01:55:28
jatcode/hookstictactoe
https://api.github.com/repos/jatcode/hookstictactoe
opened
CVE-2020-8203 (High) detected in lodash-4.17.11.tgz
security vulnerability
## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.11.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz</a></p> <p>Path to dependency file: /hookstictactoe/package.json</p> <p>Path to vulnerable library: hookstictactoe/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - core-7.2.2.tgz - :x: **lodash-4.17.11.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-07-23</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-8203 (High) detected in lodash-4.17.11.tgz - ## CVE-2020-8203 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lodash-4.17.11.tgz</b></p></summary> <p>Lodash modular utilities.</p> <p>Library home page: <a href="https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz">https://registry.npmjs.org/lodash/-/lodash-4.17.11.tgz</a></p> <p>Path to dependency file: /hookstictactoe/package.json</p> <p>Path to vulnerable library: hookstictactoe/node_modules/lodash/package.json</p> <p> Dependency Hierarchy: - react-scripts-2.1.8.tgz (Root Library) - core-7.2.2.tgz - :x: **lodash-4.17.11.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution attack when using _.zipObjectDeep in lodash before 4.17.20. <p>Publish Date: 2020-07-15 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-8203>CVE-2020-8203</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1523">https://www.npmjs.com/advisories/1523</a></p> <p>Release Date: 2020-07-23</p> <p>Fix Resolution: lodash - 4.17.19</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in lodash tgz cve high severity vulnerability vulnerable library lodash tgz lodash modular utilities library home page a href path to dependency file hookstictactoe package json path to vulnerable library hookstictactoe node modules lodash package json dependency hierarchy react scripts tgz root library core tgz x lodash tgz vulnerable library vulnerability details prototype pollution attack when using zipobjectdeep in lodash before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lodash step up your open source security game with whitesource
0
25,033
12,478,604,493
IssuesEvent
2020-05-29 16:45:21
rapidsai/cudf
https://api.github.com/repos/rapidsai/cudf
closed
[QST] Improving performance in Dataframe.merge
Performance cuDF (Python) libcudf question
**What is your question?** In a recent UCX benchmark ( https://github.com/rapidsai/dask-cuda/pull/183 ), we are noticing that it is taking a bit to call `Dataframe.merge`. Interestingly this is taking nearly 2x longer (in the communication profile) than a deepcopy of the data ( https://github.com/rapidsai/cudf/issues/3493 ). Am curious, are there ways we can speed this function up? Here is the [profile.zip]( https://github.com/rapidsai/dask-cuda/files/3903002/profile.zip ). Copied from @madsbk's [comment]( https://github.com/rapidsai/dask-cuda/pull/183#issuecomment-559600162 ). cc @kkraus14 @mrocklin @quasiben
True
[QST] Improving performance in Dataframe.merge - **What is your question?** In a recent UCX benchmark ( https://github.com/rapidsai/dask-cuda/pull/183 ), we are noticing that it is taking a bit to call `Dataframe.merge`. Interestingly this is taking nearly 2x longer (in the communication profile) than a deepcopy of the data ( https://github.com/rapidsai/cudf/issues/3493 ). Am curious, are there ways we can speed this function up? Here is the [profile.zip]( https://github.com/rapidsai/dask-cuda/files/3903002/profile.zip ). Copied from @madsbk's [comment]( https://github.com/rapidsai/dask-cuda/pull/183#issuecomment-559600162 ). cc @kkraus14 @mrocklin @quasiben
non_priority
improving performance in dataframe merge what is your question in a recent ucx benchmark we are noticing that it is taking a bit to call dataframe merge interestingly this is taking nearly longer in the communication profile than a deepcopy of the data am curious are there ways we can speed this function up here is the copied from madsbk s cc mrocklin quasiben
0
410,744
27,800,123,671
IssuesEvent
2023-03-17 15:15:49
informalsystems/hermes
https://api.github.com/repos/informalsystems/hermes
closed
Support the IBC-go team with integrating Hermes into ibctest framework
I: documentation I: dependencies
### Problem statement The IBC-go team kindly asked us if we would be able to dedicate some time in assisting them to integrate Hermes into ibctest framework. I think we should help them. The scope of the work for our team includes as follows: - followup on PRs that IBC-go team opens in ibctest, I think @chatton will shoulder most of the work - provide synchronous assistance in case Hermes CLIs are unclear - provide PR review, suggestions, testing support - optional: update Hermes documentation (maybe the [features page](https://hermes.informal.systems/advanced/features.html)?) to mention integration in ibctest This issue is purely for tracking purposes. Likely we won't need to open a PR on the Hermes repo. All work will go in the ibctest repo. ### References - https://github.com/strangelove-ventures/ibctest
1.0
Support the IBC-go team with integrating Hermes into ibctest framework - ### Problem statement The IBC-go team kindly asked us if we would be able to dedicate some time in assisting them to integrate Hermes into ibctest framework. I think we should help them. The scope of the work for our team includes as follows: - followup on PRs that IBC-go team opens in ibctest, I think @chatton will shoulder most of the work - provide synchronous assistance in case Hermes CLIs are unclear - provide PR review, suggestions, testing support - optional: update Hermes documentation (maybe the [features page](https://hermes.informal.systems/advanced/features.html)?) to mention integration in ibctest This issue is purely for tracking purposes. Likely we won't need to open a PR on the Hermes repo. All work will go in the ibctest repo. ### References - https://github.com/strangelove-ventures/ibctest
non_priority
support the ibc go team with integrating hermes into ibctest framework problem statement the ibc go team kindly asked us if we would be able to dedicate some time in assisting them to integrate hermes into ibctest framework i think we should help them the scope of the work for our team includes as follows followup on prs that ibc go team opens in ibctest i think chatton will shoulder most of the work provide synchronous assistance in case hermes clis are unclear provide pr review suggestions testing support optional update hermes documentation maybe the to mention integration in ibctest this issue is purely for tracking purposes likely we won t need to open a pr on the hermes repo all work will go in the ibctest repo references
0
93,463
26,960,606,789
IssuesEvent
2023-02-08 17:53:06
dotnet/arcade
https://api.github.com/repos/dotnet/arcade
closed
Build failed: Maestro Build Promotion/main #Promoting microsoft-reverse-proxy build 20230207.1 (165932) to channel(s) '.NET Libraries' #
First Responder Build Failed
Build [#Promoting microsoft-reverse-proxy build 20230207.1 (165932) to channel(s) '.NET Libraries' #](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_build/results?buildId=2107394) failed ## :x: : internal / Maestro Build Promotion failed ### Summary **Finished** - Tue, 07 Feb 2023 23:30:26 GMT **Duration** - 3 minutes **Requested for** - DotNet Bot **Reason** - manual ### Details #### Publishing - :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2107394/logs/28) - .packages\microsoft.dotnet.arcade.sdk\8.0.0-beta.23106.4\tools\SdkTasks\PublishArtifactsInManifest.proj(144,5): error : Unexpected exception publishing file D:\a\_work\1\a\adaf2a3b-45ff-4ea7-83bb-1414e0b272ed\Yarp.Telemetry.Consumption.2.0.0-rc.2.23107.1.symbols.nupkg to assets/symbols/Yarp.Telemetry.Consumption.2.0.0-rc.2.23107.1.symbols.nupkg: Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb53-401e-00ab-034c-3bef7b000000 Time:2023-02-07T23:29:49.9060449Z <details> Status: 401 (Server failed to authenticate the request. Please refer to the information in the www-authenticate header.) ErrorCode: NoAuthenticationInformation Content: <?xml version="1.0" encoding="utf-8"?><Error><Code>NoAuthenticationInformation</Code><Message>Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb53-401e-00ab-034c-3bef7b000000 Time:2023-02-07T23:29:49.9060449Z</Message></Error> Headers: Server: Windows-Azure-Blob/1.0,Microsoft-HTTPAPI/2.0 x-ms-request-id: c1f2fb53-401e-00ab-034c-3bef7b000000 x-ms-client-request-id: add5d870-8fbd-4020-a6af-1f9bf83dfe8a x-ms-version: 2021-08-06 x-ms-error-code: NoAuthenticationInformation WWW-Authenticate: Bearer authorization_uri=https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize resource_id=https://storage.azure.com Date: Tue, 07 Feb 2023 23:29:49 GMT Content-Length: 302 Content-Type: application/xml </details> - :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2107394/logs/28) - .packages\microsoft.dotnet.arcade.sdk\8.0.0-beta.23106.4\tools\SdkTasks\PublishArtifactsInManifest.proj(144,5): error : Unexpected exception publishing file D:\a\_work\1\a\3408d774-2461-42c3-be91-e33a2cdbd6ad\MergedManifest.xml to assets/manifests/microsoft-reverse-proxy/2.0.0-rc.2.23107.1/MergedManifest.xml: Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:d2ce20a3-401e-00e4-244c-3b2b63000000 Time:2023-02-07T23:29:49.9114575Z <details> Status: 401 (Server failed to authenticate the request. Please refer to the information in the www-authenticate header.) ErrorCode: NoAuthenticationInformation Content: <?xml version="1.0" encoding="utf-8"?><Error><Code>NoAuthenticationInformation</Code><Message>Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:d2ce20a3-401e-00e4-244c-3b2b63000000 Time:2023-02-07T23:29:49.9114575Z</Message></Error> Headers: Server: Windows-Azure-Blob/1.0,Microsoft-HTTPAPI/2.0 x-ms-request-id: d2ce20a3-401e-00e4-244c-3b2b63000000 x-ms-client-request-id: 9ddc8237-3857-4817-9ed1-e7b7f4f9618f x-ms-version: 2021-08-06 x-ms-error-code: NoAuthenticationInformation WWW-Authenticate: Bearer authorization_uri=https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize resource_id=https://storage.azure.com Date: Tue, 07 Feb 2023 23:29:49 GMT Content-Length: 302 Content-Type: application/xml </details> - :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2107394/logs/28) - .packages\microsoft.dotnet.arcade.sdk\8.0.0-beta.23106.4\tools\SdkTasks\PublishArtifactsInManifest.proj(144,5): error : Unexpected exception publishing file D:\a\_work\1\a\90cc80d3-909a-4007-95bb-b50462e46c17\Yarp.ReverseProxy.2.0.0-rc.2.23107.1.symbols.nupkg to assets/symbols/Yarp.ReverseProxy.2.0.0-rc.2.23107.1.symbols.nupkg: Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb5a-401e-00ab-094c-3bef7b000000 Time:2023-02-07T23:29:49.9130403Z <details> Status: 401 (Server failed to authenticate the request. Please refer to the information in the www-authenticate header.) ErrorCode: NoAuthenticationInformation Content: <?xml version="1.0" encoding="utf-8"?><Error><Code>NoAuthenticationInformation</Code><Message>Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb5a-401e-00ab-094c-3bef7b000000 Time:2023-02-07T23:29:49.9130403Z</Message></Error> Headers: Server: Windows-Azure-Blob/1.0,Microsoft-HTTPAPI/2.0 x-ms-request-id: c1f2fb5a-401e-00ab-094c-3bef7b000000 x-ms-client-request-id: abd78d62-00c3-4192-bef5-18c2ee2429da x-ms-version: 2021-08-06 x-ms-error-code: NoAuthenticationInformation WWW-Authenticate: Bearer authorization_uri=https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize resource_id=https://storage.azure.com Date: Tue, 07 Feb 2023 23:29:49 GMT Content-Length: 302 Content-Type: application/xml </details> ### Changes
1.0
Build failed: Maestro Build Promotion/main #Promoting microsoft-reverse-proxy build 20230207.1 (165932) to channel(s) '.NET Libraries' # - Build [#Promoting microsoft-reverse-proxy build 20230207.1 (165932) to channel(s) '.NET Libraries' #](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_build/results?buildId=2107394) failed ## :x: : internal / Maestro Build Promotion failed ### Summary **Finished** - Tue, 07 Feb 2023 23:30:26 GMT **Duration** - 3 minutes **Requested for** - DotNet Bot **Reason** - manual ### Details #### Publishing - :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2107394/logs/28) - .packages\microsoft.dotnet.arcade.sdk\8.0.0-beta.23106.4\tools\SdkTasks\PublishArtifactsInManifest.proj(144,5): error : Unexpected exception publishing file D:\a\_work\1\a\adaf2a3b-45ff-4ea7-83bb-1414e0b272ed\Yarp.Telemetry.Consumption.2.0.0-rc.2.23107.1.symbols.nupkg to assets/symbols/Yarp.Telemetry.Consumption.2.0.0-rc.2.23107.1.symbols.nupkg: Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb53-401e-00ab-034c-3bef7b000000 Time:2023-02-07T23:29:49.9060449Z <details> Status: 401 (Server failed to authenticate the request. Please refer to the information in the www-authenticate header.) ErrorCode: NoAuthenticationInformation Content: <?xml version="1.0" encoding="utf-8"?><Error><Code>NoAuthenticationInformation</Code><Message>Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb53-401e-00ab-034c-3bef7b000000 Time:2023-02-07T23:29:49.9060449Z</Message></Error> Headers: Server: Windows-Azure-Blob/1.0,Microsoft-HTTPAPI/2.0 x-ms-request-id: c1f2fb53-401e-00ab-034c-3bef7b000000 x-ms-client-request-id: add5d870-8fbd-4020-a6af-1f9bf83dfe8a x-ms-version: 2021-08-06 x-ms-error-code: NoAuthenticationInformation WWW-Authenticate: Bearer authorization_uri=https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize resource_id=https://storage.azure.com Date: Tue, 07 Feb 2023 23:29:49 GMT Content-Length: 302 Content-Type: application/xml </details> - :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2107394/logs/28) - .packages\microsoft.dotnet.arcade.sdk\8.0.0-beta.23106.4\tools\SdkTasks\PublishArtifactsInManifest.proj(144,5): error : Unexpected exception publishing file D:\a\_work\1\a\3408d774-2461-42c3-be91-e33a2cdbd6ad\MergedManifest.xml to assets/manifests/microsoft-reverse-proxy/2.0.0-rc.2.23107.1/MergedManifest.xml: Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:d2ce20a3-401e-00e4-244c-3b2b63000000 Time:2023-02-07T23:29:49.9114575Z <details> Status: 401 (Server failed to authenticate the request. Please refer to the information in the www-authenticate header.) ErrorCode: NoAuthenticationInformation Content: <?xml version="1.0" encoding="utf-8"?><Error><Code>NoAuthenticationInformation</Code><Message>Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:d2ce20a3-401e-00e4-244c-3b2b63000000 Time:2023-02-07T23:29:49.9114575Z</Message></Error> Headers: Server: Windows-Azure-Blob/1.0,Microsoft-HTTPAPI/2.0 x-ms-request-id: d2ce20a3-401e-00e4-244c-3b2b63000000 x-ms-client-request-id: 9ddc8237-3857-4817-9ed1-e7b7f4f9618f x-ms-version: 2021-08-06 x-ms-error-code: NoAuthenticationInformation WWW-Authenticate: Bearer authorization_uri=https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize resource_id=https://storage.azure.com Date: Tue, 07 Feb 2023 23:29:49 GMT Content-Length: 302 Content-Type: application/xml </details> - :x: - [[Log]](https://dev.azure.com/dnceng/7ea9116e-9fac-403d-b258-b31fcf1bb293/_apis/build/builds/2107394/logs/28) - .packages\microsoft.dotnet.arcade.sdk\8.0.0-beta.23106.4\tools\SdkTasks\PublishArtifactsInManifest.proj(144,5): error : Unexpected exception publishing file D:\a\_work\1\a\90cc80d3-909a-4007-95bb-b50462e46c17\Yarp.ReverseProxy.2.0.0-rc.2.23107.1.symbols.nupkg to assets/symbols/Yarp.ReverseProxy.2.0.0-rc.2.23107.1.symbols.nupkg: Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb5a-401e-00ab-094c-3bef7b000000 Time:2023-02-07T23:29:49.9130403Z <details> Status: 401 (Server failed to authenticate the request. Please refer to the information in the www-authenticate header.) ErrorCode: NoAuthenticationInformation Content: <?xml version="1.0" encoding="utf-8"?><Error><Code>NoAuthenticationInformation</Code><Message>Server failed to authenticate the request. Please refer to the information in the www-authenticate header. RequestId:c1f2fb5a-401e-00ab-094c-3bef7b000000 Time:2023-02-07T23:29:49.9130403Z</Message></Error> Headers: Server: Windows-Azure-Blob/1.0,Microsoft-HTTPAPI/2.0 x-ms-request-id: c1f2fb5a-401e-00ab-094c-3bef7b000000 x-ms-client-request-id: abd78d62-00c3-4192-bef5-18c2ee2429da x-ms-version: 2021-08-06 x-ms-error-code: NoAuthenticationInformation WWW-Authenticate: Bearer authorization_uri=https://login.microsoftonline.com/72f988bf-86f1-41af-91ab-2d7cd011db47/oauth2/authorize resource_id=https://storage.azure.com Date: Tue, 07 Feb 2023 23:29:49 GMT Content-Length: 302 Content-Type: application/xml </details> ### Changes
non_priority
build failed maestro build promotion main promoting microsoft reverse proxy build to channel s net libraries build failed x internal maestro build promotion failed summary finished tue feb gmt duration minutes requested for dotnet bot reason manual details publishing x packages microsoft dotnet arcade sdk beta tools sdktasks publishartifactsinmanifest proj error unexpected exception publishing file d a work a yarp telemetry consumption rc symbols nupkg to assets symbols yarp telemetry consumption rc symbols nupkg server failed to authenticate the request please refer to the information in the www authenticate header requestid time status server failed to authenticate the request please refer to the information in the www authenticate header errorcode noauthenticationinformation content noauthenticationinformation server failed to authenticate the request please refer to the information in the www authenticate header requestid time headers server windows azure blob microsoft httpapi x ms request id x ms client request id x ms version x ms error code noauthenticationinformation www authenticate bearer authorization uri resource id date tue feb gmt content length content type application xml x packages microsoft dotnet arcade sdk beta tools sdktasks publishartifactsinmanifest proj error unexpected exception publishing file d a work a mergedmanifest xml to assets manifests microsoft reverse proxy rc mergedmanifest xml server failed to authenticate the request please refer to the information in the www authenticate header requestid time status server failed to authenticate the request please refer to the information in the www authenticate header errorcode noauthenticationinformation content noauthenticationinformation server failed to authenticate the request please refer to the information in the www authenticate header requestid time headers server windows azure blob microsoft httpapi x ms request id x ms client request id x ms version x ms error code noauthenticationinformation www authenticate bearer authorization uri resource id date tue feb gmt content length content type application xml x packages microsoft dotnet arcade sdk beta tools sdktasks publishartifactsinmanifest proj error unexpected exception publishing file d a work a yarp reverseproxy rc symbols nupkg to assets symbols yarp reverseproxy rc symbols nupkg server failed to authenticate the request please refer to the information in the www authenticate header requestid time status server failed to authenticate the request please refer to the information in the www authenticate header errorcode noauthenticationinformation content noauthenticationinformation server failed to authenticate the request please refer to the information in the www authenticate header requestid time headers server windows azure blob microsoft httpapi x ms request id x ms client request id x ms version x ms error code noauthenticationinformation www authenticate bearer authorization uri resource id date tue feb gmt content length content type application xml changes
0
5,124
5,511,787,263
IssuesEvent
2017-03-17 06:51:16
brenoalvs/monk
https://api.github.com/repos/brenoalvs/monk
closed
Add string sanitizer on filter_input functions
security
We need use a sanitizer filter as default for some of our filter_input calls, i.e.: `filter_input( INPUT_GET , 'lang', FILTER_SANITIZE_STRING );`
True
Add string sanitizer on filter_input functions - We need use a sanitizer filter as default for some of our filter_input calls, i.e.: `filter_input( INPUT_GET , 'lang', FILTER_SANITIZE_STRING );`
non_priority
add string sanitizer on filter input functions we need use a sanitizer filter as default for some of our filter input calls i e filter input input get lang filter sanitize string
0
35,654
14,791,841,208
IssuesEvent
2021-01-12 14:01:42
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
Failing test: X-Pack Alerting API Integration Tests.x-pack/test/alerting_api_integration/security_and_spaces/tests/alerting/update·ts - alerting api integration security and spaces enabled Alerts update space_1_all_with_restricted_fixture at space1 should still be able to update when AAD is broken
Team:Alerting Services blocker failed-test skipped-test v7.11.0 v8.0.0
A test failed on a tracked branch ``` Error: expected 200 "OK", got 500 "Internal Server Error" at Test._assertStatus (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:268:12) at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11) at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18) at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12) at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5 at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3) at parser (/dev/shm/workspace/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18) at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7) at endReadableNT (_stream_readable.js:1145:12) at process._tickCallback (internal/process/next_tick.js:63:19) ``` First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+7.x/9348/) <!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Alerting API Integration Tests.x-pack/test/alerting_api_integration/security_and_spaces/tests/alerting/update·ts","test.name":"alerting api integration security and spaces enabled Alerts update space_1_all_with_restricted_fixture at space1 should still be able to update when AAD is broken","test.failCount":2}} -->
1.0
Failing test: X-Pack Alerting API Integration Tests.x-pack/test/alerting_api_integration/security_and_spaces/tests/alerting/update·ts - alerting api integration security and spaces enabled Alerts update space_1_all_with_restricted_fixture at space1 should still be able to update when AAD is broken - A test failed on a tracked branch ``` Error: expected 200 "OK", got 500 "Internal Server Error" at Test._assertStatus (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:268:12) at Test._assertFunction (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:283:11) at Test.assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:173:18) at assert (/dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:131:12) at /dev/shm/workspace/kibana/node_modules/supertest/lib/test.js:128:5 at Test.Request.callback (/dev/shm/workspace/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:718:3) at parser (/dev/shm/workspace/kibana/node_modules/supertest/node_modules/superagent/lib/node/index.js:906:18) at IncomingMessage.res.on (/dev/shm/workspace/kibana/node_modules/supertest/node_modules/superagent/lib/node/parsers/json.js:19:7) at endReadableNT (_stream_readable.js:1145:12) at process._tickCallback (internal/process/next_tick.js:63:19) ``` First failure: [Jenkins Build](https://kibana-ci.elastic.co/job/elastic+kibana+7.x/9348/) <!-- kibanaCiData = {"failed-test":{"test.class":"X-Pack Alerting API Integration Tests.x-pack/test/alerting_api_integration/security_and_spaces/tests/alerting/update·ts","test.name":"alerting api integration security and spaces enabled Alerts update space_1_all_with_restricted_fixture at space1 should still be able to update when AAD is broken","test.failCount":2}} -->
non_priority
failing test x pack alerting api integration tests x pack test alerting api integration security and spaces tests alerting update·ts alerting api integration security and spaces enabled alerts update space all with restricted fixture at should still be able to update when aad is broken a test failed on a tracked branch error expected ok got internal server error at test assertstatus dev shm workspace kibana node modules supertest lib test js at test assertfunction dev shm workspace kibana node modules supertest lib test js at test assert dev shm workspace kibana node modules supertest lib test js at assert dev shm workspace kibana node modules supertest lib test js at dev shm workspace kibana node modules supertest lib test js at test request callback dev shm workspace kibana node modules supertest node modules superagent lib node index js at parser dev shm workspace kibana node modules supertest node modules superagent lib node index js at incomingmessage res on dev shm workspace kibana node modules supertest node modules superagent lib node parsers json js at endreadablent stream readable js at process tickcallback internal process next tick js first failure
0
69,039
14,970,042,929
IssuesEvent
2021-01-27 19:01:34
jgeraigery/SilverKing
https://api.github.com/repos/jgeraigery/SilverKing
opened
CVE-2019-16869 (Medium) detected in netty-codec-http-4.1.17.Final.jar
security vulnerability
## CVE-2019-16869 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.17.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to vulnerable library: SilverKing/lib/aws-java-sdk-1.11.333/third-party/lib/netty-codec-http-4.1.17.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-codec-http-4.1.17.Final.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/SilverKing/commit/8ba31a514d374422e5f4712cf554ef10ac674e5a">8ba31a514d374422e5f4712cf554ef10ac674e5a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling. <p>Publish Date: 2019-09-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16869>CVE-2019-16869</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/netty/netty/commit/39cafcb05c99f2aa9fce7e6597664c9ed6a63a95">https://github.com/netty/netty/commit/39cafcb05c99f2aa9fce7e6597664c9ed6a63a95</a></p> <p>Release Date: 2019-09-20</p> <p>Fix Resolution: Replace or update the following files: HttpObjectDecoder.java, HttpRequestDecoderTest.java, HttpResponseDecoderTest.java</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec-http","packageVersion":"4.1.17.Final","isTransitiveDependency":false,"dependencyTree":"io.netty:netty-codec-http:4.1.17.Final","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2019-16869","vulnerabilityDetails":"Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a \"Transfer-Encoding : chunked\" line), which leads to HTTP request smuggling.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16869","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> -->
True
CVE-2019-16869 (Medium) detected in netty-codec-http-4.1.17.Final.jar - ## CVE-2019-16869 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-codec-http-4.1.17.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="http://netty.io/">http://netty.io/</a></p> <p>Path to vulnerable library: SilverKing/lib/aws-java-sdk-1.11.333/third-party/lib/netty-codec-http-4.1.17.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-codec-http-4.1.17.Final.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/SilverKing/commit/8ba31a514d374422e5f4712cf554ef10ac674e5a">8ba31a514d374422e5f4712cf554ef10ac674e5a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a "Transfer-Encoding : chunked" line), which leads to HTTP request smuggling. <p>Publish Date: 2019-09-26 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16869>CVE-2019-16869</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Change files</p> <p>Origin: <a href="https://github.com/netty/netty/commit/39cafcb05c99f2aa9fce7e6597664c9ed6a63a95">https://github.com/netty/netty/commit/39cafcb05c99f2aa9fce7e6597664c9ed6a63a95</a></p> <p>Release Date: 2019-09-20</p> <p>Fix Resolution: Replace or update the following files: HttpObjectDecoder.java, HttpRequestDecoderTest.java, HttpResponseDecoderTest.java</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-codec-http","packageVersion":"4.1.17.Final","isTransitiveDependency":false,"dependencyTree":"io.netty:netty-codec-http:4.1.17.Final","isMinimumFixVersionAvailable":false}],"vulnerabilityIdentifier":"CVE-2019-16869","vulnerabilityDetails":"Netty before 4.1.42.Final mishandles whitespace before the colon in HTTP headers (such as a \"Transfer-Encoding : chunked\" line), which leads to HTTP request smuggling.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-16869","cvss2Severity":"medium","cvss2Score":"5.0","extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in netty codec http final jar cve medium severity vulnerability vulnerable library netty codec http final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to vulnerable library silverking lib aws java sdk third party lib netty codec http final jar dependency hierarchy x netty codec http final jar vulnerable library found in head commit a href found in base branch master vulnerability details netty before final mishandles whitespace before the colon in http headers such as a transfer encoding chunked line which leads to http request smuggling publish date url a href cvss score details base score metrics not available suggested fix type change files origin a href release date fix resolution replace or update the following files httpobjectdecoder java httprequestdecodertest java httpresponsedecodertest java isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails netty before final mishandles whitespace before the colon in http headers such as a transfer encoding chunked line which leads to http request smuggling vulnerabilityurl
0
299,364
25,899,057,078
IssuesEvent
2022-12-15 02:46:45
tensorchord/envd-server
https://api.github.com/repos/tensorchord/envd-server
closed
bug(server): Duplicate images in DB when calling `/images` list
type/bug 🐛 area/test 🧪
## Description ``` (base) ➜ envd git:(166978c) ✗ ./bin/envd image ls NAME CONTEXT GPU CUDA CUDNN IMAGE ID CREATED SIZE gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB ``` All these 4 images are the same. ## Reproduction ## Additional Info <!-- It will be very helpful if you can provide the version info by running the command `envd version`. --> --- <!-- Issue Author: Don't delete this message to encourage other users to support your issue! --> **Message from the maintainers**: Impacted by this bug? Give it a 👍. We prioritise the issues with the most 👍.
1.0
bug(server): Duplicate images in DB when calling `/images` list - ## Description ``` (base) ➜ envd git:(166978c) ✗ ./bin/envd image ls NAME CONTEXT GPU CUDA CUDNN IMAGE ID CREATED SIZE gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB gaocegege/test-envd:user-envd-config /home/gaocegege/code/go/src/github.com/tensorchord/envd/examples/python-basic false <none> <none> d7d1918bc6b6 4 weeks ago 357MB ``` All these 4 images are the same. ## Reproduction ## Additional Info <!-- It will be very helpful if you can provide the version info by running the command `envd version`. --> --- <!-- Issue Author: Don't delete this message to encourage other users to support your issue! --> **Message from the maintainers**: Impacted by this bug? Give it a 👍. We prioritise the issues with the most 👍.
non_priority
bug server duplicate images in db when calling images list description base ➜ envd git ✗ bin envd image ls name context gpu cuda cudnn image id created size gaocegege test envd user envd config home gaocegege code go src github com tensorchord envd examples python basic false weeks ago gaocegege test envd user envd config home gaocegege code go src github com tensorchord envd examples python basic false weeks ago gaocegege test envd user envd config home gaocegege code go src github com tensorchord envd examples python basic false weeks ago gaocegege test envd user envd config home gaocegege code go src github com tensorchord envd examples python basic false weeks ago all these images are the same reproduction additional info message from the maintainers impacted by this bug give it a 👍 we prioritise the issues with the most 👍
0
45,721
13,132,167,906
IssuesEvent
2020-08-06 18:23:23
jgeraigery/imhotep
https://api.github.com/repos/jgeraigery/imhotep
closed
CVE-2019-14892 (High) detected in jackson-databind-2.2.3.jar, jackson-databind-2.6.7.1.jar
security vulnerability
## CVE-2019-14892 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.2.3.jar</b>, <b>jackson-databind-2.6.7.1.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.2.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: /tmp/ws-scm/imhotep/imhotep-archive/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.2.3/jackson-databind-2.2.3.jar</p> <p> Dependency Hierarchy: - hadoop-client-2.6.0-cdh5.4.11.jar (Root Library) - hadoop-aws-2.6.0-cdh5.4.11.jar - :x: **jackson-databind-2.2.3.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.6.7.1.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/imhotep/imhotep-server/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.1/jackson-databind-2.6.7.1.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.6.7.1.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/imhotep/commit/bf965e8cec478527a7e53b2ad0369a14e2a7162e">bf965e8cec478527a7e53b2ad0369a14e2a7162e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2462">https://github.com/FasterXML/jackson-databind/issues/2462</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.2.3","isTransitiveDependency":true,"dependencyTree":"org.apache.hadoop:hadoop-client:2.6.0-cdh5.4.11;org.apache.hadoop:hadoop-aws:2.6.0-cdh5.4.11;com.fasterxml.jackson.core:jackson-databind:2.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.7.1","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.7.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10"}],"vulnerabilityIdentifier":"CVE-2019-14892","vulnerabilityDetails":"A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-14892 (High) detected in jackson-databind-2.2.3.jar, jackson-databind-2.6.7.1.jar - ## CVE-2019-14892 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.2.3.jar</b>, <b>jackson-databind-2.6.7.1.jar</b></p></summary> <p> <details><summary><b>jackson-databind-2.2.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Path to dependency file: /tmp/ws-scm/imhotep/imhotep-archive/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.2.3/jackson-databind-2.2.3.jar</p> <p> Dependency Hierarchy: - hadoop-client-2.6.0-cdh5.4.11.jar (Root Library) - hadoop-aws-2.6.0-cdh5.4.11.jar - :x: **jackson-databind-2.2.3.jar** (Vulnerable Library) </details> <details><summary><b>jackson-databind-2.6.7.1.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-scm/imhotep/imhotep-server/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.6.7.1/jackson-databind-2.6.7.1.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.6.7.1.jar** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/imhotep/commit/bf965e8cec478527a7e53b2ad0369a14e2a7162e">bf965e8cec478527a7e53b2ad0369a14e2a7162e</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. <p>Publish Date: 2020-03-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892>CVE-2019-14892</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2462">https://github.com/FasterXML/jackson-databind/issues/2462</a></p> <p>Release Date: 2020-03-02</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.2.3","isTransitiveDependency":true,"dependencyTree":"org.apache.hadoop:hadoop-client:2.6.0-cdh5.4.11;org.apache.hadoop:hadoop-aws:2.6.0-cdh5.4.11;com.fasterxml.jackson.core:jackson-databind:2.2.3","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.6.7.1","isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.6.7.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.6.7.3,2.7.9.7,2.8.11.5,2.9.10"}],"vulnerabilityIdentifier":"CVE-2019-14892","vulnerabilityDetails":"A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-14892","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar jackson databind jar cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api path to dependency file tmp ws scm imhotep imhotep archive pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy hadoop client jar root library hadoop aws jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm imhotep imhotep server pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href vulnerability details a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails a flaw was discovered in jackson databind in versions before and where it would permit polymorphic deserialization of a malicious object using commons configuration and jndi classes an attacker could use this flaw to execute arbitrary code vulnerabilityurl
0
15,245
19,402,330,579
IssuesEvent
2021-12-19 12:09:09
EwyBoy/OreTweaker
https://api.github.com/repos/EwyBoy/OreTweaker
opened
[Compatibility] MOD-NAME
Compatibility Request
**Name of mod you want compatibility with?** Tinkers Construct, Mekanism, Immersive Engineering, Create **Is your compatibility request related to a problem?** I am creating a modpack and I did not like the presence of a huge number of different types of the same ore, and I would like to be able to remove them **Describe the solution you'd like** Removing different types of the same ore **Additional context** -
True
[Compatibility] MOD-NAME - **Name of mod you want compatibility with?** Tinkers Construct, Mekanism, Immersive Engineering, Create **Is your compatibility request related to a problem?** I am creating a modpack and I did not like the presence of a huge number of different types of the same ore, and I would like to be able to remove them **Describe the solution you'd like** Removing different types of the same ore **Additional context** -
non_priority
mod name name of mod you want compatibility with tinkers construct mekanism immersive engineering create is your compatibility request related to a problem i am creating a modpack and i did not like the presence of a huge number of different types of the same ore and i would like to be able to remove them describe the solution you d like removing different types of the same ore additional context
0
10,361
2,941,539,910
IssuesEvent
2015-07-02 08:40:41
romait2014/57KYXHZ5S3DYAOHNPXRMLQTB
https://api.github.com/repos/romait2014/57KYXHZ5S3DYAOHNPXRMLQTB
closed
LkZBMtcZnkjfxaIm3gYl5t4dfJGK+UQMsBlON4w7/u3bT6j/f7hddwexct7IGFHtqYrIpfHLsObYrxfzqoVJiS5apj3yG8yYdI3NFjnZ0gNPRPwoa49IdzYNPLVprEEOKIqMKkm+oK5It4bwagNVhcWFp5tFYr3Q0BwXT1e2G3M=
design
9Uwb3NtP9cFeS7S06SePIi/ZCoR5ir+irbsdccgkdgvUjCmyH0Z1Rt1hNj7c1SyYuVBPqQHNw2mAO73h+0OYX1ZZcGIckBlfxulLMyAfAxjqKKO12E0EXSwYkbUUVQHt+S1aJ9ET/5oMm1uoNuQAEDatlw6z0KEqbsQUhYiVOx17orRsPHsDqWmB0NvtXOmUVllwYhyQGV/G6UszIB8DGFO3dde6vKWdlMnPbqpNGgdLWUJQeYCSkLtrhu3Gjvgz0fwsXt/bVzxsrq9pAMEJkYr/YgpV0xIPDZJifQhpv5ZWWXBiHJAZX8bpSzMgHwMYl5iUY9RZFJDkB+WeicsTnMTv3z94x2x+nzWegLi3ouz/JAt05WcrSs1KFWVrfAWh/p1gnyTdWx+LPdadLFUTc1ZZcGIckBlfxulLMyAfAxgc7TEtxP8BZoPSTGUN7dcf1HZTv4RAbJ83Nr8og6NHeXcUl189nhn21rhhELyeiJ8ux1tdaqNAGRDK7sbu3CgPvZeEcW5Z9NQFSi9Id+/pfGV151KRIalXzsSkdbigz30k4aZAqoTLYIb84VzPVwbJbzu39+Ike5jJomUqMQTpbbRH/ct+MjrDQS0fcIatecQNVLMfRZS+7D1KhGrBWfRdZa2M/GT3wkumyLje5xlV5wbZJEgZUfOR1Vdmue7eqp1S9+CoWeOyTA/ps/ApRIcnbLxXU4xAkVOSfPJRoDRpyXjs4jG5YoSNOYUrvw3uW9U/FtnTJJ14NwIMvf5Vzr7cYXxDk+n5eQek5ekTZSbKrLVaixwfNiHCvnZLq7WzkfZ4jL08NAIQUzrSOwpUdVAxdVkUX6MbWpJSnnPOANJ5bZOY/431sEeA/lxCZSgbsMpWhemde7vLkiYgSRJ1Q9x6bYeaRU00DMEXNknxiiMruZRaepkOS+iTi4LAlKazkDQ4B8zE+JEkXvNrwPdMO2pcGZbxBAR7mJLywpf4IzxNklwskCiwYeVjyViN19+QrTIB/97VQohwdRW4/GMQgFoGlWAGLcyhTJFvlymBs59H6noD3WRCz2IoiXtupASJvX75TwAzjm/sV3j7ACixwuyV1RIdBytkN9hk33uQZ1D3Y3gsgODuU57hcOFOmAnxZkWvCRAgJvTVxX+tgRwNkoSO3ZqFnrYbpwyOIrhHAW0i7VMqlsyrH9ZU9EQsmLIu1yM6HyGEd6G2K54PWcYju2pRwrUN8NxfUgqBn4RBi4l0NxGuRyKi/s4yuj6q1Ii9b6wDg4O+QZgOA4SBkhAVxxIEKCOTzHnYPxBflVQ5cdISbL0t1DE6RDBZmpk5wK9PvqIZJSQ6LnltiNIT0gJJlzOTJrgyn6pneQH92v3arzlB4nVZFF+jG1qSUp5zzgDSeW2TmP+N9bBHgP5cQmUoG7DKFsSzyG04FuVYexVXVwscfm2HmkVNNAzBFzZJ8YojK7mUWnqZDkvok4uCwJSms5A05VyjL9X4lJv6tWErJX9AfhmW8QQEe5iS8sKX+CM8TZJcLJAosGHlY8lYjdffkK0y3Ey61uOIO3jArW+d4yw77ZVgBi3MoUyRb5cpgbOfR+p6A91kQs9iKIl7bqQEib1+7bEsP+3Z4UFnQcLj3BjYtw6eL7U+mG3dpIm1A6AOESx4LIDg7lOe4XDhTpgJ8WZFrwkQICb01cV/rYEcDZKEjq+VKife2v8vrm18E6XE/7RTKpbMqx/WVPRELJiyLtcjOh8hhHehtiueD1nGI7tqUVlptf22ADMS76WFQZ8f8d0Rrkciov7OMro+qtSIvW+sA4ODvkGYDgOEgZIQFccSBFPSB0td209yJ9VgqR6xxwe9LdQxOkQwWZqZOcCvT76iGSUkOi55bYjSE9ICSZczkymIzY+IdD0EI6I2NK/edWh1WRRfoxtaklKec84A0nltk5j/jfWwR4D+XEJlKBuwyklnPzAXBReh0oFK5ePGYoJth5pFTTQMwRc2SfGKIyu5lFp6mQ5L6JOLgsCUprOQNP52zVtMkoUO6JD2adResokZlvEEBHuYkvLCl/gjPE2SXCyQKLBh5WPJWI3X35CtMgbY6zKgPo9IdEHNAQrsvSeVYAYtzKFMkW+XKYGzn0fqegPdZELPYiiJe26kBIm9fgkV76H7cXK5HQ/LrxHUnpvcounomGrN2d3muj1AVly6eCyA4O5TnuFw4U6YCfFmRa8JECAm9NXFf62BHA2ShI73TziuR/ZRH8xfOah5uPNSUyqWzKsf1lT0RCyYsi7XIzofIYR3obYrng9ZxiO7alEDzz2YNgjHLw3bxFih5C9REa5HIqL+zjK6PqrUiL1vrCFE52tFXpgTuPg9jXwwdapBdTRLuZ2oWYHDOV6Nb4z3R7xRZLmKvvfVqGyinxkwkBn7UbhZlIg3ExDmUIGaQOg7iejgcfDZ6WWqV+I5ypXXLzI0rP63+753JeVLvq+rqvHIKWpVGad3pTtWUa+/Da6U9Gi2g9Uog+GjnJAvki8eTSgppbM8buXtIFCx8JPuvjK6mJRLFLxVWsqi1byF+/E1196feshI/B5kpp/H7kXcjDFrPVEq7hsEUn3ZyNdZlu7d6S1asb6ua8IRCrrPkg/Dpsu5TBf+rnYJocrg1yP6NfW7gG+otQCrjIlOLb0N1KP7JJjKRRC60nHlKNyBG12dN2ysqV1XZ9uxIeeSyZZcbYeaRU00DMEXNknxiiMrubGXI8MZMn24lWzgz1V/0R42N+FXt00Jyg81tqI/fEfj5nN12UNjktzKcwM/MdE372MD8ZirzSZ6ogTMeixcij0B7jlnPA7CzRC4biptDZ7ueeV5/PZ3mS5lOKnpxjewgVFI2uQKXAlulWW1wfPD/DoNnU1DmbUv7PFlSFTFPqO5RdoTvq2eLJl107WwweUdHCv2e5Mvi7S2p7rxpf8w8qMF5aHxTgaEutYpsHYu3DiebDR/oLJfDroINdY5dlTcoXx3Z8F8WGBjvOLz5HqVB3FWjaieNyBA3I1ErVFN4xZoZ6GOloXlMG8wZOVShdS4ng==
1.0
LkZBMtcZnkjfxaIm3gYl5t4dfJGK+UQMsBlON4w7/u3bT6j/f7hddwexct7IGFHtqYrIpfHLsObYrxfzqoVJiS5apj3yG8yYdI3NFjnZ0gNPRPwoa49IdzYNPLVprEEOKIqMKkm+oK5It4bwagNVhcWFp5tFYr3Q0BwXT1e2G3M= - 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
non_priority
ct coweoyta ps qrtib ryecdzkejq qtsivw
0
111,016
13,998,493,191
IssuesEvent
2020-10-28 09:32:21
simplabs/simplabs.github.io
https://api.github.com/repos/simplabs/simplabs.github.io
closed
Deprecate old shapes and replace with new one
design
For the redesign new shapes were introduced for many elements of the website, such as quotes, headers, sidebars. The task is to go through all the shapes used in the website and make sure they are the new ones. ## Tasks - [ ] Review website pages for any new shapes that are necessary to design (@ghislaineguerin) - [ ] Replace old shapes with new shapes ### Shapes - [ ] Embedd quote on /cases/ddwrt - [ ] Expedition quote on /cases/expedition - [ ] Timify quote on /cases/timify - [ ] Trainline quote on /cases/trainline - /expertise/ember - [x] Documentary shape - [ ] team augmentation and tutoring images ? - /work - [x] Trainline mobile web app - [x] Timify web app - [ ] playbook shape - /blog - [ ] featured post - [ ] related blog posts ## Resources - Abstract for the website: https://share.goabstract.com/f110e8e6-5c22-4df6-a991-d2bbfcc63369?sha=97dcd61cb66a6c122274bf5f8f718cf3767f3db7
1.0
Deprecate old shapes and replace with new one - For the redesign new shapes were introduced for many elements of the website, such as quotes, headers, sidebars. The task is to go through all the shapes used in the website and make sure they are the new ones. ## Tasks - [ ] Review website pages for any new shapes that are necessary to design (@ghislaineguerin) - [ ] Replace old shapes with new shapes ### Shapes - [ ] Embedd quote on /cases/ddwrt - [ ] Expedition quote on /cases/expedition - [ ] Timify quote on /cases/timify - [ ] Trainline quote on /cases/trainline - /expertise/ember - [x] Documentary shape - [ ] team augmentation and tutoring images ? - /work - [x] Trainline mobile web app - [x] Timify web app - [ ] playbook shape - /blog - [ ] featured post - [ ] related blog posts ## Resources - Abstract for the website: https://share.goabstract.com/f110e8e6-5c22-4df6-a991-d2bbfcc63369?sha=97dcd61cb66a6c122274bf5f8f718cf3767f3db7
non_priority
deprecate old shapes and replace with new one for the redesign new shapes were introduced for many elements of the website such as quotes headers sidebars the task is to go through all the shapes used in the website and make sure they are the new ones tasks review website pages for any new shapes that are necessary to design ghislaineguerin replace old shapes with new shapes shapes embedd quote on cases ddwrt expedition quote on cases expedition timify quote on cases timify trainline quote on cases trainline expertise ember documentary shape team augmentation and tutoring images work trainline mobile web app timify web app playbook shape blog featured post related blog posts resources abstract for the website
0
261,164
27,791,367,256
IssuesEvent
2023-03-17 09:10:43
serverless/serverless
https://api.github.com/repos/serverless/serverless
closed
While upgrading Serverless module with latest version @3.0.1, dependency module node-fetch is not updated to latest version
cat/security cat/dependency
### Are you certain it's a bug? - [X] Yes, it looks like a bug ### Is the issue caused by a plugin? - [X] It is not a plugin issue ### Are you using the latest version? - [X] Yes, I'm using the latest version ### Is there an existing issue for this? - [X] I have searched existing issues, it hasn't been reported yet ### Issue description While upgrading Serverless module with latest version @3.0.1, dependency module node-fetch is not updated to latest version As per npm, node fetch latest version is 3.2.0, but while upgrading Serverless with latest version @3.0.1, node-fetch version taken as @2.6.7. Due to this reason, we are facing security issues. Kindly update on the above issue, whether node-fetch dependency of the Serverless module will be upgraded. ### Service configuration (serverless.yml) content ```yaml N/A ``` ### Command name and used flags N/A ### Command output ```shell N/A ``` ### Environment information ```shell N/A ```
True
While upgrading Serverless module with latest version @3.0.1, dependency module node-fetch is not updated to latest version - ### Are you certain it's a bug? - [X] Yes, it looks like a bug ### Is the issue caused by a plugin? - [X] It is not a plugin issue ### Are you using the latest version? - [X] Yes, I'm using the latest version ### Is there an existing issue for this? - [X] I have searched existing issues, it hasn't been reported yet ### Issue description While upgrading Serverless module with latest version @3.0.1, dependency module node-fetch is not updated to latest version As per npm, node fetch latest version is 3.2.0, but while upgrading Serverless with latest version @3.0.1, node-fetch version taken as @2.6.7. Due to this reason, we are facing security issues. Kindly update on the above issue, whether node-fetch dependency of the Serverless module will be upgraded. ### Service configuration (serverless.yml) content ```yaml N/A ``` ### Command name and used flags N/A ### Command output ```shell N/A ``` ### Environment information ```shell N/A ```
non_priority
while upgrading serverless module with latest version dependency module node fetch is not updated to latest version are you certain it s a bug yes it looks like a bug is the issue caused by a plugin it is not a plugin issue are you using the latest version yes i m using the latest version is there an existing issue for this i have searched existing issues it hasn t been reported yet issue description while upgrading serverless module with latest version dependency module node fetch is not updated to latest version as per npm node fetch latest version is but while upgrading serverless with latest version node fetch version taken as due to this reason we are facing security issues kindly update on the above issue whether node fetch dependency of the serverless module will be upgraded service configuration serverless yml content yaml n a command name and used flags n a command output shell n a environment information shell n a
0
331,148
28,536,674,294
IssuesEvent
2023-04-20 00:10:13
L3CH3R0/somethingdank-soen341project2023
https://api.github.com/repos/L3CH3R0/somethingdank-soen341project2023
opened
UAT-06 Admin manage a job posting
acceptance test US-06
**Issue Tracking This Acceptance Test is for #11 User Acceptance Flow** 1. User presses “Job postings” link on the "Job_Postings" tab 2. User presses the job posting they want to modify 3. User replaces the entry in the "Job Title" field to make it more appropriate 4. User presses “Save” button 5. User gets confirmation that “The job posting “{Job ID}” was changed successfully.”
1.0
UAT-06 Admin manage a job posting - **Issue Tracking This Acceptance Test is for #11 User Acceptance Flow** 1. User presses “Job postings” link on the "Job_Postings" tab 2. User presses the job posting they want to modify 3. User replaces the entry in the "Job Title" field to make it more appropriate 4. User presses “Save” button 5. User gets confirmation that “The job posting “{Job ID}” was changed successfully.”
non_priority
uat admin manage a job posting issue tracking this acceptance test is for user acceptance flow user presses “job postings” link on the job postings tab user presses the job posting they want to modify user replaces the entry in the job title field to make it more appropriate user presses “save” button user gets confirmation that “the job posting “ job id ” was changed successfully ”
0
344,464
24,815,026,414
IssuesEvent
2022-10-25 12:32:13
DakotaPride/More-Weaponry
https://api.github.com/repos/DakotaPride/More-Weaponry
closed
[Crash-Report] Could not execute entrypoint stage 'main' due to errors, provided by 'moreweaponry'
documentation
**Describe the bug** On starting the world using `qfapi-4.0.0-beta.16_qsl-3.0.0-beta.18_fapi-0.64.0_mc-1.19.2` (updated recently) with mod `moreweaponry-v2.3+1.19.2` I have a crash: ``` java.lang.RuntimeException: Could not execute entrypoint stage 'main' due to errors, provided by 'moreweaponry'! at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.lambda$invoke0$2(EntrypointUtils.java:63) at org.quiltmc.loader.impl.util.ExceptionUtil.gatherExceptions(ExceptionUtil.java:33) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invoke0(EntrypointUtils.java:61) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invokeContainer(EntrypointUtils.java:46) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invoke(EntrypointUtils.java:33) at org.quiltmc.loader.impl.game.minecraft.Hooks.startClient(Hooks.java:52) at net.minecraft.class_310.<init>(class_310.java:459) at net.minecraft.client.main.Main.method_44604(Main.java:205) at net.minecraft.client.main.Main.main(Main.java:51) at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104) at java.base/java.lang.reflect.Method.invoke(Method.java:577) at org.quiltmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:423) at org.quiltmc.loader.impl.launch.knot.Knot.launch(Knot.java:76) at org.quiltmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:24) at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104) at java.base/java.lang.reflect.Method.invoke(Method.java:577) at org.polymc.impl.OneSixLauncher.invokeMain(OneSixLauncher.java:104) at org.polymc.impl.OneSixLauncher.launchWithMainClass(OneSixLauncher.java:175) at org.polymc.impl.OneSixLauncher.launch(OneSixLauncher.java:185) at org.polymc.EntryPoint.listen(EntryPoint.java:144) at org.polymc.EntryPoint.main(EntryPoint.java:74) Caused by: java.lang.NoSuchMethodError: 'void net.kyrptonaught.customportalapi.api.CustomPortalBuilder.registerPortal()' at net.DakotaPride.moreweaponry.common.world.dimension.MoreWeaponryPortals.registerMoreWeaponryPortals(MoreWeaponryPortals.java:13) at net.DakotaPride.moreweaponry.common.MoreWeaponry.onInitialize(MoreWeaponry.java:2550) at org.quiltmc.loader.impl.game.minecraft.Hooks.lambda$startClient$0(Hooks.java:52) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.lambda$invoke$0(EntrypointUtils.java:33) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invoke0(EntrypointUtils.java:59) ... 18 more ``` **To Reproduce** Steps to reproduce the behavior: 1. Install QFAPI `qfapi-4.0.0-beta.16_qsl-3.0.0-beta.18_fapi-0.64.0_mc-1.19.2` (updated recently) with mod `moreweaponry-v2.3+1.19.2` 2. Start the world 3. See crash **Expected behavior** World starts normally **Screenshots** No screenshots **Desktop (please complete the following information):** - Java Version: Java 18 **Additional context** [crash-2022-10-21_19.57.32-client.txt](https://github.com/DakotaPride/More-Weaponry/files/9841005/crash-2022-10-21_19.57.32-client.txt) Also I think that Quilted Fabric API authors made breaking changes in Fabric API, and this is the cause of this crash, because on previous `qfapi-4.0.0-beta.14_qsl-3.0.0-beta.18_fapi-0.62.0_mc-1.19.2` it worked ok. Although It may seems that is the QFAPI bug rather than your mod's bug I will appreciate if you do refactor your mod to be compatible with QFAPI. Thanks!
1.0
[Crash-Report] Could not execute entrypoint stage 'main' due to errors, provided by 'moreweaponry' - **Describe the bug** On starting the world using `qfapi-4.0.0-beta.16_qsl-3.0.0-beta.18_fapi-0.64.0_mc-1.19.2` (updated recently) with mod `moreweaponry-v2.3+1.19.2` I have a crash: ``` java.lang.RuntimeException: Could not execute entrypoint stage 'main' due to errors, provided by 'moreweaponry'! at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.lambda$invoke0$2(EntrypointUtils.java:63) at org.quiltmc.loader.impl.util.ExceptionUtil.gatherExceptions(ExceptionUtil.java:33) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invoke0(EntrypointUtils.java:61) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invokeContainer(EntrypointUtils.java:46) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invoke(EntrypointUtils.java:33) at org.quiltmc.loader.impl.game.minecraft.Hooks.startClient(Hooks.java:52) at net.minecraft.class_310.<init>(class_310.java:459) at net.minecraft.client.main.Main.method_44604(Main.java:205) at net.minecraft.client.main.Main.main(Main.java:51) at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104) at java.base/java.lang.reflect.Method.invoke(Method.java:577) at org.quiltmc.loader.impl.game.minecraft.MinecraftGameProvider.launch(MinecraftGameProvider.java:423) at org.quiltmc.loader.impl.launch.knot.Knot.launch(Knot.java:76) at org.quiltmc.loader.impl.launch.knot.KnotClient.main(KnotClient.java:24) at java.base/jdk.internal.reflect.DirectMethodHandleAccessor.invoke(DirectMethodHandleAccessor.java:104) at java.base/java.lang.reflect.Method.invoke(Method.java:577) at org.polymc.impl.OneSixLauncher.invokeMain(OneSixLauncher.java:104) at org.polymc.impl.OneSixLauncher.launchWithMainClass(OneSixLauncher.java:175) at org.polymc.impl.OneSixLauncher.launch(OneSixLauncher.java:185) at org.polymc.EntryPoint.listen(EntryPoint.java:144) at org.polymc.EntryPoint.main(EntryPoint.java:74) Caused by: java.lang.NoSuchMethodError: 'void net.kyrptonaught.customportalapi.api.CustomPortalBuilder.registerPortal()' at net.DakotaPride.moreweaponry.common.world.dimension.MoreWeaponryPortals.registerMoreWeaponryPortals(MoreWeaponryPortals.java:13) at net.DakotaPride.moreweaponry.common.MoreWeaponry.onInitialize(MoreWeaponry.java:2550) at org.quiltmc.loader.impl.game.minecraft.Hooks.lambda$startClient$0(Hooks.java:52) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.lambda$invoke$0(EntrypointUtils.java:33) at org.quiltmc.loader.impl.entrypoint.EntrypointUtils.invoke0(EntrypointUtils.java:59) ... 18 more ``` **To Reproduce** Steps to reproduce the behavior: 1. Install QFAPI `qfapi-4.0.0-beta.16_qsl-3.0.0-beta.18_fapi-0.64.0_mc-1.19.2` (updated recently) with mod `moreweaponry-v2.3+1.19.2` 2. Start the world 3. See crash **Expected behavior** World starts normally **Screenshots** No screenshots **Desktop (please complete the following information):** - Java Version: Java 18 **Additional context** [crash-2022-10-21_19.57.32-client.txt](https://github.com/DakotaPride/More-Weaponry/files/9841005/crash-2022-10-21_19.57.32-client.txt) Also I think that Quilted Fabric API authors made breaking changes in Fabric API, and this is the cause of this crash, because on previous `qfapi-4.0.0-beta.14_qsl-3.0.0-beta.18_fapi-0.62.0_mc-1.19.2` it worked ok. Although It may seems that is the QFAPI bug rather than your mod's bug I will appreciate if you do refactor your mod to be compatible with QFAPI. Thanks!
non_priority
could not execute entrypoint stage main due to errors provided by moreweaponry describe the bug on starting the world using qfapi beta qsl beta fapi mc updated recently with mod moreweaponry i have a crash java lang runtimeexception could not execute entrypoint stage main due to errors provided by moreweaponry at org quiltmc loader impl entrypoint entrypointutils lambda entrypointutils java at org quiltmc loader impl util exceptionutil gatherexceptions exceptionutil java at org quiltmc loader impl entrypoint entrypointutils entrypointutils java at org quiltmc loader impl entrypoint entrypointutils invokecontainer entrypointutils java at org quiltmc loader impl entrypoint entrypointutils invoke entrypointutils java at org quiltmc loader impl game minecraft hooks startclient hooks java at net minecraft class class java at net minecraft client main main method main java at net minecraft client main main main main java at java base jdk internal reflect directmethodhandleaccessor invoke directmethodhandleaccessor java at java base java lang reflect method invoke method java at org quiltmc loader impl game minecraft minecraftgameprovider launch minecraftgameprovider java at org quiltmc loader impl launch knot knot launch knot java at org quiltmc loader impl launch knot knotclient main knotclient java at java base jdk internal reflect directmethodhandleaccessor invoke directmethodhandleaccessor java at java base java lang reflect method invoke method java at org polymc impl onesixlauncher invokemain onesixlauncher java at org polymc impl onesixlauncher launchwithmainclass onesixlauncher java at org polymc impl onesixlauncher launch onesixlauncher java at org polymc entrypoint listen entrypoint java at org polymc entrypoint main entrypoint java caused by java lang nosuchmethoderror void net kyrptonaught customportalapi api customportalbuilder registerportal at net dakotapride moreweaponry common world dimension moreweaponryportals registermoreweaponryportals moreweaponryportals java at net dakotapride moreweaponry common moreweaponry oninitialize moreweaponry java at org quiltmc loader impl game minecraft hooks lambda startclient hooks java at org quiltmc loader impl entrypoint entrypointutils lambda invoke entrypointutils java at org quiltmc loader impl entrypoint entrypointutils entrypointutils java more to reproduce steps to reproduce the behavior install qfapi qfapi beta qsl beta fapi mc updated recently with mod moreweaponry start the world see crash expected behavior world starts normally screenshots no screenshots desktop please complete the following information java version java additional context also i think that quilted fabric api authors made breaking changes in fabric api and this is the cause of this crash because on previous qfapi beta qsl beta fapi mc it worked ok although it may seems that is the qfapi bug rather than your mod s bug i will appreciate if you do refactor your mod to be compatible with qfapi thanks
0
130,466
12,429,631,496
IssuesEvent
2020-05-25 08:50:44
DaveOri/snowScatt
https://api.github.com/repos/DaveOri/snowScatt
opened
refractiveIndex module might be improved
documentation enhancement
- [ ] Check behaviour with vectors and scalars, make it easier and consistent - [ ] Add documentation to the water submodule - [ ] Make easier access to frequently used functions such as K2 (make it accept directly freq and temp) - [ ] Use more generic model as default such as TKC for water and Iwabuchi for ice - [ ] Shift core components to C code for speed
1.0
refractiveIndex module might be improved - - [ ] Check behaviour with vectors and scalars, make it easier and consistent - [ ] Add documentation to the water submodule - [ ] Make easier access to frequently used functions such as K2 (make it accept directly freq and temp) - [ ] Use more generic model as default such as TKC for water and Iwabuchi for ice - [ ] Shift core components to C code for speed
non_priority
refractiveindex module might be improved check behaviour with vectors and scalars make it easier and consistent add documentation to the water submodule make easier access to frequently used functions such as make it accept directly freq and temp use more generic model as default such as tkc for water and iwabuchi for ice shift core components to c code for speed
0
24,317
12,064,739,722
IssuesEvent
2020-04-16 08:48:12
google/recaptcha
https://api.github.com/repos/google/recaptcha
closed
Quit developing this SHIT
service discussion
You do realize you are working on developing one of the most appalling, idiotic and hated apps that exist, right? Whenever I have to point 1000000000 store fronts or bus stops, I curse the mother of that piece of shit von ahn[us] guy and whoever is perpetuating his horrible creation!
1.0
Quit developing this SHIT - You do realize you are working on developing one of the most appalling, idiotic and hated apps that exist, right? Whenever I have to point 1000000000 store fronts or bus stops, I curse the mother of that piece of shit von ahn[us] guy and whoever is perpetuating his horrible creation!
non_priority
quit developing this shit you do realize you are working on developing one of the most appalling idiotic and hated apps that exist right whenever i have to point store fronts or bus stops i curse the mother of that piece of shit von ahn guy and whoever is perpetuating his horrible creation
0
44,740
13,079,691,630
IssuesEvent
2020-08-01 04:24:54
raindigi/animinated-date-gif
https://api.github.com/repos/raindigi/animinated-date-gif
closed
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz
security vulnerability wontfix
## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/animinated-date-gif/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/animinated-date-gif/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - canvas-2.4.1.tgz (Root Library) - node-pre-gyp-0.11.0.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/animinated-date-gif/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/animinated-date-gif/node_modules/rc/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - canvas-2.4.1.tgz (Root Library) - node-pre-gyp-0.11.0.tgz - rc-1.2.8.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/raindigi/animinated-date-gif/commit/eb674b002dbe0ad56e408b0a098600814b5ff797">eb674b002dbe0ad56e408b0a098600814b5ff797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7598 (Medium) detected in minimist-0.0.8.tgz, minimist-1.2.0.tgz - ## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/animinated-date-gif/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/animinated-date-gif/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - canvas-2.4.1.tgz (Root Library) - node-pre-gyp-0.11.0.tgz - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/animinated-date-gif/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/animinated-date-gif/node_modules/rc/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - canvas-2.4.1.tgz (Root Library) - node-pre-gyp-0.11.0.tgz - rc-1.2.8.tgz - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/raindigi/animinated-date-gif/commit/eb674b002dbe0ad56e408b0a098600814b5ff797">eb674b002dbe0ad56e408b0a098600814b5ff797</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in minimist tgz minimist tgz cve medium severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file tmp ws scm animinated date gif package json path to vulnerable library tmp ws scm animinated date gif node modules minimist package json dependency hierarchy canvas tgz root library node pre gyp tgz mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file tmp ws scm animinated date gif package json path to vulnerable library tmp ws scm animinated date gif node modules rc node modules minimist package json dependency hierarchy canvas tgz root library node pre gyp tgz rc tgz x minimist tgz vulnerable library found in head commit a href vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource
0
65,059
8,786,623,373
IssuesEvent
2018-12-20 16:12:57
firecracker-microvm/firecracker
https://api.github.com/repos/firecracker-microvm/firecracker
closed
docs: running firecracker in a VM
Documentation: Usage
Would it be useful to include deployment instructions for developers who may want to test firecracker on GCP VMs using nested KVM? I outlined a draft at https://github.com/glikson/firecracker-gcp/blob/master/README.md - can work on a PR here.
1.0
docs: running firecracker in a VM - Would it be useful to include deployment instructions for developers who may want to test firecracker on GCP VMs using nested KVM? I outlined a draft at https://github.com/glikson/firecracker-gcp/blob/master/README.md - can work on a PR here.
non_priority
docs running firecracker in a vm would it be useful to include deployment instructions for developers who may want to test firecracker on gcp vms using nested kvm i outlined a draft at can work on a pr here
0
321,954
23,880,956,950
IssuesEvent
2022-09-08 01:09:40
masesgroup/KNet
https://api.github.com/repos/masesgroup/KNet
closed
DoxFX is unable to create documentation
bug documentation
**Describe the bug** The documentation is not generated **To Reproduce** Steps to reproduce the behavior: 1. Run the **build.yaml** 2. Go to **Build documentation** step 3. Find the _Warning:[MetadataCommand.ExtractMetadata](D:/a/KNet/KNet/src/net/KNet/KNet.csproj)Workspace failed with: [Failure] Msbuild failed when processing the file 'D:\a\KNet\KNet\src\net\KNet\KNet.csproj' with message: Method not found: 'System.ReadOnlySpan`1<Char> Microsoft.IO.Path.GetFileName(System.ReadOnlySpan`1<Char>)'._ **Expected behavior** The documentation shall be generated **Screenshots** ![image](https://user-images.githubusercontent.com/94312179/185506240-ca140d2d-1402-46ee-b3c0-f744150cfdd6.png) **Desktop (please complete the following information):** - OS: GitHub Virtual environment - Image Version: 20220816.1 **Additional context** Same problem reported in https://github.com/masesgroup/JNet/issues/35
1.0
DoxFX is unable to create documentation - **Describe the bug** The documentation is not generated **To Reproduce** Steps to reproduce the behavior: 1. Run the **build.yaml** 2. Go to **Build documentation** step 3. Find the _Warning:[MetadataCommand.ExtractMetadata](D:/a/KNet/KNet/src/net/KNet/KNet.csproj)Workspace failed with: [Failure] Msbuild failed when processing the file 'D:\a\KNet\KNet\src\net\KNet\KNet.csproj' with message: Method not found: 'System.ReadOnlySpan`1<Char> Microsoft.IO.Path.GetFileName(System.ReadOnlySpan`1<Char>)'._ **Expected behavior** The documentation shall be generated **Screenshots** ![image](https://user-images.githubusercontent.com/94312179/185506240-ca140d2d-1402-46ee-b3c0-f744150cfdd6.png) **Desktop (please complete the following information):** - OS: GitHub Virtual environment - Image Version: 20220816.1 **Additional context** Same problem reported in https://github.com/masesgroup/JNet/issues/35
non_priority
doxfx is unable to create documentation describe the bug the documentation is not generated to reproduce steps to reproduce the behavior run the build yaml go to build documentation step find the warning d a knet knet src net knet knet csproj workspace failed with msbuild failed when processing the file d a knet knet src net knet knet csproj with message method not found system readonlyspan microsoft io path getfilename system readonlyspan expected behavior the documentation shall be generated screenshots desktop please complete the following information os github virtual environment image version additional context same problem reported in
0
41,302
10,375,189,249
IssuesEvent
2019-09-09 11:25:31
primefaces/primereact
https://api.github.com/repos/primefaces/primereact
closed
DataTable has null state under certain conditions
defect
### There is no guarantee in receiving an immediate response in GitHub Issue Tracker, If you'd like to secure our response, you may consider *PrimeReact PRO Support* where support is provided within 4 business hours **I'm submitting a ...** (check one with "x") ``` [ X] bug report [ ] feature request [ ] support request => Please do not submit support request here, instead see https://forum.primefaces.org/viewforum.php?f=57 ``` **Codesandbox Case (Bug Reports)** https://codesandbox.io/embed/primereact-test-5nlv3 **Current behavior** DataTable with onPage, onSort, onFilter and reorderable columns has null state when there's no state in current session storage. DataTable.js:1418 Uncaught TypeError: Cannot read property 'columnOrder' of null at DataTable.getColumns (DataTable.js:1418) at DataTable.render (DataTable.js:1546) **Expected behavior** Successful DataTable rendering. **Minimal reproduction of the problem with instructions** Create DataTable with onPage, onSort, onFilter methods and reorderable columns (lazy loading with sort and filter features). **Please tell us about your environment:** Fedora 30, IntelliJ Ultimate 2019.2, NPM 6.9.0 * **React version:** 16.8.6 * **PrimeReact version:** 3.1.9 * **Browser:** [all | Chrome XX | Firefox XX | IE XX | Safari XX | Mobile Chrome XX | Android X.X Web Browser | iOS XX Safari | iOS XX UIWebView | iOS XX WKWebView ] <!-- All browsers where this could be reproduced --> Chrome, Firefox * **Language:** [all | TypeScript X.X | ES6/7 | ES5] ES6
1.0
DataTable has null state under certain conditions - ### There is no guarantee in receiving an immediate response in GitHub Issue Tracker, If you'd like to secure our response, you may consider *PrimeReact PRO Support* where support is provided within 4 business hours **I'm submitting a ...** (check one with "x") ``` [ X] bug report [ ] feature request [ ] support request => Please do not submit support request here, instead see https://forum.primefaces.org/viewforum.php?f=57 ``` **Codesandbox Case (Bug Reports)** https://codesandbox.io/embed/primereact-test-5nlv3 **Current behavior** DataTable with onPage, onSort, onFilter and reorderable columns has null state when there's no state in current session storage. DataTable.js:1418 Uncaught TypeError: Cannot read property 'columnOrder' of null at DataTable.getColumns (DataTable.js:1418) at DataTable.render (DataTable.js:1546) **Expected behavior** Successful DataTable rendering. **Minimal reproduction of the problem with instructions** Create DataTable with onPage, onSort, onFilter methods and reorderable columns (lazy loading with sort and filter features). **Please tell us about your environment:** Fedora 30, IntelliJ Ultimate 2019.2, NPM 6.9.0 * **React version:** 16.8.6 * **PrimeReact version:** 3.1.9 * **Browser:** [all | Chrome XX | Firefox XX | IE XX | Safari XX | Mobile Chrome XX | Android X.X Web Browser | iOS XX Safari | iOS XX UIWebView | iOS XX WKWebView ] <!-- All browsers where this could be reproduced --> Chrome, Firefox * **Language:** [all | TypeScript X.X | ES6/7 | ES5] ES6
non_priority
datatable has null state under certain conditions there is no guarantee in receiving an immediate response in github issue tracker if you d like to secure our response you may consider primereact pro support where support is provided within business hours i m submitting a check one with x bug report feature request support request please do not submit support request here instead see codesandbox case bug reports current behavior datatable with onpage onsort onfilter and reorderable columns has null state when there s no state in current session storage datatable js uncaught typeerror cannot read property columnorder of null at datatable getcolumns datatable js at datatable render datatable js expected behavior successful datatable rendering minimal reproduction of the problem with instructions create datatable with onpage onsort onfilter methods and reorderable columns lazy loading with sort and filter features please tell us about your environment fedora intellij ultimate npm react version primereact version browser chrome firefox language
0
26,031
12,341,906,716
IssuesEvent
2020-05-14 23:08:37
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Kubernetes service address range
Pri1 container-service/svc cxp needs-more-info triaged
Delete me --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 37ba0343-7e43-6e2e-e564-5d3a0f523a75 * Version Independent ID: 0ba581a1-3e4a-27b4-c667-4a9b969a3ade * Content: [Configure Azure CNI networking in Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/configure-azure-cni#feedback) * Content Source: [articles/aks/configure-azure-cni.md](https://github.com/Microsoft/azure-docs/blob/master/articles/aks/configure-azure-cni.md) * Service: **container-service** * GitHub Login: @mlearned * Microsoft Alias: **mlearned**
1.0
Kubernetes service address range - Delete me --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 37ba0343-7e43-6e2e-e564-5d3a0f523a75 * Version Independent ID: 0ba581a1-3e4a-27b4-c667-4a9b969a3ade * Content: [Configure Azure CNI networking in Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/configure-azure-cni#feedback) * Content Source: [articles/aks/configure-azure-cni.md](https://github.com/Microsoft/azure-docs/blob/master/articles/aks/configure-azure-cni.md) * Service: **container-service** * GitHub Login: @mlearned * Microsoft Alias: **mlearned**
non_priority
kubernetes service address range delete me document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login mlearned microsoft alias mlearned
0
95,527
27,533,288,751
IssuesEvent
2023-03-07 00:22:18
CasparCG/server
https://api.github.com/repos/CasparCG/server
closed
build with mingw makefiles and qt for windows
type/enhancement build
I cant make with cmake and mingw makefiles environment in windows. E:/server-master/build>cmake -G "MinGW Makefiles" -A x86_64 ../src CMake Error at CMakeLists.txt:4 (PROJECT): Generator MinGW Makefiles does not support platform specification, but platform x86_64 was specified. CMake Error: CMAKE_C_COMPILER not set, after EnableLanguage CMake Error: CMAKE_CXX_COMPILER not set, after EnableLanguage -- Configuring incomplete, errors occurred! See also "E:/server-master/build/CMakeFiles/CMakeOutput.log".
1.0
build with mingw makefiles and qt for windows - I cant make with cmake and mingw makefiles environment in windows. E:/server-master/build>cmake -G "MinGW Makefiles" -A x86_64 ../src CMake Error at CMakeLists.txt:4 (PROJECT): Generator MinGW Makefiles does not support platform specification, but platform x86_64 was specified. CMake Error: CMAKE_C_COMPILER not set, after EnableLanguage CMake Error: CMAKE_CXX_COMPILER not set, after EnableLanguage -- Configuring incomplete, errors occurred! See also "E:/server-master/build/CMakeFiles/CMakeOutput.log".
non_priority
build with mingw makefiles and qt for windows i cant make with cmake and mingw makefiles environment in windows e server master build cmake g mingw makefiles a src cmake error at cmakelists txt project generator mingw makefiles does not support platform specification but platform was specified cmake error cmake c compiler not set after enablelanguage cmake error cmake cxx compiler not set after enablelanguage configuring incomplete errors occurred see also e server master build cmakefiles cmakeoutput log
0
81,292
15,708,758,454
IssuesEvent
2021-03-26 21:06:37
sourcegraph/sourcegraph
https://api.github.com/repos/sourcegraph/sourcegraph
closed
docs: Write triage docs for code intelligence
team/code-intelligence
We need docs to help site-admins self-serve issues, as well as provide C(S)E teams a unified place to record past issues and look up solutions issues that may have occurred before. The first draft of these docs should contain: - A way to determine if the issue is related to code intelligence - Solutions to outages we've seen before that may occur again (things that aren't currently fixed) - A list of artifacts that a code intelligence engineer would need to diagnose a problem (depending on the symptoms)
1.0
docs: Write triage docs for code intelligence - We need docs to help site-admins self-serve issues, as well as provide C(S)E teams a unified place to record past issues and look up solutions issues that may have occurred before. The first draft of these docs should contain: - A way to determine if the issue is related to code intelligence - Solutions to outages we've seen before that may occur again (things that aren't currently fixed) - A list of artifacts that a code intelligence engineer would need to diagnose a problem (depending on the symptoms)
non_priority
docs write triage docs for code intelligence we need docs to help site admins self serve issues as well as provide c s e teams a unified place to record past issues and look up solutions issues that may have occurred before the first draft of these docs should contain a way to determine if the issue is related to code intelligence solutions to outages we ve seen before that may occur again things that aren t currently fixed a list of artifacts that a code intelligence engineer would need to diagnose a problem depending on the symptoms
0
77,276
9,554,029,322
IssuesEvent
2019-05-02 20:51:53
MozillaReality/FirefoxReality
https://api.github.com/repos/MozillaReality/FirefoxReality
opened
Allow keyboard to be repositioned
Needs Design UX
Allow keyboard to be repositioned. (UX and design aspects are covered in related user testing master issue #480. This issue is to track implementation work.) - [ ] Implement dynamic positioning (i.e relative to web content) based on design specification. - [ ] Implement a UI element which allows user to reposition temporarily. - [ ] Allow the user to pin the keyboard in a preferred location, and to unpin and revert to dynamic positioning. needed-by #480
1.0
Allow keyboard to be repositioned - Allow keyboard to be repositioned. (UX and design aspects are covered in related user testing master issue #480. This issue is to track implementation work.) - [ ] Implement dynamic positioning (i.e relative to web content) based on design specification. - [ ] Implement a UI element which allows user to reposition temporarily. - [ ] Allow the user to pin the keyboard in a preferred location, and to unpin and revert to dynamic positioning. needed-by #480
non_priority
allow keyboard to be repositioned allow keyboard to be repositioned ux and design aspects are covered in related user testing master issue this issue is to track implementation work implement dynamic positioning i e relative to web content based on design specification implement a ui element which allows user to reposition temporarily allow the user to pin the keyboard in a preferred location and to unpin and revert to dynamic positioning needed by
0
55,045
6,424,098,357
IssuesEvent
2017-08-09 12:47:32
mdn/interactive-examples
https://api.github.com/repos/mdn/interactive-examples
closed
Setup three pages for user testing using S3 URL
testing
For initial user testing and beta user testing, we need at least three JS and three CSS example pages. These can be set-up on developer.allizom.org
1.0
Setup three pages for user testing using S3 URL - For initial user testing and beta user testing, we need at least three JS and three CSS example pages. These can be set-up on developer.allizom.org
non_priority
setup three pages for user testing using url for initial user testing and beta user testing we need at least three js and three css example pages these can be set up on developer allizom org
0
2,681
5,530,918,937
IssuesEvent
2017-03-21 05:02:05
TEAMMATES/teammates
https://api.github.com/repos/TEAMMATES/teammates
opened
Add checklist of things to do when submitting PR in the template
a-Process c.DevOps
Instead of simply: ``` Please follow the naming conventions in the "guidelines for contributing" link above or the pull request may be rejected. Also, do consider outlining the solution taken as doing so will likely help in the reviewing process (e.g., when the pull request involves non-trivial changes) ``` We can list down things to check before submitting a PR. Also the first sentence does not sound nice because it seems like we're rejecting over something as trivial as naming convention (violations can be fixed after opening the PR).
1.0
Add checklist of things to do when submitting PR in the template - Instead of simply: ``` Please follow the naming conventions in the "guidelines for contributing" link above or the pull request may be rejected. Also, do consider outlining the solution taken as doing so will likely help in the reviewing process (e.g., when the pull request involves non-trivial changes) ``` We can list down things to check before submitting a PR. Also the first sentence does not sound nice because it seems like we're rejecting over something as trivial as naming convention (violations can be fixed after opening the PR).
non_priority
add checklist of things to do when submitting pr in the template instead of simply please follow the naming conventions in the guidelines for contributing link above or the pull request may be rejected also do consider outlining the solution taken as doing so will likely help in the reviewing process e g when the pull request involves non trivial changes we can list down things to check before submitting a pr also the first sentence does not sound nice because it seems like we re rejecting over something as trivial as naming convention violations can be fixed after opening the pr
0
281,329
24,383,821,803
IssuesEvent
2022-10-04 10:01:30
Kong/kubernetes-ingress-controller
https://api.github.com/repos/Kong/kubernetes-ingress-controller
opened
E2E tests shouldn't use cleaner.Cleanup
area/testing
### Is there an existing issue for this? - [X] I have searched the existing issues ### Problem Statement As E2E tests create their own clusters, it doesn't make sense to use `cleaner.Cleanup` (cleaning up in-cluster resources created by the test) on their tear down. Instead, we should simply `cluster.Cleanup` the whole cluster. It should save some time while running the tests. ### Proposed Solution Remove `cleaner.Cleanup` calls in favour of `cluster.Cleanup` in all E2E tests (`test/e2e/`) that create their own cluster. ### Additional information Ticket is a result of discussion: https://github.com/Kong/kubernetes-ingress-controller/pull/3013#discussion_r986589068 ### Acceptance Criteria - [ ] Every test case in `test/e2e/` that always creates its own cluster, calls `cluster.Cleanup` instead of `cleaner.Cleanup` on its teardown.
1.0
E2E tests shouldn't use cleaner.Cleanup - ### Is there an existing issue for this? - [X] I have searched the existing issues ### Problem Statement As E2E tests create their own clusters, it doesn't make sense to use `cleaner.Cleanup` (cleaning up in-cluster resources created by the test) on their tear down. Instead, we should simply `cluster.Cleanup` the whole cluster. It should save some time while running the tests. ### Proposed Solution Remove `cleaner.Cleanup` calls in favour of `cluster.Cleanup` in all E2E tests (`test/e2e/`) that create their own cluster. ### Additional information Ticket is a result of discussion: https://github.com/Kong/kubernetes-ingress-controller/pull/3013#discussion_r986589068 ### Acceptance Criteria - [ ] Every test case in `test/e2e/` that always creates its own cluster, calls `cluster.Cleanup` instead of `cleaner.Cleanup` on its teardown.
non_priority
tests shouldn t use cleaner cleanup is there an existing issue for this i have searched the existing issues problem statement as tests create their own clusters it doesn t make sense to use cleaner cleanup cleaning up in cluster resources created by the test on their tear down instead we should simply cluster cleanup the whole cluster it should save some time while running the tests proposed solution remove cleaner cleanup calls in favour of cluster cleanup in all tests test that create their own cluster additional information ticket is a result of discussion acceptance criteria every test case in test that always creates its own cluster calls cluster cleanup instead of cleaner cleanup on its teardown
0
109,819
11,649,144,909
IssuesEvent
2020-03-02 00:39:00
winnster/DotRas
https://api.github.com/repos/winnster/DotRas
closed
Read me needs to point to the twitter feed and YouTube channel
documentation
Just need to get the ReadMe file in master updated to point to the YouTube channel and the Twitter feed. http://www.youtube.com/user/DotRasProject http://twitter.com/DotRasProject
1.0
Read me needs to point to the twitter feed and YouTube channel - Just need to get the ReadMe file in master updated to point to the YouTube channel and the Twitter feed. http://www.youtube.com/user/DotRasProject http://twitter.com/DotRasProject
non_priority
read me needs to point to the twitter feed and youtube channel just need to get the readme file in master updated to point to the youtube channel and the twitter feed
0
214,557
16,566,613,743
IssuesEvent
2021-05-29 14:47:42
MikeSchulze/gdUnit3
https://api.github.com/repos/MikeSchulze/gdUnit3
closed
GD-69: Add assert_vec2 and assert_vec3 to enable vector validation
documentation enhancement
Currently, I cannot assert equality or check `var` for `null` if it's value is `Vector2`. `assert_that/assert_object` reports, that `Vector2` is not an Object. The error reported is this: `line -1: GdUnitObjectAssert inital error, unexpected type <Vector2>` I am quite new to GDScript, so I don't feel I can suggest good solution, but it looks like new `assert_vec2/3` functions would be nice ;-)
1.0
GD-69: Add assert_vec2 and assert_vec3 to enable vector validation - Currently, I cannot assert equality or check `var` for `null` if it's value is `Vector2`. `assert_that/assert_object` reports, that `Vector2` is not an Object. The error reported is this: `line -1: GdUnitObjectAssert inital error, unexpected type <Vector2>` I am quite new to GDScript, so I don't feel I can suggest good solution, but it looks like new `assert_vec2/3` functions would be nice ;-)
non_priority
gd add assert and assert to enable vector validation currently i cannot assert equality or check var for null if it s value is assert that assert object reports that is not an object the error reported is this line gdunitobjectassert inital error unexpected type i am quite new to gdscript so i don t feel i can suggest good solution but it looks like new assert functions would be nice
0
57,630
14,170,007,255
IssuesEvent
2020-11-12 14:00:09
spacetelescope/romancal
https://api.github.com/repos/spacetelescope/romancal
closed
Tests for Roman reference file schema
RCAL build0.0 roman team-azure
_Issue [RCAL-50](https://jira.stsci.edu/browse/RCAL-50) was created on JIRA by [Paul Huwe](https://jira.stsci.edu/secure/ViewProfile.jspa?name=phuwe):_ Write a test module to test the reference file schema first verifying failure when the schema items are not present and passing once those elements are in place. This can be based partially on the JWST test test_schema.py in datamodes/tests.
1.0
Tests for Roman reference file schema - _Issue [RCAL-50](https://jira.stsci.edu/browse/RCAL-50) was created on JIRA by [Paul Huwe](https://jira.stsci.edu/secure/ViewProfile.jspa?name=phuwe):_ Write a test module to test the reference file schema first verifying failure when the schema items are not present and passing once those elements are in place. This can be based partially on the JWST test test_schema.py in datamodes/tests.
non_priority
tests for roman reference file schema issue was created on jira by write a test module to test the reference file schema first verifying failure when the schema items are not present and passing once those elements are in place this can be based partially on the jwst test test schema py in datamodes tests
0
58,701
14,344,300,295
IssuesEvent
2020-11-28 13:51:11
uniquelyparticular/sync-moltin-to-algolia
https://api.github.com/repos/uniquelyparticular/sync-moltin-to-algolia
opened
CVE-2020-26226 (High) detected in semantic-release-15.13.14.tgz
security vulnerability
## CVE-2020-26226 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semantic-release-15.13.14.tgz</b></p></summary> <p>Automated semver compliant package publishing</p> <p>Library home page: <a href="https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.14.tgz">https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.14.tgz</a></p> <p>Path to dependency file: sync-moltin-to-algolia/package.json</p> <p>Path to vulnerable library: sync-moltin-to-algolia/node_modules/semantic-release/package.json</p> <p> Dependency Hierarchy: - :x: **semantic-release-15.13.14.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-moltin-to-algolia/commit/1ba963c3668473f24bc53e805a17e1f2acdfc422">1ba963c3668473f24bc53e805a17e1f2acdfc422</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3. <p>Publish Date: 2020-11-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26226>CVE-2020-26226</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639">https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639</a></p> <p>Release Date: 2020-11-18</p> <p>Fix Resolution: 17.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-26226 (High) detected in semantic-release-15.13.14.tgz - ## CVE-2020-26226 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>semantic-release-15.13.14.tgz</b></p></summary> <p>Automated semver compliant package publishing</p> <p>Library home page: <a href="https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.14.tgz">https://registry.npmjs.org/semantic-release/-/semantic-release-15.13.14.tgz</a></p> <p>Path to dependency file: sync-moltin-to-algolia/package.json</p> <p>Path to vulnerable library: sync-moltin-to-algolia/node_modules/semantic-release/package.json</p> <p> Dependency Hierarchy: - :x: **semantic-release-15.13.14.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uniquelyparticular/sync-moltin-to-algolia/commit/1ba963c3668473f24bc53e805a17e1f2acdfc422">1ba963c3668473f24bc53e805a17e1f2acdfc422</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the npm package semantic-release before version 17.2.3, secrets that would normally be masked by `semantic-release` can be accidentally disclosed if they contain characters that become encoded when included in a URL. Secrets that do not contain characters that become encoded when included in a URL are already masked properly. The issue is fixed in version 17.2.3. <p>Publish Date: 2020-11-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-26226>CVE-2020-26226</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639">https://github.com/semantic-release/semantic-release/security/advisories/GHSA-r2j6-p67h-q639</a></p> <p>Release Date: 2020-11-18</p> <p>Fix Resolution: 17.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in semantic release tgz cve high severity vulnerability vulnerable library semantic release tgz automated semver compliant package publishing library home page a href path to dependency file sync moltin to algolia package json path to vulnerable library sync moltin to algolia node modules semantic release package json dependency hierarchy x semantic release tgz vulnerable library found in head commit a href vulnerability details in the npm package semantic release before version secrets that would normally be masked by semantic release can be accidentally disclosed if they contain characters that become encoded when included in a url secrets that do not contain characters that become encoded when included in a url are already masked properly the issue is fixed in version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
53,609
28,311,483,824
IssuesEvent
2023-04-10 15:47:51
interlock-network/interlock-smartcontracts
https://api.github.com/repos/interlock-network/interlock-smartcontracts
opened
Remove .clone() per audit feedback
performance audit must-have urgent
**Per Interlock_Report_NOT_PUBLIC.pdf (posted to Blockchain channel), finding KS-INT-16 - Risk of Memory overflow, page 32 of 40:** ### Overview `contracts_ilockmvp` is vulnerable to a memory overflow. Getter function `stakeholder_data()` line 841 and contains `.clone()` method call. Due to cheapness of getter function, this may lead to memory overflow denial of service type attack. Likewise `contract_uanft` is vulnerable to causing memory overflow. These is the getter functions are `contract_hash()` line 866, `get_last_token_id()` line 898, and `get_attributes()` line 1010. Additionally in this contract there are setters that are more costly but still may pose a risk as they contain multiple `.clone()` calls. These are: `transfer()` line 302, `burn()` line 361. These assertions of memory overflow risk have been made strongly on multiple occasions by auditors and are presumably backed by Aleph Zero dev who are working in conjunction with Kudelski. ### Action items: - [ ] please checkout branch specified by this issue ID - [ ] figure out how to avoid `.clone()`, by, for example, passing reference or imposing variable lifetimes - [ ] implement changes in `contract_ilockmvp` - [ ] implement changes in `contract_uanft` - [ ] test ### Test plan: - [ ] compile check - [ ] run unit tests - [ ] run e2e tests - [ ] upload contracts to testnet and check ALL functionality of changed functions in [contract-ui](https://contracts-ui.substrate.io/contract/5GRnc6dw9moZsrG1nWENELf4yGe2P8LTp83tJ7jkkfkQSJbj) (This is particularly important due to fact that we cannot of yet test Art Zero interface within Art Zero marketplace.) > - [ ] stakeholder_data() > - [ ] contract_hash() > - [ ] get_last_token_id() > - [ ] get_attributes() > - [ ] transfer() > - [ ] burn() - [ ] upload uanft contract to [Art Zero marketplace testnet](https://a0-test.artzero.io) (for now, this is the most we can test, the upload itself)
True
Remove .clone() per audit feedback - **Per Interlock_Report_NOT_PUBLIC.pdf (posted to Blockchain channel), finding KS-INT-16 - Risk of Memory overflow, page 32 of 40:** ### Overview `contracts_ilockmvp` is vulnerable to a memory overflow. Getter function `stakeholder_data()` line 841 and contains `.clone()` method call. Due to cheapness of getter function, this may lead to memory overflow denial of service type attack. Likewise `contract_uanft` is vulnerable to causing memory overflow. These is the getter functions are `contract_hash()` line 866, `get_last_token_id()` line 898, and `get_attributes()` line 1010. Additionally in this contract there are setters that are more costly but still may pose a risk as they contain multiple `.clone()` calls. These are: `transfer()` line 302, `burn()` line 361. These assertions of memory overflow risk have been made strongly on multiple occasions by auditors and are presumably backed by Aleph Zero dev who are working in conjunction with Kudelski. ### Action items: - [ ] please checkout branch specified by this issue ID - [ ] figure out how to avoid `.clone()`, by, for example, passing reference or imposing variable lifetimes - [ ] implement changes in `contract_ilockmvp` - [ ] implement changes in `contract_uanft` - [ ] test ### Test plan: - [ ] compile check - [ ] run unit tests - [ ] run e2e tests - [ ] upload contracts to testnet and check ALL functionality of changed functions in [contract-ui](https://contracts-ui.substrate.io/contract/5GRnc6dw9moZsrG1nWENELf4yGe2P8LTp83tJ7jkkfkQSJbj) (This is particularly important due to fact that we cannot of yet test Art Zero interface within Art Zero marketplace.) > - [ ] stakeholder_data() > - [ ] contract_hash() > - [ ] get_last_token_id() > - [ ] get_attributes() > - [ ] transfer() > - [ ] burn() - [ ] upload uanft contract to [Art Zero marketplace testnet](https://a0-test.artzero.io) (for now, this is the most we can test, the upload itself)
non_priority
remove clone per audit feedback per interlock report not public pdf posted to blockchain channel finding ks int risk of memory overflow page of overview contracts ilockmvp is vulnerable to a memory overflow getter function stakeholder data line and contains clone method call due to cheapness of getter function this may lead to memory overflow denial of service type attack likewise contract uanft is vulnerable to causing memory overflow these is the getter functions are contract hash line get last token id line and get attributes line additionally in this contract there are setters that are more costly but still may pose a risk as they contain multiple clone calls these are transfer line burn line these assertions of memory overflow risk have been made strongly on multiple occasions by auditors and are presumably backed by aleph zero dev who are working in conjunction with kudelski action items please checkout branch specified by this issue id figure out how to avoid clone by for example passing reference or imposing variable lifetimes implement changes in contract ilockmvp implement changes in contract uanft test test plan compile check run unit tests run tests upload contracts to testnet and check all functionality of changed functions in this is particularly important due to fact that we cannot of yet test art zero interface within art zero marketplace stakeholder data contract hash get last token id get attributes transfer burn upload uanft contract to for now this is the most we can test the upload itself
0
92,436
8,363,966,752
IssuesEvent
2018-10-03 21:14:18
yiisoft/yii2
https://api.github.com/repos/yiisoft/yii2
closed
Unable to load dynamic library pdo_sqlsrv.so
type:test
### What steps will reproduce the problem? Running tests with docker: `cd yii2/tests/mssql` `docker-compose run --rm php vendor/bin/phpunit -v --group mssql` ### What is the expected result? Load `pdo_sqlsrv.so` ### What do you get instead? ``` PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib/php/20151012/pdo_sqlsrv.so' - /usr/lib/php/20151012/pdo_sqlsrv.so: undefined symbol: php_pdo_register_driver in Unknown on line 0 PHPUnit 4.8.34 by Sebastian Bergmann and contributors. Runtime: PHP 7.0.32-0ubuntu0.16.04.1 with Xdebug 2.4.0 Configuration: /project/phpunit.xml.dist ``` ### Additional info | Q | A | ---------------- | --- | Yii version | 2.0.16-dev | PHP version | 7.2.10 | Operating system | ubuntu 18.04.1 | MSSQL version | 2017 | MSSQL driver | sqlsrv
1.0
Unable to load dynamic library pdo_sqlsrv.so - ### What steps will reproduce the problem? Running tests with docker: `cd yii2/tests/mssql` `docker-compose run --rm php vendor/bin/phpunit -v --group mssql` ### What is the expected result? Load `pdo_sqlsrv.so` ### What do you get instead? ``` PHP Warning: PHP Startup: Unable to load dynamic library '/usr/lib/php/20151012/pdo_sqlsrv.so' - /usr/lib/php/20151012/pdo_sqlsrv.so: undefined symbol: php_pdo_register_driver in Unknown on line 0 PHPUnit 4.8.34 by Sebastian Bergmann and contributors. Runtime: PHP 7.0.32-0ubuntu0.16.04.1 with Xdebug 2.4.0 Configuration: /project/phpunit.xml.dist ``` ### Additional info | Q | A | ---------------- | --- | Yii version | 2.0.16-dev | PHP version | 7.2.10 | Operating system | ubuntu 18.04.1 | MSSQL version | 2017 | MSSQL driver | sqlsrv
non_priority
unable to load dynamic library pdo sqlsrv so what steps will reproduce the problem running tests with docker cd tests mssql docker compose run rm php vendor bin phpunit v group mssql what is the expected result load pdo sqlsrv so what do you get instead php warning php startup unable to load dynamic library usr lib php pdo sqlsrv so usr lib php pdo sqlsrv so undefined symbol php pdo register driver in unknown on line phpunit by sebastian bergmann and contributors runtime php with xdebug configuration project phpunit xml dist additional info q a yii version dev php version operating system ubuntu mssql version mssql driver sqlsrv
0
25,618
5,187,522,918
IssuesEvent
2017-01-20 17:03:32
openmole/openmole
https://api.github.com/repos/openmole/openmole
opened
Clarify sharedDirectory
documentation easypick enhancement
Clarify description of `sharedDirectory` both: [ ] in the environments description [ ] and suggest it instead of symlink when quota reached in FAQ
1.0
Clarify sharedDirectory - Clarify description of `sharedDirectory` both: [ ] in the environments description [ ] and suggest it instead of symlink when quota reached in FAQ
non_priority
clarify shareddirectory clarify description of shareddirectory both in the environments description and suggest it instead of symlink when quota reached in faq
0
236,945
26,072,325,361
IssuesEvent
2022-12-24 01:20:34
turkdevops/next-auth-example
https://api.github.com/repos/turkdevops/next-auth-example
opened
CVE-2022-23541 (Medium) detected in jsonwebtoken-8.5.1.tgz
security vulnerability
## CVE-2022-23541 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonwebtoken-8.5.1.tgz</b></p></summary> <p>JSON Web Token implementation (symmetric and asymmetric)</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz">https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jsonwebtoken/package.json</p> <p> Dependency Hierarchy: - next-auth-3.29.10.tgz (Root Library) - :x: **jsonwebtoken-8.5.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/next-auth-example/commit/1aaa89a68971e6811042f781fce5f59a4a7ae169">1aaa89a68971e6811042f781fce5f59a4a7ae169</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0. <p>Publish Date: 2022-12-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23541>CVE-2022-23541</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959">https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959</a></p> <p>Release Date: 2022-12-22</p> <p>Fix Resolution: jsonwebtoken - 9.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-23541 (Medium) detected in jsonwebtoken-8.5.1.tgz - ## CVE-2022-23541 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jsonwebtoken-8.5.1.tgz</b></p></summary> <p>JSON Web Token implementation (symmetric and asymmetric)</p> <p>Library home page: <a href="https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz">https://registry.npmjs.org/jsonwebtoken/-/jsonwebtoken-8.5.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/jsonwebtoken/package.json</p> <p> Dependency Hierarchy: - next-auth-3.29.10.tgz (Root Library) - :x: **jsonwebtoken-8.5.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/next-auth-example/commit/1aaa89a68971e6811042f781fce5f59a4a7ae169">1aaa89a68971e6811042f781fce5f59a4a7ae169</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> jsonwebtoken is an implementation of JSON Web Tokens. Versions `<= 8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function referring to the `secretOrPublicKey` argument from the readme link will result in incorrect verification of tokens. There is a possibility of using a different algorithm and key combination in verification, other than the one that was used to sign the tokens. Specifically, tokens signed with an asymmetric public key could be verified with a symmetric HS256 algorithm. This can lead to successful validation of forged tokens. If your application is supporting usage of both symmetric key and asymmetric key in jwt.verify() implementation with the same key retrieval function. This issue has been patched, please update to version 9.0.0. <p>Publish Date: 2022-12-22 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-23541>CVE-2022-23541</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959">https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959</a></p> <p>Release Date: 2022-12-22</p> <p>Fix Resolution: jsonwebtoken - 9.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jsonwebtoken tgz cve medium severity vulnerability vulnerable library jsonwebtoken tgz json web token implementation symmetric and asymmetric library home page a href path to dependency file package json path to vulnerable library node modules jsonwebtoken package json dependency hierarchy next auth tgz root library x jsonwebtoken tgz vulnerable library found in head commit a href found in base branch main vulnerability details jsonwebtoken is an implementation of json web tokens versions of jsonwebtoken library can be misconfigured so that passing a poorly implemented key retrieval function referring to the secretorpublickey argument from the readme link will result in incorrect verification of tokens there is a possibility of using a different algorithm and key combination in verification other than the one that was used to sign the tokens specifically tokens signed with an asymmetric public key could be verified with a symmetric algorithm this can lead to successful validation of forged tokens if your application is supporting usage of both symmetric key and asymmetric key in jwt verify implementation with the same key retrieval function this issue has been patched please update to version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jsonwebtoken step up your open source security game with mend
0
282,861
21,315,973,624
IssuesEvent
2022-04-16 09:25:35
darylhjd/pe
https://api.github.com/repos/darylhjd/pe
opened
Inaccurate relationship between `TaskList` and `Task` class.
type.DocumentationBug severity.Low
![image.png](https://raw.githubusercontent.com/darylhjd/pe/main/files/086811f0-bed1-49e4-b39c-945608adb8e7.png) In the DG, the TaskList has a dependency to the Task class. However, since the TaskList keeps track of a list of Tasks, the better relationship to be shown would have been association. <!--session: 1650096020645-6bb99175-1a50-4d42-a00d-5c7e24d2a8d4--> <!--Version: Web v3.4.2-->
1.0
Inaccurate relationship between `TaskList` and `Task` class. - ![image.png](https://raw.githubusercontent.com/darylhjd/pe/main/files/086811f0-bed1-49e4-b39c-945608adb8e7.png) In the DG, the TaskList has a dependency to the Task class. However, since the TaskList keeps track of a list of Tasks, the better relationship to be shown would have been association. <!--session: 1650096020645-6bb99175-1a50-4d42-a00d-5c7e24d2a8d4--> <!--Version: Web v3.4.2-->
non_priority
inaccurate relationship between tasklist and task class in the dg the tasklist has a dependency to the task class however since the tasklist keeps track of a list of tasks the better relationship to be shown would have been association
0
237,413
26,085,125,854
IssuesEvent
2022-12-26 01:06:47
CodeChung/pushingprofessionals
https://api.github.com/repos/CodeChung/pushingprofessionals
opened
CVE-2022-46175 (High) detected in multiple libraries
security vulnerability
## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-0.5.1.tgz</b>, <b>json5-1.0.1.tgz</b>, <b>json5-2.1.1.tgz</b></p></summary> <p> <details><summary><b>json5-0.5.1.tgz</b></p></summary> <p>JSON for the ES5 era.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-0.5.1.tgz">https://registry.npmjs.org/json5/-/json5-0.5.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/html-webpack-plugin/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - webpack-2.11.0.tgz - html-webpack-plugin-3.2.0.tgz - loader-utils-0.2.17.tgz - :x: **json5-0.5.1.tgz** (Vulnerable Library) </details> <details><summary><b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/loader-utils/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - webpack-2.11.0.tgz - thread-loader-2.1.3.tgz - loader-utils-1.2.3.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) </details> <details><summary><b>json5-2.1.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.1.1.tgz">https://registry.npmjs.org/json5/-/json5-2.1.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - webpack-2.11.0.tgz - core-7.8.3.tgz - :x: **json5-2.1.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/CodeChung/pushingprofessionals/commit/e419a5587a6916ef851397786ab9a20548d4641a">e419a5587a6916ef851397786ab9a20548d4641a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-46175 (High) detected in multiple libraries - ## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>json5-0.5.1.tgz</b>, <b>json5-1.0.1.tgz</b>, <b>json5-2.1.1.tgz</b></p></summary> <p> <details><summary><b>json5-0.5.1.tgz</b></p></summary> <p>JSON for the ES5 era.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-0.5.1.tgz">https://registry.npmjs.org/json5/-/json5-0.5.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/html-webpack-plugin/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - webpack-2.11.0.tgz - html-webpack-plugin-3.2.0.tgz - loader-utils-0.2.17.tgz - :x: **json5-0.5.1.tgz** (Vulnerable Library) </details> <details><summary><b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/loader-utils/node_modules/json5/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - webpack-2.11.0.tgz - thread-loader-2.1.3.tgz - loader-utils-1.2.3.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) </details> <details><summary><b>json5-2.1.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-2.1.1.tgz">https://registry.npmjs.org/json5/-/json5-2.1.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json</p> <p> Dependency Hierarchy: - nuxt-2.11.0.tgz (Root Library) - webpack-2.11.0.tgz - core-7.8.3.tgz - :x: **json5-2.1.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/CodeChung/pushingprofessionals/commit/e419a5587a6916ef851397786ab9a20548d4641a">e419a5587a6916ef851397786ab9a20548d4641a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries tgz tgz tgz tgz json for the era library home page a href path to dependency file package json path to vulnerable library node modules html webpack plugin node modules package json dependency hierarchy nuxt tgz root library webpack tgz html webpack plugin tgz loader utils tgz x tgz vulnerable library tgz json for humans library home page a href path to dependency file package json path to vulnerable library node modules loader utils node modules package json dependency hierarchy nuxt tgz root library webpack tgz thread loader tgz loader utils tgz x tgz vulnerable library tgz json for humans library home page a href path to dependency file package json path to vulnerable library node modules package json dependency hierarchy nuxt tgz root library webpack tgz core tgz x tgz vulnerable library found in head commit a href found in base branch master vulnerability details is an extension to the popular json file format that aims to be easier to write and maintain by hand e g for config files the parse method of the library before and including version does not restrict parsing of keys named proto allowing specially crafted strings to pollute the prototype of the resulting object this vulnerability pollutes the prototype of the object returned by parse and not the global object prototype which is the commonly understood definition of prototype pollution however polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations this vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from parse the actual impact will depend on how applications utilize the returned object and how they filter unwanted keys but could include denial of service cross site scripting elevation of privilege and in extreme cases remote code execution parse should restrict parsing of proto keys when parsing json strings to objects as a point of reference the json parse method included in javascript ignores proto keys simply changing parse to json parse in the examples above mitigates this vulnerability this vulnerability is patched in version and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
288,962
24,945,622,319
IssuesEvent
2022-10-31 23:42:01
zio/zio
https://api.github.com/repos/zio/zio
closed
Spurious streams test failure
stream flaky tests
happens not infrequently to reproduce: `streamsTestsJVM/testOnly *.ZChannelSpec -- -t "simple merge all"` a couple of examples: - ZChannelSpec / interpreter / ZChannel#mergeAll / simple merge all ✗ Set2(1, 6) was not equal to Set3(1, 4, 9) chunk.toSet did not satisfy equalTo(Set(1, 4, 9)) chunk.toSet = Set2(1, 6) at /home/rob/code/zio/streams-tests/shared/src/test/scala/zio/stream/ZChannelSpec.scala:446 - ZChannelSpec / interpreter / ZChannel#mergeAll / simple merge all ✗ Set3(2, 6, 3) was not equal to Set3(1, 4, 9) chunk.toSet did not satisfy equalTo(Set(1, 4, 9)) chunk.toSet = Set3(2, 6, 3) at /home/rob/code/zio/streams-tests/shared/src/test/scala/zio/stream/ZChannelSpec.scala:446
1.0
Spurious streams test failure - happens not infrequently to reproduce: `streamsTestsJVM/testOnly *.ZChannelSpec -- -t "simple merge all"` a couple of examples: - ZChannelSpec / interpreter / ZChannel#mergeAll / simple merge all ✗ Set2(1, 6) was not equal to Set3(1, 4, 9) chunk.toSet did not satisfy equalTo(Set(1, 4, 9)) chunk.toSet = Set2(1, 6) at /home/rob/code/zio/streams-tests/shared/src/test/scala/zio/stream/ZChannelSpec.scala:446 - ZChannelSpec / interpreter / ZChannel#mergeAll / simple merge all ✗ Set3(2, 6, 3) was not equal to Set3(1, 4, 9) chunk.toSet did not satisfy equalTo(Set(1, 4, 9)) chunk.toSet = Set3(2, 6, 3) at /home/rob/code/zio/streams-tests/shared/src/test/scala/zio/stream/ZChannelSpec.scala:446
non_priority
spurious streams test failure happens not infrequently to reproduce streamstestsjvm testonly zchannelspec t simple merge all a couple of examples zchannelspec interpreter zchannel mergeall simple merge all ✗ was not equal to chunk toset did not satisfy equalto set chunk toset at home rob code zio streams tests shared src test scala zio stream zchannelspec scala zchannelspec interpreter zchannel mergeall simple merge all ✗ was not equal to chunk toset did not satisfy equalto set chunk toset at home rob code zio streams tests shared src test scala zio stream zchannelspec scala
0
8,911
12,016,244,721
IssuesEvent
2020-04-10 15:41:46
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
ServiceController tests fail to start test service
area-System.ServiceProcess untriaged
These tests verify ServiceBase and ServiceController but are rarely run because you need to specify outerloop AND you have to be elevated. They currently are failing for me -- I tried two machines. ``` C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests>msbuild /t:rebuildandtest /p:outerloop=true ... ... Discovering: System.ServiceProcess.ServiceController.Tests (method display = ClassAndMethod, method display options = None) Discovered: System.ServiceProcess.ServiceController.Tests (found 36 of 37 test cases) Starting: System.ServiceProcess.ServiceController.Tests (parallel test collections = on, max threads = 4)... System.InvalidOperationException : Cannot start service '4cb85dca-edbf-430c-afe2-61f5d782f266.Dependent' on com puter '.'. ---- System.ComponentModel.Win32Exception : Access is denied. Stack Trace: C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\src\System\ServiceProcess\ServiceControl ler.cs(844,0): at System.ServiceProcess.ServiceController.Start(String[] args) C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\src\System\ServiceProcess\ServiceControl ler.cs(804,0): at System.ServiceProcess.ServiceController.Start() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\System.ServiceProcess.ServiceContr oller.TestService\TestServiceInstaller.cs(106,0): at System.ServiceProcess.Tests.TestServiceInstaller.Install() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\TestServiceProvider.cs(123,0): at System.ServiceProcess.Tests.TestServiceProvider.CreateTestServices() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\TestServiceProvider.cs(77,0): at S ystem.ServiceProcess.Tests.TestServiceProvider..ctor(String serviceName, String userName) C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\TestServiceProvider.cs(62,0): at S ystem.ServiceProcess.Tests.TestServiceProvider..ctor() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\ServiceControllerTests.cs(24,0): a t System.ServiceProcess.Tests.ServiceControllerTests..ctor() ----- Inner Stack Trace ----- ``` This is definitely an elevated prompt. I tried `Debugger.Launch()` in the TestService constructor, and it does not fire. I looked at the Security event log, and it does not have any "failed" messages. "net start <servicename>" gives access denied as well. So it's not the test harness. @Anipik do you repro this?
1.0
ServiceController tests fail to start test service - These tests verify ServiceBase and ServiceController but are rarely run because you need to specify outerloop AND you have to be elevated. They currently are failing for me -- I tried two machines. ``` C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests>msbuild /t:rebuildandtest /p:outerloop=true ... ... Discovering: System.ServiceProcess.ServiceController.Tests (method display = ClassAndMethod, method display options = None) Discovered: System.ServiceProcess.ServiceController.Tests (found 36 of 37 test cases) Starting: System.ServiceProcess.ServiceController.Tests (parallel test collections = on, max threads = 4)... System.InvalidOperationException : Cannot start service '4cb85dca-edbf-430c-afe2-61f5d782f266.Dependent' on com puter '.'. ---- System.ComponentModel.Win32Exception : Access is denied. Stack Trace: C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\src\System\ServiceProcess\ServiceControl ler.cs(844,0): at System.ServiceProcess.ServiceController.Start(String[] args) C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\src\System\ServiceProcess\ServiceControl ler.cs(804,0): at System.ServiceProcess.ServiceController.Start() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\System.ServiceProcess.ServiceContr oller.TestService\TestServiceInstaller.cs(106,0): at System.ServiceProcess.Tests.TestServiceInstaller.Install() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\TestServiceProvider.cs(123,0): at System.ServiceProcess.Tests.TestServiceProvider.CreateTestServices() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\TestServiceProvider.cs(77,0): at S ystem.ServiceProcess.Tests.TestServiceProvider..ctor(String serviceName, String userName) C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\TestServiceProvider.cs(62,0): at S ystem.ServiceProcess.Tests.TestServiceProvider..ctor() C:\git\runtime\src\libraries\System.ServiceProcess.ServiceController\tests\ServiceControllerTests.cs(24,0): a t System.ServiceProcess.Tests.ServiceControllerTests..ctor() ----- Inner Stack Trace ----- ``` This is definitely an elevated prompt. I tried `Debugger.Launch()` in the TestService constructor, and it does not fire. I looked at the Security event log, and it does not have any "failed" messages. "net start <servicename>" gives access denied as well. So it's not the test harness. @Anipik do you repro this?
non_priority
servicecontroller tests fail to start test service these tests verify servicebase and servicecontroller but are rarely run because you need to specify outerloop and you have to be elevated they currently are failing for me i tried two machines c git runtime src libraries system serviceprocess servicecontroller tests msbuild t rebuildandtest p outerloop true discovering system serviceprocess servicecontroller tests method display classandmethod method display options none discovered system serviceprocess servicecontroller tests found of test cases starting system serviceprocess servicecontroller tests parallel test collections on max threads system invalidoperationexception cannot start service edbf dependent on com puter system componentmodel access is denied stack trace c git runtime src libraries system serviceprocess servicecontroller src system serviceprocess servicecontrol ler cs at system serviceprocess servicecontroller start string args c git runtime src libraries system serviceprocess servicecontroller src system serviceprocess servicecontrol ler cs at system serviceprocess servicecontroller start c git runtime src libraries system serviceprocess servicecontroller tests system serviceprocess servicecontr oller testservice testserviceinstaller cs at system serviceprocess tests testserviceinstaller install c git runtime src libraries system serviceprocess servicecontroller tests testserviceprovider cs at system serviceprocess tests testserviceprovider createtestservices c git runtime src libraries system serviceprocess servicecontroller tests testserviceprovider cs at s ystem serviceprocess tests testserviceprovider ctor string servicename string username c git runtime src libraries system serviceprocess servicecontroller tests testserviceprovider cs at s ystem serviceprocess tests testserviceprovider ctor c git runtime src libraries system serviceprocess servicecontroller tests servicecontrollertests cs a t system serviceprocess tests servicecontrollertests ctor inner stack trace this is definitely an elevated prompt i tried debugger launch in the testservice constructor and it does not fire i looked at the security event log and it does not have any failed messages net start gives access denied as well so it s not the test harness anipik do you repro this
0
171,369
13,229,952,009
IssuesEvent
2020-08-18 09:01:46
gambitph/Stackable
https://api.github.com/repos/gambitph/Stackable
closed
Some blocks encountered an error when you add them in the block editor
[block] feature [block] pricing box [block] team member [block] testimonial bug critical
Even if you didn't change or edit anything, some blocks will error out just by adding them to the block editor. ![ezgif-7-536bff2116d9](https://user-images.githubusercontent.com/51441886/89256620-1b7e9200-d657-11ea-81df-bca3975d7f24.gif) I'm using the **Version 2.9.0-responsive-fix-v3 plugin**. These are the blocks that error out by adding them in the block editor: - [ ] Feature - [ ] Pricing Box - [ ] Team Member - [ ] Testimonial If you have one of these blocks in your page, after you update/save then refresh your page, your page will be blank. ![ezgif-7-3f81c838cc10](https://user-images.githubusercontent.com/51441886/89256924-c2632e00-d657-11ea-9a61-e5485e48d6cc.gif)
1.0
Some blocks encountered an error when you add them in the block editor - Even if you didn't change or edit anything, some blocks will error out just by adding them to the block editor. ![ezgif-7-536bff2116d9](https://user-images.githubusercontent.com/51441886/89256620-1b7e9200-d657-11ea-81df-bca3975d7f24.gif) I'm using the **Version 2.9.0-responsive-fix-v3 plugin**. These are the blocks that error out by adding them in the block editor: - [ ] Feature - [ ] Pricing Box - [ ] Team Member - [ ] Testimonial If you have one of these blocks in your page, after you update/save then refresh your page, your page will be blank. ![ezgif-7-3f81c838cc10](https://user-images.githubusercontent.com/51441886/89256924-c2632e00-d657-11ea-9a61-e5485e48d6cc.gif)
non_priority
some blocks encountered an error when you add them in the block editor even if you didn t change or edit anything some blocks will error out just by adding them to the block editor i m using the version responsive fix plugin these are the blocks that error out by adding them in the block editor feature pricing box team member testimonial if you have one of these blocks in your page after you update save then refresh your page your page will be blank
0
47,306
12,003,181,236
IssuesEvent
2020-04-09 09:08:45
dpa99c/cordova-plugin-firebasex
https://api.github.com/repos/dpa99c/cordova-plugin-firebasex
closed
Android build error
android build issue support
<!-- IMPORTANT: PLEASE READ WARNING: Failure to follow the issue template guidelines below will result in the issue being immediately closed. Only bug reports should be opened here. Before opening an issue, please do the following: - check a similar issue is not already open (or closed) against this plugin. - Duplicates or near-duplicates will be closed immediately. - try to reproduce the issue using the example project - or if that's not possible, using an isolated test project that you are able to share - this will eliminate bugs in your code or conflicts with other code as possible causes of the issue - any issue which is suspected of being caused by the Ionic Native wrapper should be [reported against Ionic Native](https://github.com/ionic-team/ionic-native/issues/new) - Ionic Native Typescript wrappers are maintained by the Ionic Team - To verify an if an issue is caused by this plugin or its Typescript wrapper, please re-test using the vanilla Javascript plugin interface (without the Ionic Native wrapper). - Any issue opened here which is obviously an Ionic Typescript wrapper issue will be closed immediately. --> <!-- Fill out the relevant sections below and delete irrelevant sections. --> # Bug report **Current behavior:** <!-- Describe how the bug manifests. --> Building on android throws compilation error that result in a failed build. <!-- Explain how you're sure there is an issue with this plugin rather than your own code: - If this plugin has an example project, have you been able to reproduce the issue within it? - Have you created a clean test Cordova project containing only this plugin to eliminate the potential for interference with other plugins/code? --> After reverting from 9.0.1 back to 8.0.1 the build is OK again. **Environment information** <!-- Please supply full details of your development environment including: --> - Cordova CLI version - `9.0.0 (cordova-lib@9.0.1)` - Cordova platform version - `Installed platforms: android 8.1.0` - Plugins & versions installed in project (including this plugin) - ``` cordova-custom-config 5.1.0 "cordova-custom-config" cordova-plugin-actionsheet 2.3.3 "ActionSheet" cordova-plugin-androidx 1.0.2 "cordova-plugin-androidx" cordova-plugin-androidx-adapter 1.1.0 "cordova-plugin-androidx-adapter" cordova-plugin-app-update 2.0.2 "AppUpdate" cordova-plugin-appversion 1.0.0 "App Version" cordova-plugin-camera 4.1.0 "Camera" cordova-plugin-device 2.0.3 "Device" cordova-plugin-dialogs 2.0.2 "Notification" cordova-plugin-email-composer 0.9.2 "EmailComposer" cordova-plugin-file 6.0.2 "File" cordova-plugin-file-opener2 2.2.1 "File Opener2" cordova-plugin-firebasex 9.0.1 "Google Firebase Plugin" cordova-plugin-geolocation 4.0.2 "Geolocation" cordova-plugin-ionic-keyboard 2.2.0 "cordova-plugin-ionic-keyboard" cordova-plugin-ionic-webview 4.1.3 "cordova-plugin-ionic-webview" cordova-plugin-ios-disableshaketoedit 1.0.0 "iOS Disable Shake to Edit" cordova-plugin-network-information 2.0.2 "Network Information" cordova-plugin-screen-orientation 3.0.2 "Screen Orientation" cordova-plugin-splashscreen 5.0.3 "Splashscreen" cordova-plugin-statusbar 2.4.3 "StatusBar" cordova-plugin-whitelist 1.3.4 "Whitelist" cordova-sqlite-storage 3.4.1 "Cordova sqlite storage plugin - cordova-sqlite-storage plugin version" es6-promise-plugin 4.2.2 "Promise" uk.co.workingedge.phonegap.plugin.launchnavigator 5.0.4 "Launch Navigator"``` - Dev machine OS and version, e.g. - Windows 10 - `win 10 v 1903` _Android build issue:_ - Node JS version - `v10.16.0` - Gradle version - `4.10.3 5.5 buildOutputCleanup vcs-1` **Console output** <details> <summary>console output</summary> ``` > Task :app:processReleaseResources C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:84: error: cannot find symbol FirebasePlugin.applicationContext = this.getApplicationContext(); ^ symbol: method getApplicationContext() C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:196: error: no suitable constructor found for Intent(FirebasePluginMessagingService,Class<OnNotificationOpenReceiver>) Intent intent = new Intent(this, OnNotificationOpenReceiver.class); ^ constructor Intent.Intent(String,Uri) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to String) constructor Intent.Intent(Context,Class<?>) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to Context) C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:198: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context PendingIntent pendingIntent = PendingIntent.getBroadcast(this, id.hashCode(), intent, PendingIntent.FLAG_UPDATE_CURRENT); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:208: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context NotificationCompat.Builder notificationBuilder = new NotificationCompat.Builder(this, channelId); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:225: error: cannot find symbol Uri soundPath = Uri.parse(ContentResolver.SCHEME_ANDROID_RESOURCE + "://" + getPackageName() + "/raw/" + sound); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:279: error: cannot find symbol notificationBuilder.setSmallIcon(getApplicationInfo().icon); ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:298: error: cannot find symbol largeIconResID = getApplicationInfo().icon; ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:300: error: cannot find symbol notificationBuilder.setLargeIcon(BitmapFactory.decodeResource(getApplicationContext().getResources(), largeIconResID)); ^ symbol: method getApplicationContext() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:336: error: cannot find symbol NotificationManager notificationManager = (NotificationManager) getSystemService(Context.NOTIFICATION_SERVICE); ^ symbol: method getSystemService(String) location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:341: error: cannot find symbol FirebasePlugin.sendMessage(bundle, this.getApplicationContext()); ^ symbol: method getApplicationContext() Note: Some input files use or override a deprecated API. Note: Recompile with -Xlint:deprecation for details. Note: C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\file\AssetFilesystem.java uses unchecked or unsafe operations. Note: Recompile with -Xlint:unchecked for details. Note: Some messages have been simplified; recompile with -Xdiags:verbose to get full output 21 errors FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:compileReleaseJavaWithJavac'. > Compilation failed; see the compiler error output for details. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 53s > Task :app:compileReleaseJavaWithJavac > Task :app:compileReleaseJavaWithJavac FAILED 33 actionable tasks: 33 executed C:\Users\Simon\Development\core\mobile-app\platforms\android\gradlew: Command failed with exit code 1 Error output: C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:84: error: cannot find symbol FirebasePlugin.applicationContext = this.getApplicationContext(); ^ symbol: method getApplicationContext() C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:196: error: no suitable constructor found for Intent(FirebasePluginMessagingService,Class<OnNotificationOpenReceiver>) Intent intent = new Intent(this, OnNotificationOpenReceiver.class); ^ constructor Intent.Intent(String,Uri) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to String) constructor Intent.Intent(Context,Class<?>) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to Context) C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:198: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context PendingIntent pendingIntent = PendingIntent.getBroadcast(this, id.hashCode(), intent, PendingIntent.FLAG_UPDATE_CURRENT); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:208: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context NotificationCompat.Builder notificationBuilder = new NotificationCompat.Builder(this, channelId); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:225: error: cannot find symbol Uri soundPath = Uri.parse(ContentResolver.SCHEME_ANDROID_RESOURCE + "://" + getPackageName() + "/raw/" + sound); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:279: error: cannot find symbol notificationBuilder.setSmallIcon(getApplicationInfo().icon); ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:298: error: cannot find symbol largeIconResID = getApplicationInfo().icon; ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:300: error: cannot find symbol notificationBuilder.setLargeIcon(BitmapFactory.decodeResource(getApplicationContext().getResources(), largeIconResID)); ^ symbol: method getApplicationContext() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:336: error: cannot find symbol NotificationManager notificationManager = (NotificationManager) getSystemService(Context.NOTIFICATION_SERVICE); ^ symbol: method getSystemService(String) location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:341: error: cannot find symbol FirebasePlugin.sendMessage(bundle, this.getApplicationContext()); ^ symbol: method getApplicationContext() Note: Some input files use or override a deprecated API. Note: Recompile with -Xlint:deprecation for details. Note: C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\file\AssetFilesystem.java uses unchecked or unsafe operations. Note: Recompile with -Xlint:unchecked for details. Note: Some messages have been simplified; recompile with -Xdiags:verbose to get full output 21 errors FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:compileReleaseJavaWithJavac'. > Compilation failed; see the compiler error output for details. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 53s [ERROR] An error occurred while running subprocess cordova. cordova.cmd build android --release --buildConfig C:\Users\Simon\Development\cor... exited with exit code 1. Re-running this command with the --verbose flag may provide more information. ``` </details><br/><br/> <!-- A POLITE REMINDER - This is free, open-source software. - Although the author makes every effort to maintain it, no guarantees are made as to the quality or reliability, and reported issues will be addressed if and when the author has time. - Help/support will not be given by the author, so forums (e.g. Ionic) or Stack Overflow should be used. Any issues requesting help/support will be closed immediately. - If you have urgent need of a bug fix/feature, the author can be engaged for PAID contract work to do so: please contact dave@workingedge.co.uk - Rude or abusive comments/issues will not be tolerated, nor will opening multiple issues if those previously closed are deemed unsuitable. Any of the above will result in you being BANNED from ALL of my Github repositories. -->
1.0
Android build error - <!-- IMPORTANT: PLEASE READ WARNING: Failure to follow the issue template guidelines below will result in the issue being immediately closed. Only bug reports should be opened here. Before opening an issue, please do the following: - check a similar issue is not already open (or closed) against this plugin. - Duplicates or near-duplicates will be closed immediately. - try to reproduce the issue using the example project - or if that's not possible, using an isolated test project that you are able to share - this will eliminate bugs in your code or conflicts with other code as possible causes of the issue - any issue which is suspected of being caused by the Ionic Native wrapper should be [reported against Ionic Native](https://github.com/ionic-team/ionic-native/issues/new) - Ionic Native Typescript wrappers are maintained by the Ionic Team - To verify an if an issue is caused by this plugin or its Typescript wrapper, please re-test using the vanilla Javascript plugin interface (without the Ionic Native wrapper). - Any issue opened here which is obviously an Ionic Typescript wrapper issue will be closed immediately. --> <!-- Fill out the relevant sections below and delete irrelevant sections. --> # Bug report **Current behavior:** <!-- Describe how the bug manifests. --> Building on android throws compilation error that result in a failed build. <!-- Explain how you're sure there is an issue with this plugin rather than your own code: - If this plugin has an example project, have you been able to reproduce the issue within it? - Have you created a clean test Cordova project containing only this plugin to eliminate the potential for interference with other plugins/code? --> After reverting from 9.0.1 back to 8.0.1 the build is OK again. **Environment information** <!-- Please supply full details of your development environment including: --> - Cordova CLI version - `9.0.0 (cordova-lib@9.0.1)` - Cordova platform version - `Installed platforms: android 8.1.0` - Plugins & versions installed in project (including this plugin) - ``` cordova-custom-config 5.1.0 "cordova-custom-config" cordova-plugin-actionsheet 2.3.3 "ActionSheet" cordova-plugin-androidx 1.0.2 "cordova-plugin-androidx" cordova-plugin-androidx-adapter 1.1.0 "cordova-plugin-androidx-adapter" cordova-plugin-app-update 2.0.2 "AppUpdate" cordova-plugin-appversion 1.0.0 "App Version" cordova-plugin-camera 4.1.0 "Camera" cordova-plugin-device 2.0.3 "Device" cordova-plugin-dialogs 2.0.2 "Notification" cordova-plugin-email-composer 0.9.2 "EmailComposer" cordova-plugin-file 6.0.2 "File" cordova-plugin-file-opener2 2.2.1 "File Opener2" cordova-plugin-firebasex 9.0.1 "Google Firebase Plugin" cordova-plugin-geolocation 4.0.2 "Geolocation" cordova-plugin-ionic-keyboard 2.2.0 "cordova-plugin-ionic-keyboard" cordova-plugin-ionic-webview 4.1.3 "cordova-plugin-ionic-webview" cordova-plugin-ios-disableshaketoedit 1.0.0 "iOS Disable Shake to Edit" cordova-plugin-network-information 2.0.2 "Network Information" cordova-plugin-screen-orientation 3.0.2 "Screen Orientation" cordova-plugin-splashscreen 5.0.3 "Splashscreen" cordova-plugin-statusbar 2.4.3 "StatusBar" cordova-plugin-whitelist 1.3.4 "Whitelist" cordova-sqlite-storage 3.4.1 "Cordova sqlite storage plugin - cordova-sqlite-storage plugin version" es6-promise-plugin 4.2.2 "Promise" uk.co.workingedge.phonegap.plugin.launchnavigator 5.0.4 "Launch Navigator"``` - Dev machine OS and version, e.g. - Windows 10 - `win 10 v 1903` _Android build issue:_ - Node JS version - `v10.16.0` - Gradle version - `4.10.3 5.5 buildOutputCleanup vcs-1` **Console output** <details> <summary>console output</summary> ``` > Task :app:processReleaseResources C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:84: error: cannot find symbol FirebasePlugin.applicationContext = this.getApplicationContext(); ^ symbol: method getApplicationContext() C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:196: error: no suitable constructor found for Intent(FirebasePluginMessagingService,Class<OnNotificationOpenReceiver>) Intent intent = new Intent(this, OnNotificationOpenReceiver.class); ^ constructor Intent.Intent(String,Uri) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to String) constructor Intent.Intent(Context,Class<?>) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to Context) C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:198: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context PendingIntent pendingIntent = PendingIntent.getBroadcast(this, id.hashCode(), intent, PendingIntent.FLAG_UPDATE_CURRENT); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:208: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context NotificationCompat.Builder notificationBuilder = new NotificationCompat.Builder(this, channelId); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:225: error: cannot find symbol Uri soundPath = Uri.parse(ContentResolver.SCHEME_ANDROID_RESOURCE + "://" + getPackageName() + "/raw/" + sound); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:279: error: cannot find symbol notificationBuilder.setSmallIcon(getApplicationInfo().icon); ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:298: error: cannot find symbol largeIconResID = getApplicationInfo().icon; ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:300: error: cannot find symbol notificationBuilder.setLargeIcon(BitmapFactory.decodeResource(getApplicationContext().getResources(), largeIconResID)); ^ symbol: method getApplicationContext() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:336: error: cannot find symbol NotificationManager notificationManager = (NotificationManager) getSystemService(Context.NOTIFICATION_SERVICE); ^ symbol: method getSystemService(String) location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:341: error: cannot find symbol FirebasePlugin.sendMessage(bundle, this.getApplicationContext()); ^ symbol: method getApplicationContext() Note: Some input files use or override a deprecated API. Note: Recompile with -Xlint:deprecation for details. Note: C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\file\AssetFilesystem.java uses unchecked or unsafe operations. Note: Recompile with -Xlint:unchecked for details. Note: Some messages have been simplified; recompile with -Xdiags:verbose to get full output 21 errors FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:compileReleaseJavaWithJavac'. > Compilation failed; see the compiler error output for details. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 53s > Task :app:compileReleaseJavaWithJavac > Task :app:compileReleaseJavaWithJavac FAILED 33 actionable tasks: 33 executed C:\Users\Simon\Development\core\mobile-app\platforms\android\gradlew: Command failed with exit code 1 Error output: C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:84: error: cannot find symbol FirebasePlugin.applicationContext = this.getApplicationContext(); ^ symbol: method getApplicationContext() C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:196: error: no suitable constructor found for Intent(FirebasePluginMessagingService,Class<OnNotificationOpenReceiver>) Intent intent = new Intent(this, OnNotificationOpenReceiver.class); ^ constructor Intent.Intent(String,Uri) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to String) constructor Intent.Intent(Context,Class<?>) is not applicable (argument mismatch; FirebasePluginMessagingService cannot be converted to Context) C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:198: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context PendingIntent pendingIntent = PendingIntent.getBroadcast(this, id.hashCode(), intent, PendingIntent.FLAG_UPDATE_CURRENT); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:208: error: incompatible types: FirebasePluginMessagingService cannot be converted to Context NotificationCompat.Builder notificationBuilder = new NotificationCompat.Builder(this, channelId); ^ C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:225: error: cannot find symbol Uri soundPath = Uri.parse(ContentResolver.SCHEME_ANDROID_RESOURCE + "://" + getPackageName() + "/raw/" + sound); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:265: error: cannot find symbol int defaultSmallIconResID = getResources().getIdentifier(defaultSmallIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:268: error: cannot find symbol customSmallIconResID = getResources().getIdentifier(icon, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:279: error: cannot find symbol notificationBuilder.setSmallIcon(getApplicationInfo().icon); ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:283: error: cannot find symbol int defaultLargeIconResID = getResources().getIdentifier(defaultLargeIconName, "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:286: error: cannot find symbol customLargeIconResID = getResources().getIdentifier(icon+"_large", "drawable", getPackageName()); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:298: error: cannot find symbol largeIconResID = getApplicationInfo().icon; ^ symbol: method getApplicationInfo() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:300: error: cannot find symbol notificationBuilder.setLargeIcon(BitmapFactory.decodeResource(getApplicationContext().getResources(), largeIconResID)); ^ symbol: method getApplicationContext() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getPackageName() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:305: error: cannot find symbol int defaultColor = getResources().getColor(getResources().getIdentifier("accent", "color", getPackageName()), null); ^ symbol: method getResources() location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:336: error: cannot find symbol NotificationManager notificationManager = (NotificationManager) getSystemService(Context.NOTIFICATION_SERVICE); ^ symbol: method getSystemService(String) location: class FirebasePluginMessagingService C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\firebase\FirebasePluginMessagingService.java:341: error: cannot find symbol FirebasePlugin.sendMessage(bundle, this.getApplicationContext()); ^ symbol: method getApplicationContext() Note: Some input files use or override a deprecated API. Note: Recompile with -Xlint:deprecation for details. Note: C:\Users\Simon\Development\core\mobile-app\platforms\android\app\src\main\java\org\apache\cordova\file\AssetFilesystem.java uses unchecked or unsafe operations. Note: Recompile with -Xlint:unchecked for details. Note: Some messages have been simplified; recompile with -Xdiags:verbose to get full output 21 errors FAILURE: Build failed with an exception. * What went wrong: Execution failed for task ':app:compileReleaseJavaWithJavac'. > Compilation failed; see the compiler error output for details. * Try: Run with --stacktrace option to get the stack trace. Run with --info or --debug option to get more log output. Run with --scan to get full insights. * Get more help at https://help.gradle.org BUILD FAILED in 53s [ERROR] An error occurred while running subprocess cordova. cordova.cmd build android --release --buildConfig C:\Users\Simon\Development\cor... exited with exit code 1. Re-running this command with the --verbose flag may provide more information. ``` </details><br/><br/> <!-- A POLITE REMINDER - This is free, open-source software. - Although the author makes every effort to maintain it, no guarantees are made as to the quality or reliability, and reported issues will be addressed if and when the author has time. - Help/support will not be given by the author, so forums (e.g. Ionic) or Stack Overflow should be used. Any issues requesting help/support will be closed immediately. - If you have urgent need of a bug fix/feature, the author can be engaged for PAID contract work to do so: please contact dave@workingedge.co.uk - Rude or abusive comments/issues will not be tolerated, nor will opening multiple issues if those previously closed are deemed unsuitable. Any of the above will result in you being BANNED from ALL of my Github repositories. -->
non_priority
android build error important please read warning failure to follow the issue template guidelines below will result in the issue being immediately closed only bug reports should be opened here before opening an issue please do the following check a similar issue is not already open or closed against this plugin duplicates or near duplicates will be closed immediately try to reproduce the issue using the example project or if that s not possible using an isolated test project that you are able to share this will eliminate bugs in your code or conflicts with other code as possible causes of the issue any issue which is suspected of being caused by the ionic native wrapper should be ionic native typescript wrappers are maintained by the ionic team to verify an if an issue is caused by this plugin or its typescript wrapper please re test using the vanilla javascript plugin interface without the ionic native wrapper any issue opened here which is obviously an ionic typescript wrapper issue will be closed immediately bug report current behavior building on android throws compilation error that result in a failed build explain how you re sure there is an issue with this plugin rather than your own code if this plugin has an example project have you been able to reproduce the issue within it have you created a clean test cordova project containing only this plugin to eliminate the potential for interference with other plugins code after reverting from back to the build is ok again environment information cordova cli version cordova lib cordova platform version installed platforms android plugins versions installed in project including this plugin cordova custom config cordova custom config cordova plugin actionsheet actionsheet cordova plugin androidx cordova plugin androidx cordova plugin androidx adapter cordova plugin androidx adapter cordova plugin app update appupdate cordova plugin appversion app version cordova plugin camera camera cordova plugin device device cordova plugin dialogs notification cordova plugin email composer emailcomposer cordova plugin file file cordova plugin file file cordova plugin firebasex google firebase plugin cordova plugin geolocation geolocation cordova plugin ionic keyboard cordova plugin ionic keyboard cordova plugin ionic webview cordova plugin ionic webview cordova plugin ios disableshaketoedit ios disable shake to edit cordova plugin network information network information cordova plugin screen orientation screen orientation cordova plugin splashscreen splashscreen cordova plugin statusbar statusbar cordova plugin whitelist whitelist cordova sqlite storage cordova sqlite storage plugin cordova sqlite storage plugin version promise plugin promise uk co workingedge phonegap plugin launchnavigator launch navigator dev machine os and version e g windows win v android build issue node js version gradle version buildoutputcleanup vcs console output console output task app processreleaseresources c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol firebaseplugin applicationcontext this getapplicationcontext symbol method getapplicationcontext c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error no suitable constructor found for intent firebasepluginmessagingservice class intent intent new intent this onnotificationopenreceiver class constructor intent intent string uri is not applicable argument mismatch firebasepluginmessagingservice cannot be converted to string constructor intent intent context class is not applicable argument mismatch firebasepluginmessagingservice cannot be converted to context c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error incompatible types firebasepluginmessagingservice cannot be converted to context pendingintent pendingintent pendingintent getbroadcast this id hashcode intent pendingintent flag update current c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error incompatible types firebasepluginmessagingservice cannot be converted to context notificationcompat builder notificationbuilder new notificationcompat builder this channelid c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol uri soundpath uri parse contentresolver scheme android resource getpackagename raw sound symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultsmalliconresid getresources getidentifier defaultsmalliconname drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultsmalliconresid getresources getidentifier defaultsmalliconname drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customsmalliconresid getresources getidentifier icon drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customsmalliconresid getresources getidentifier icon drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol notificationbuilder setsmallicon getapplicationinfo icon symbol method getapplicationinfo location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultlargeiconresid getresources getidentifier defaultlargeiconname drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultlargeiconresid getresources getidentifier defaultlargeiconname drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customlargeiconresid getresources getidentifier icon large drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customlargeiconresid getresources getidentifier icon large drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol largeiconresid getapplicationinfo icon symbol method getapplicationinfo location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol notificationbuilder setlargeicon bitmapfactory decoderesource getapplicationcontext getresources largeiconresid symbol method getapplicationcontext location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultcolor getresources getcolor getresources getidentifier accent color getpackagename null symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultcolor getresources getcolor getresources getidentifier accent color getpackagename null symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultcolor getresources getcolor getresources getidentifier accent color getpackagename null symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol notificationmanager notificationmanager notificationmanager getsystemservice context notification service symbol method getsystemservice string location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol firebaseplugin sendmessage bundle this getapplicationcontext symbol method getapplicationcontext note some input files use or override a deprecated api note recompile with xlint deprecation for details note c users simon development core mobile app platforms android app src main java org apache cordova file assetfilesystem java uses unchecked or unsafe operations note recompile with xlint unchecked for details note some messages have been simplified recompile with xdiags verbose to get full output errors failure build failed with an exception what went wrong execution failed for task app compilereleasejavawithjavac compilation failed see the compiler error output for details try run with stacktrace option to get the stack trace run with info or debug option to get more log output run with scan to get full insights get more help at build failed in task app compilereleasejavawithjavac task app compilereleasejavawithjavac failed actionable tasks executed c users simon development core mobile app platforms android gradlew command failed with exit code error output c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol firebaseplugin applicationcontext this getapplicationcontext symbol method getapplicationcontext c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error no suitable constructor found for intent firebasepluginmessagingservice class intent intent new intent this onnotificationopenreceiver class constructor intent intent string uri is not applicable argument mismatch firebasepluginmessagingservice cannot be converted to string constructor intent intent context class is not applicable argument mismatch firebasepluginmessagingservice cannot be converted to context c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error incompatible types firebasepluginmessagingservice cannot be converted to context pendingintent pendingintent pendingintent getbroadcast this id hashcode intent pendingintent flag update current c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error incompatible types firebasepluginmessagingservice cannot be converted to context notificationcompat builder notificationbuilder new notificationcompat builder this channelid c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol uri soundpath uri parse contentresolver scheme android resource getpackagename raw sound symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultsmalliconresid getresources getidentifier defaultsmalliconname drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultsmalliconresid getresources getidentifier defaultsmalliconname drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customsmalliconresid getresources getidentifier icon drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customsmalliconresid getresources getidentifier icon drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol notificationbuilder setsmallicon getapplicationinfo icon symbol method getapplicationinfo location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultlargeiconresid getresources getidentifier defaultlargeiconname drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultlargeiconresid getresources getidentifier defaultlargeiconname drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customlargeiconresid getresources getidentifier icon large drawable getpackagename symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol customlargeiconresid getresources getidentifier icon large drawable getpackagename symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol largeiconresid getapplicationinfo icon symbol method getapplicationinfo location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol notificationbuilder setlargeicon bitmapfactory decoderesource getapplicationcontext getresources largeiconresid symbol method getapplicationcontext location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultcolor getresources getcolor getresources getidentifier accent color getpackagename null symbol method getpackagename location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultcolor getresources getcolor getresources getidentifier accent color getpackagename null symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol int defaultcolor getresources getcolor getresources getidentifier accent color getpackagename null symbol method getresources location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol notificationmanager notificationmanager notificationmanager getsystemservice context notification service symbol method getsystemservice string location class firebasepluginmessagingservice c users simon development core mobile app platforms android app src main java org apache cordova firebase firebasepluginmessagingservice java error cannot find symbol firebaseplugin sendmessage bundle this getapplicationcontext symbol method getapplicationcontext note some input files use or override a deprecated api note recompile with xlint deprecation for details note c users simon development core mobile app platforms android app src main java org apache cordova file assetfilesystem java uses unchecked or unsafe operations note recompile with xlint unchecked for details note some messages have been simplified recompile with xdiags verbose to get full output errors failure build failed with an exception what went wrong execution failed for task app compilereleasejavawithjavac compilation failed see the compiler error output for details try run with stacktrace option to get the stack trace run with info or debug option to get more log output run with scan to get full insights get more help at build failed in an error occurred while running subprocess cordova cordova cmd build android release buildconfig c users simon development cor exited with exit code re running this command with the verbose flag may provide more information a polite reminder this is free open source software although the author makes every effort to maintain it no guarantees are made as to the quality or reliability and reported issues will be addressed if and when the author has time help support will not be given by the author so forums e g ionic or stack overflow should be used any issues requesting help support will be closed immediately if you have urgent need of a bug fix feature the author can be engaged for paid contract work to do so please contact dave workingedge co uk rude or abusive comments issues will not be tolerated nor will opening multiple issues if those previously closed are deemed unsuitable any of the above will result in you being banned from all of my github repositories
0
80,545
30,335,029,123
IssuesEvent
2023-07-11 09:02:09
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
closed
Hitting insert on CIDER editor on mac puts editor into insert mode
T-Defect Z-Platform-Specific A-Composer
...by making the cursor a 1 character wide selection, thus overwriting the selected character when you press a key. This is pretty much a correct implementation of overwrite vs insert mode, but I did this by accident and it took someone else telling me what it was for me to realise what was happening. This is probably not a feature people expect in modern text entry and I don't think it's a feature we have intentionally.
1.0
Hitting insert on CIDER editor on mac puts editor into insert mode - ...by making the cursor a 1 character wide selection, thus overwriting the selected character when you press a key. This is pretty much a correct implementation of overwrite vs insert mode, but I did this by accident and it took someone else telling me what it was for me to realise what was happening. This is probably not a feature people expect in modern text entry and I don't think it's a feature we have intentionally.
non_priority
hitting insert on cider editor on mac puts editor into insert mode by making the cursor a character wide selection thus overwriting the selected character when you press a key this is pretty much a correct implementation of overwrite vs insert mode but i did this by accident and it took someone else telling me what it was for me to realise what was happening this is probably not a feature people expect in modern text entry and i don t think it s a feature we have intentionally
0
186,735
21,962,467,877
IssuesEvent
2022-05-24 17:00:13
jgeraigery/sql-maven-plugin
https://api.github.com/repos/jgeraigery/sql-maven-plugin
opened
CVE-2016-2510 (High) detected in bsh-2.0b4.jar
security vulnerability
## CVE-2016-2510 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bsh-2.0b4.jar</b></p></summary> <p>BeanShell</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh/2.0b4/bsh-2.0b4.jar</p> <p> Dependency Hierarchy: - maven-script-interpreter-1.1.jar (Root Library) - :x: **bsh-2.0b4.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. <p>Publish Date: 2016-04-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510>CVE-2016-2510</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p> <p>Release Date: 2016-04-07</p> <p>Fix Resolution: 2.0b6</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.beanshell","packageName":"bsh","packageVersion":"2.0b4","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.maven.shared:maven-script-interpreter:1.1;org.beanshell:bsh:2.0b4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0b6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-2510","vulnerabilityDetails":"BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2016-2510 (High) detected in bsh-2.0b4.jar - ## CVE-2016-2510 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bsh-2.0b4.jar</b></p></summary> <p>BeanShell</p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/beanshell/bsh/2.0b4/bsh-2.0b4.jar</p> <p> Dependency Hierarchy: - maven-script-interpreter-1.1.jar (Root Library) - :x: **bsh-2.0b4.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler. <p>Publish Date: 2016-04-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510>CVE-2016-2510</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-2510">https://nvd.nist.gov/vuln/detail/CVE-2016-2510</a></p> <p>Release Date: 2016-04-07</p> <p>Fix Resolution: 2.0b6</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.beanshell","packageName":"bsh","packageVersion":"2.0b4","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.maven.shared:maven-script-interpreter:1.1;org.beanshell:bsh:2.0b4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.0b6","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2016-2510","vulnerabilityDetails":"BeanShell (bsh) before 2.0b6, when included on the classpath by an application that uses Java serialization or XStream, allows remote attackers to execute arbitrary code via crafted serialized data, related to XThis.Handler.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-2510","cvss3Severity":"high","cvss3Score":"8.1","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in bsh jar cve high severity vulnerability vulnerable library bsh jar beanshell path to dependency file pom xml path to vulnerable library home wss scanner repository org beanshell bsh bsh jar dependency hierarchy maven script interpreter jar root library x bsh jar vulnerable library found in base branch master vulnerability details beanshell bsh before when included on the classpath by an application that uses java serialization or xstream allows remote attackers to execute arbitrary code via crafted serialized data related to xthis handler publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache maven shared maven script interpreter org beanshell bsh isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails beanshell bsh before when included on the classpath by an application that uses java serialization or xstream allows remote attackers to execute arbitrary code via crafted serialized data related to xthis handler vulnerabilityurl
0
122,367
16,107,656,142
IssuesEvent
2021-04-27 16:47:18
PrismLibrary/Prism
https://api.github.com/repos/PrismLibrary/Prism
closed
[Bug] XAML navigation forces button to take the default text color
By Design
### Description The Prism XAML navigation forces button to take the default text color before the navigated page is shown. However the navigation via binded command works as expected without changing the color (see gif animation below). ### Steps to Reproduce 1. Set Android default text color **styles.xml** ```xml <style name="MainTheme" parent="MainTheme.Base"> <item name="android:textColor">#FFFF0000</item> </style> ``` 2. Create two button to navigate **MainPage.xaml** ```xaml <Button Text="ExpectedNavigationBehavior" FontAttributes="Bold" TextColor="Gray" BackgroundColor="Black" Command="{Binding ExpectedNavigationBehaviorCommand}" /> <Button Text="ProblemNavigationBehavior" FontAttributes="Bold" TextColor="Gray" BackgroundColor="Black" Command="{prism:NavigateTo Name=PageToNavigate}" /> ``` **MainPageViewModel.cs** ```csharp private DelegateCommand _expectedNavigationBehaviorCommand; public DelegateCommand ExpectedNavigationBehaviorCommand => _expectedNavigationBehaviorCommand ?? (_expectedNavigationBehaviorCommand = new DelegateCommand(ExpectedNavigationBehavior)); private async void ExpectedNavigationBehavior() { await NavigationService.NavigateAsync("PageToNavigate"); } ``` 3. Click those buttons and notice visual behavior. ### Expected Behavior The "ProblemNavigationBehavior" button **MUST NOT** change its text color to default (currently red) right before navigation happens. ### Actual Behavior The "ProblemNavigationBehavior" button changes its text color. ### Basic Information - Version with issue: 8.0.0.1909 - Last known good version: - - Xamarin.Forms version: 5.0.0.2012 - IDE: Visual Studio Community 2019 (Version 16.9.4) ### Screenshots ![2021-04-17_14-05-54](https://user-images.githubusercontent.com/21317790/115111051-1401dd80-9f87-11eb-84ee-49ad8909fe18.gif) On the gif animation you could see that "ProblemNavigationBehavior" button text becomes red for a moment before navigation. ### Reproduction Link https://github.com/Tum4ik/prism-xaml-navigation-problem
1.0
[Bug] XAML navigation forces button to take the default text color - ### Description The Prism XAML navigation forces button to take the default text color before the navigated page is shown. However the navigation via binded command works as expected without changing the color (see gif animation below). ### Steps to Reproduce 1. Set Android default text color **styles.xml** ```xml <style name="MainTheme" parent="MainTheme.Base"> <item name="android:textColor">#FFFF0000</item> </style> ``` 2. Create two button to navigate **MainPage.xaml** ```xaml <Button Text="ExpectedNavigationBehavior" FontAttributes="Bold" TextColor="Gray" BackgroundColor="Black" Command="{Binding ExpectedNavigationBehaviorCommand}" /> <Button Text="ProblemNavigationBehavior" FontAttributes="Bold" TextColor="Gray" BackgroundColor="Black" Command="{prism:NavigateTo Name=PageToNavigate}" /> ``` **MainPageViewModel.cs** ```csharp private DelegateCommand _expectedNavigationBehaviorCommand; public DelegateCommand ExpectedNavigationBehaviorCommand => _expectedNavigationBehaviorCommand ?? (_expectedNavigationBehaviorCommand = new DelegateCommand(ExpectedNavigationBehavior)); private async void ExpectedNavigationBehavior() { await NavigationService.NavigateAsync("PageToNavigate"); } ``` 3. Click those buttons and notice visual behavior. ### Expected Behavior The "ProblemNavigationBehavior" button **MUST NOT** change its text color to default (currently red) right before navigation happens. ### Actual Behavior The "ProblemNavigationBehavior" button changes its text color. ### Basic Information - Version with issue: 8.0.0.1909 - Last known good version: - - Xamarin.Forms version: 5.0.0.2012 - IDE: Visual Studio Community 2019 (Version 16.9.4) ### Screenshots ![2021-04-17_14-05-54](https://user-images.githubusercontent.com/21317790/115111051-1401dd80-9f87-11eb-84ee-49ad8909fe18.gif) On the gif animation you could see that "ProblemNavigationBehavior" button text becomes red for a moment before navigation. ### Reproduction Link https://github.com/Tum4ik/prism-xaml-navigation-problem
non_priority
xaml navigation forces button to take the default text color description the prism xaml navigation forces button to take the default text color before the navigated page is shown however the navigation via binded command works as expected without changing the color see gif animation below steps to reproduce set android default text color styles xml xml create two button to navigate mainpage xaml xaml button text expectednavigationbehavior fontattributes bold textcolor gray backgroundcolor black command binding expectednavigationbehaviorcommand button text problemnavigationbehavior fontattributes bold textcolor gray backgroundcolor black command prism navigateto name pagetonavigate mainpageviewmodel cs csharp private delegatecommand expectednavigationbehaviorcommand public delegatecommand expectednavigationbehaviorcommand expectednavigationbehaviorcommand expectednavigationbehaviorcommand new delegatecommand expectednavigationbehavior private async void expectednavigationbehavior await navigationservice navigateasync pagetonavigate click those buttons and notice visual behavior expected behavior the problemnavigationbehavior button must not change its text color to default currently red right before navigation happens actual behavior the problemnavigationbehavior button changes its text color basic information version with issue last known good version xamarin forms version ide visual studio community version screenshots on the gif animation you could see that problemnavigationbehavior button text becomes red for a moment before navigation reproduction link
0
9,178
6,153,041,744
IssuesEvent
2017-06-28 08:58:34
Virtual-Labs/soil-mechanics-and-foundation-engineering-iiith
https://api.github.com/repos/Virtual-Labs/soil-mechanics-and-foundation-engineering-iiith
closed
QA_soil-mechanics_Water Content Experiment_Experiment_Irrelevant-text
Category: Usability Developed By: VLEAD openedx-issue Resolved Severity: S3 Status: Open
Defect Description : In the Experiment section of "Water Content Experiment" - (Go to Virtual lab on Water Content Experiment(Click here))experiment, the given text is irrelevant to this experiment. Refer the attachment for details. Actual Result : In the Experiment section of "Water Content Experiment" - (Go to Virtual lab on Water Content Experiment(Click here))experiment, the given text is irrelevant to this experiment. Refer the attachment for details. Environment : OS: Windows 7, Ubuntu-16.04, Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM, Processor:i5 Attachments: ![qa_oe_sm_i05](https://cloud.githubusercontent.com/assets/13479177/26443413/ee658100-4155-11e7-8ccb-f5cf418ba265.png)
True
QA_soil-mechanics_Water Content Experiment_Experiment_Irrelevant-text - Defect Description : In the Experiment section of "Water Content Experiment" - (Go to Virtual lab on Water Content Experiment(Click here))experiment, the given text is irrelevant to this experiment. Refer the attachment for details. Actual Result : In the Experiment section of "Water Content Experiment" - (Go to Virtual lab on Water Content Experiment(Click here))experiment, the given text is irrelevant to this experiment. Refer the attachment for details. Environment : OS: Windows 7, Ubuntu-16.04, Centos-6 Browsers: Firefox-42.0,Chrome-47.0,chromium-45.0 Bandwidth : 100Mbps Hardware Configuration:8GBRAM, Processor:i5 Attachments: ![qa_oe_sm_i05](https://cloud.githubusercontent.com/assets/13479177/26443413/ee658100-4155-11e7-8ccb-f5cf418ba265.png)
non_priority
qa soil mechanics water content experiment experiment irrelevant text defect description in the experiment section of water content experiment go to virtual lab on water content experiment click here experiment the given text is irrelevant to this experiment refer the attachment for details actual result in the experiment section of water content experiment go to virtual lab on water content experiment click here experiment the given text is irrelevant to this experiment refer the attachment for details environment os windows ubuntu centos browsers firefox chrome chromium bandwidth hardware configuration processor attachments
0
406,834
27,584,417,428
IssuesEvent
2023-03-08 18:33:25
eiwosstdma/mtg-scraper
https://api.github.com/repos/eiwosstdma/mtg-scraper
opened
Documentation: Adding an example using SQLite
documentation enhancement good first issue
Need to implement a new example using the parser/sqlite in the examples folders with tiny explanation.
1.0
Documentation: Adding an example using SQLite - Need to implement a new example using the parser/sqlite in the examples folders with tiny explanation.
non_priority
documentation adding an example using sqlite need to implement a new example using the parser sqlite in the examples folders with tiny explanation
0
32,294
7,525,662,314
IssuesEvent
2018-04-13 11:24:51
fga-gpp-mds/2018.1-Dr-Down
https://api.github.com/repos/fga-gpp-mds/2018.1-Dr-Down
closed
US51 - Fórum
US backend code feature mds
Eu, como usuário, cadastrado gostaria de acessar o fórum a fim de ler ou fazer uma postagem. Eu, como visitante do site, gostaria APENAS de ler os posts do fórum. - Qualquer usuário pode ler o fórum - Para comentar no fórum o usuário precisa ser cadastrado - O post precisa de assunto - Categorias predefinidas - Criar um grupo moderador - O usuário cadastrado pode postar, editar e deletar(Ele só pode deletar o próprio post e editar também). - O usuário cadastrado pode comentar, editar o comentário e deletar(se for o comentário dele) - Precisa de hora e data da postagem.
1.0
US51 - Fórum - Eu, como usuário, cadastrado gostaria de acessar o fórum a fim de ler ou fazer uma postagem. Eu, como visitante do site, gostaria APENAS de ler os posts do fórum. - Qualquer usuário pode ler o fórum - Para comentar no fórum o usuário precisa ser cadastrado - O post precisa de assunto - Categorias predefinidas - Criar um grupo moderador - O usuário cadastrado pode postar, editar e deletar(Ele só pode deletar o próprio post e editar também). - O usuário cadastrado pode comentar, editar o comentário e deletar(se for o comentário dele) - Precisa de hora e data da postagem.
non_priority
fórum eu como usuário cadastrado gostaria de acessar o fórum a fim de ler ou fazer uma postagem eu como visitante do site gostaria apenas de ler os posts do fórum qualquer usuário pode ler o fórum para comentar no fórum o usuário precisa ser cadastrado o post precisa de assunto categorias predefinidas criar um grupo moderador o usuário cadastrado pode postar editar e deletar ele só pode deletar o próprio post e editar também o usuário cadastrado pode comentar editar o comentário e deletar se for o comentário dele precisa de hora e data da postagem
0
30,907
8,621,681,738
IssuesEvent
2018-11-20 18:01:23
QuantEcon/lecture-source-jl
https://api.github.com/repos/QuantEcon/lecture-source-jl
closed
Clicking "Download Notebook" on the Julia Getting started gave the python one
build-infrastructure
Go to http://compare-lectures.quantecon.org/jl/getting_started.html# You will noteice that the "jupyter notebook download" button has http://compare-lectures.quantecon.org/_downloads/ipynb/jl/getting_started.ipynb as the URL. I think this downloads the python one, though we should verify.
1.0
Clicking "Download Notebook" on the Julia Getting started gave the python one - Go to http://compare-lectures.quantecon.org/jl/getting_started.html# You will noteice that the "jupyter notebook download" button has http://compare-lectures.quantecon.org/_downloads/ipynb/jl/getting_started.ipynb as the URL. I think this downloads the python one, though we should verify.
non_priority
clicking download notebook on the julia getting started gave the python one go to you will noteice that the jupyter notebook download button has as the url i think this downloads the python one though we should verify
0
181,353
14,016,912,598
IssuesEvent
2020-10-29 15:03:25
nspcc-dev/neo-go
https://api.github.com/repos/nspcc-dev/neo-go
opened
Test and fix NextConsensus update problem
consensus test
We need a test for neo-project/neo#2015 (somewhere in `consensus`, add a voting transaction and then check to see that `NextConsensus is updated when needed) and a fix if we do have the same problem.
1.0
Test and fix NextConsensus update problem - We need a test for neo-project/neo#2015 (somewhere in `consensus`, add a voting transaction and then check to see that `NextConsensus is updated when needed) and a fix if we do have the same problem.
non_priority
test and fix nextconsensus update problem we need a test for neo project neo somewhere in consensus add a voting transaction and then check to see that nextconsensus is updated when needed and a fix if we do have the same problem
0
174,230
21,259,384,184
IssuesEvent
2022-04-13 01:16:10
n-devs/testTungTonScript
https://api.github.com/repos/n-devs/testTungTonScript
opened
CVE-2021-3749 (High) detected in axios-0.16.2.tgz
security vulnerability
## CVE-2021-3749 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axios-0.16.2.tgz</b></p></summary> <p>Promise based HTTP client for the browser and node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.16.2.tgz">https://registry.npmjs.org/axios/-/axios-0.16.2.tgz</a></p> <p>Path to dependency file: /testTungTonScript/package.json</p> <p>Path to vulnerable library: /node_modules/axios/package.json</p> <p> Dependency Hierarchy: - react-native-scripts-1.13.1.tgz (Root Library) - xdl-48.1.4.tgz - :x: **axios-0.16.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> axios is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749>CVE-2021-3749</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/">https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: axios - 0.21.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3749 (High) detected in axios-0.16.2.tgz - ## CVE-2021-3749 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>axios-0.16.2.tgz</b></p></summary> <p>Promise based HTTP client for the browser and node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/axios/-/axios-0.16.2.tgz">https://registry.npmjs.org/axios/-/axios-0.16.2.tgz</a></p> <p>Path to dependency file: /testTungTonScript/package.json</p> <p>Path to vulnerable library: /node_modules/axios/package.json</p> <p> Dependency Hierarchy: - react-native-scripts-1.13.1.tgz (Root Library) - xdl-48.1.4.tgz - :x: **axios-0.16.2.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> axios is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-08-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3749>CVE-2021-3749</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/">https://huntr.dev/bounties/1e8f07fc-c384-4ff9-8498-0690de2e8c31/</a></p> <p>Release Date: 2021-08-31</p> <p>Fix Resolution: axios - 0.21.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in axios tgz cve high severity vulnerability vulnerable library axios tgz promise based http client for the browser and node js library home page a href path to dependency file testtungtonscript package json path to vulnerable library node modules axios package json dependency hierarchy react native scripts tgz root library xdl tgz x axios tgz vulnerable library vulnerability details axios is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution axios step up your open source security game with whitesource
0
91,004
26,243,188,072
IssuesEvent
2023-01-05 13:16:03
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
closed
ncdu 2.2.1 on darwin in 22.11 channel
0.kind: build failure
### Steps To Reproduce Steps to reproduce the behavior: 1. build ncdu ### Build log ``` error(compilation): clang failed with stderr: /private/tmp/nix-build-ncdu-2.2.1.drv-0/ncdu-2.2.1/src/ncurses_refs.c:5:10: fatal error: 'curses.h' file not found ... ./src/main.zig:14:11: error: C import failed const c = @cImport(@cInclude("locale.h")); ``` ### Notify maintainers @pSub @SuperSandro2000 ### Metadata Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result. ```console - system: `"x86_64-darwin"` - host os: `Darwin 21.6.0, macOS 10.16` - multi-user?: `yes` - sandbox: `no` - version: `nix-env (Nix) 2.8.1` - channels(viraptor): `"home-manager-21.11.tar.gz, nixpkgs-22.11-darwin, unstable"` - channels(root): `"nixpkgs-22.11-darwin"` - nixpkgs: `/Users/viraptor/.nix-defexpr/channels/nixpkgs````
1.0
ncdu 2.2.1 on darwin in 22.11 channel - ### Steps To Reproduce Steps to reproduce the behavior: 1. build ncdu ### Build log ``` error(compilation): clang failed with stderr: /private/tmp/nix-build-ncdu-2.2.1.drv-0/ncdu-2.2.1/src/ncurses_refs.c:5:10: fatal error: 'curses.h' file not found ... ./src/main.zig:14:11: error: C import failed const c = @cImport(@cInclude("locale.h")); ``` ### Notify maintainers @pSub @SuperSandro2000 ### Metadata Please run `nix-shell -p nix-info --run "nix-info -m"` and paste the result. ```console - system: `"x86_64-darwin"` - host os: `Darwin 21.6.0, macOS 10.16` - multi-user?: `yes` - sandbox: `no` - version: `nix-env (Nix) 2.8.1` - channels(viraptor): `"home-manager-21.11.tar.gz, nixpkgs-22.11-darwin, unstable"` - channels(root): `"nixpkgs-22.11-darwin"` - nixpkgs: `/Users/viraptor/.nix-defexpr/channels/nixpkgs````
non_priority
ncdu on darwin in channel steps to reproduce steps to reproduce the behavior build ncdu build log error compilation clang failed with stderr private tmp nix build ncdu drv ncdu src ncurses refs c fatal error curses h file not found src main zig error c import failed const c cimport cinclude locale h notify maintainers psub metadata please run nix shell p nix info run nix info m and paste the result console system darwin host os darwin macos multi user yes sandbox no version nix env nix channels viraptor home manager tar gz nixpkgs darwin unstable channels root nixpkgs darwin nixpkgs users viraptor nix defexpr channels nixpkgs
0
289,293
21,778,460,428
IssuesEvent
2022-05-13 16:01:22
DJBarnes/django-adminlte-2
https://api.github.com/repos/DJBarnes/django-adminlte-2
opened
Documentation or Bug: Menu section that is only a title with no nodes does not render.
bug documentation
If making a section in the menu that does not define any nodes, but does contain a title, the title will not be rendered out. Either the documentation needs to be updated to be clear that nothing will render without a title, or this is a bug that needs to be fixed so that you can render out just a title.
1.0
Documentation or Bug: Menu section that is only a title with no nodes does not render. - If making a section in the menu that does not define any nodes, but does contain a title, the title will not be rendered out. Either the documentation needs to be updated to be clear that nothing will render without a title, or this is a bug that needs to be fixed so that you can render out just a title.
non_priority
documentation or bug menu section that is only a title with no nodes does not render if making a section in the menu that does not define any nodes but does contain a title the title will not be rendered out either the documentation needs to be updated to be clear that nothing will render without a title or this is a bug that needs to be fixed so that you can render out just a title
0
98,299
11,053,633,945
IssuesEvent
2019-12-10 11:48:41
magento/pwa-studio
https://api.github.com/repos/magento/pwa-studio
opened
[doc]: Production PWA Studio Performance Optimization
documentation
Hi, i try to find a good documentation for performance related configs and optimization needed when using PWA studio, the points which i am ( and maybe others ) not sure about similar to some settings of magento which i dont know if it does affect PWA performance or not like : - Full Page Cache and other types of caching. - Running Magento in Developer or production modes - Server Side Optimization and settings to improve a production PWA Studio Performance related to node.js and PM2 . Thanks!
1.0
[doc]: Production PWA Studio Performance Optimization - Hi, i try to find a good documentation for performance related configs and optimization needed when using PWA studio, the points which i am ( and maybe others ) not sure about similar to some settings of magento which i dont know if it does affect PWA performance or not like : - Full Page Cache and other types of caching. - Running Magento in Developer or production modes - Server Side Optimization and settings to improve a production PWA Studio Performance related to node.js and PM2 . Thanks!
non_priority
production pwa studio performance optimization hi i try to find a good documentation for performance related configs and optimization needed when using pwa studio the points which i am and maybe others not sure about similar to some settings of magento which i dont know if it does affect pwa performance or not like full page cache and other types of caching running magento in developer or production modes server side optimization and settings to improve a production pwa studio performance related to node js and thanks
0
8,711
3,783,385,705
IssuesEvent
2016-03-19 03:34:25
HeavensGate/Eternal
https://api.github.com/repos/HeavensGate/Eternal
reopened
Gamemode changes
code discuss/uncertain help wanted longterm spriting
Remove wizard and mutin from all pulls and votes, add vampire and meme. Discuss.
1.0
Gamemode changes - Remove wizard and mutin from all pulls and votes, add vampire and meme. Discuss.
non_priority
gamemode changes remove wizard and mutin from all pulls and votes add vampire and meme discuss
0
58,595
7,164,546,609
IssuesEvent
2018-01-29 11:37:14
otavanopisto/muikku
https://api.github.com/repos/otavanopisto/muikku
closed
Avatar classes refactored to a new scss
REDESIGN2017 in progress
Avatars exist outside of the application-list, so they should be refactored. Will be done in the guider branch.
1.0
Avatar classes refactored to a new scss - Avatars exist outside of the application-list, so they should be refactored. Will be done in the guider branch.
non_priority
avatar classes refactored to a new scss avatars exist outside of the application list so they should be refactored will be done in the guider branch
0
360,945
25,317,849,722
IssuesEvent
2022-11-17 23:36:00
PGMDev/Website
https://api.github.com/repos/PGMDev/Website
closed
Control point recovery rate defaults
documentation
The default recovery-rate and decay-rate for control points is defined by the incremental flag. Even if deprecated, incremental = true/false still defines the other rates. If incremental is true, recovery rate is 1, decay rate is 0, and owned-decay-rate is also 0 If incremental is false, recovery rate and decay rate are both infinite, and owned-decay-rate is 0 Additionally, the explanations on recovery-rate and decay-rate are a bit lacking, it should say that both recovery-rate and decay-rate apply when a point is naturally going back to its current state, and one applies when the owner team is dominating (having their players on the point) while the other applies when no one is dominating (either multiple teams or no team), and that capture rules are what determine this
1.0
Control point recovery rate defaults - The default recovery-rate and decay-rate for control points is defined by the incremental flag. Even if deprecated, incremental = true/false still defines the other rates. If incremental is true, recovery rate is 1, decay rate is 0, and owned-decay-rate is also 0 If incremental is false, recovery rate and decay rate are both infinite, and owned-decay-rate is 0 Additionally, the explanations on recovery-rate and decay-rate are a bit lacking, it should say that both recovery-rate and decay-rate apply when a point is naturally going back to its current state, and one applies when the owner team is dominating (having their players on the point) while the other applies when no one is dominating (either multiple teams or no team), and that capture rules are what determine this
non_priority
control point recovery rate defaults the default recovery rate and decay rate for control points is defined by the incremental flag even if deprecated incremental true false still defines the other rates if incremental is true recovery rate is decay rate is and owned decay rate is also if incremental is false recovery rate and decay rate are both infinite and owned decay rate is additionally the explanations on recovery rate and decay rate are a bit lacking it should say that both recovery rate and decay rate apply when a point is naturally going back to its current state and one applies when the owner team is dominating having their players on the point while the other applies when no one is dominating either multiple teams or no team and that capture rules are what determine this
0
3,119
2,658,326,080
IssuesEvent
2015-03-18 15:04:44
Semantic-Org/Semantic-UI
https://api.github.com/repos/Semantic-Org/Semantic-UI
closed
Dropdown on a right item menu, cover the item
Needs Test Case Read the Readme
When dropdown is used on a right item menu, it cover the item. I tried with position:relative but nothing changes. ``` <div class="ui right pointing dropdown link item"> <i class="dropdown icon"></i> <span class="text">User Menu</span> <div class="menu"> <a href="#" class="item"> <i class="home icon"></i>Profile </a> </div> </div> ```
1.0
Dropdown on a right item menu, cover the item - When dropdown is used on a right item menu, it cover the item. I tried with position:relative but nothing changes. ``` <div class="ui right pointing dropdown link item"> <i class="dropdown icon"></i> <span class="text">User Menu</span> <div class="menu"> <a href="#" class="item"> <i class="home icon"></i>Profile </a> </div> </div> ```
non_priority
dropdown on a right item menu cover the item when dropdown is used on a right item menu it cover the item i tried with position relative but nothing changes user menu profile
0
319,173
27,354,274,281
IssuesEvent
2023-02-27 11:45:26
astronomer/astronomer-providers
https://api.github.com/repos/astronomer/astronomer-providers
closed
Fix Microsoft Azure Provider example DAG to run ADF pipeline
bug testing
On the new Astronomer Validation org deployment, the ADF DAG fails with the below error: ``` [2023-02-22, 07:56:55 UTC] {standard_task_runner.py:83} INFO - Job 5912: Subtask run_pipeline_wait [2023-02-22, 07:56:55 UTC] {task_command.py:388} INFO - Running <TaskInstance: example_async_adf_run_pipeline.run_pipeline_wait manual__2023-02-22T07:54:24.179097+00:00 [running]> on host 172.20.21.95 [2023-02-22, 07:56:55 UTC] {taskinstance.py:1768} ERROR - Task failed with exception Traceback (most recent call last): File "/usr/local/lib/python3.9/site-packages/astronomer/providers/microsoft/azure/operators/data_factory.py", line 86, in execute_complete raise AirflowException(event["message"]) airflow.exceptions.AirflowException: A Subscription ID is required to connect to Azure Data Factory. [2023-02-22, 07:56:55 UTC] {taskinstance.py:1318} INFO - Marking task as FAILED. dag_id=example_async_adf_run_pipeline, task_id=run_pipeline_wait, execution_date=20230222T075424, start_date=20230222T075650, end_date=20230222T075655 [2023-02-22, 07:56:55 UTC] {manager.py:61} WARNING - Unable to find an extractor. task_type=AzureDataFactoryRunPipelineOperatorAsync airflow_dag_id=example_async_adf_run_pipeline task_id=run_pipeline_wait airflow_run_id=manual__2023-02-22T07:54:24.179097+00:00 ```
1.0
Fix Microsoft Azure Provider example DAG to run ADF pipeline - On the new Astronomer Validation org deployment, the ADF DAG fails with the below error: ``` [2023-02-22, 07:56:55 UTC] {standard_task_runner.py:83} INFO - Job 5912: Subtask run_pipeline_wait [2023-02-22, 07:56:55 UTC] {task_command.py:388} INFO - Running <TaskInstance: example_async_adf_run_pipeline.run_pipeline_wait manual__2023-02-22T07:54:24.179097+00:00 [running]> on host 172.20.21.95 [2023-02-22, 07:56:55 UTC] {taskinstance.py:1768} ERROR - Task failed with exception Traceback (most recent call last): File "/usr/local/lib/python3.9/site-packages/astronomer/providers/microsoft/azure/operators/data_factory.py", line 86, in execute_complete raise AirflowException(event["message"]) airflow.exceptions.AirflowException: A Subscription ID is required to connect to Azure Data Factory. [2023-02-22, 07:56:55 UTC] {taskinstance.py:1318} INFO - Marking task as FAILED. dag_id=example_async_adf_run_pipeline, task_id=run_pipeline_wait, execution_date=20230222T075424, start_date=20230222T075650, end_date=20230222T075655 [2023-02-22, 07:56:55 UTC] {manager.py:61} WARNING - Unable to find an extractor. task_type=AzureDataFactoryRunPipelineOperatorAsync airflow_dag_id=example_async_adf_run_pipeline task_id=run_pipeline_wait airflow_run_id=manual__2023-02-22T07:54:24.179097+00:00 ```
non_priority
fix microsoft azure provider example dag to run adf pipeline on the new astronomer validation org deployment the adf dag fails with the below error standard task runner py info job subtask run pipeline wait task command py info running on host taskinstance py error task failed with exception traceback most recent call last file usr local lib site packages astronomer providers microsoft azure operators data factory py line in execute complete raise airflowexception event airflow exceptions airflowexception a subscription id is required to connect to azure data factory taskinstance py info marking task as failed dag id example async adf run pipeline task id run pipeline wait execution date start date end date manager py warning unable to find an extractor task type azuredatafactoryrunpipelineoperatorasync airflow dag id example async adf run pipeline task id run pipeline wait airflow run id manual
0
50,071
21,006,614,321
IssuesEvent
2022-03-29 23:31:56
BCDevOps/developer-experience
https://api.github.com/repos/BCDevOps/developer-experience
closed
Investigate Technical Requirements for Grafana Operator
team/DXC ops and shared services
**Describe the issue** Per the cluster status page in CLAB, The current version/channel of Grafana Operator is not going to be compatible with Openshift 4.9, thus the operator will need an upgrade prior to Openshift being upgraded. This likely coincides with how the Grafana Operator pod is currently using deprecated API calls that need to be fixed. While it's quite possible and likely that Grafana Operator will receive an update via the current channel, we do want to perform an upgrade via channel switch so that we're getting a newer overall version of Grafana. There is now a `v4` channel which was attempted during earlier upgrade efforts for CLAB to 4.8, but determined to need more time to figure out completely than we were willing to allot time for at at the time. **Additional context** Add any other context, attachments or screenshots **Definition of done** - [x] Investigate technical requirements and dependencies to determine if native CCM update will cover this or if intervention will be required. - [x] Test upgrades in CLAB - [x] Confirm upgrade in KLAB - [x] Perform upgrade in SILVER - [x] Perform upgrade in GOLD - [x] Perform upgrade in GOLDDR
1.0
Investigate Technical Requirements for Grafana Operator - **Describe the issue** Per the cluster status page in CLAB, The current version/channel of Grafana Operator is not going to be compatible with Openshift 4.9, thus the operator will need an upgrade prior to Openshift being upgraded. This likely coincides with how the Grafana Operator pod is currently using deprecated API calls that need to be fixed. While it's quite possible and likely that Grafana Operator will receive an update via the current channel, we do want to perform an upgrade via channel switch so that we're getting a newer overall version of Grafana. There is now a `v4` channel which was attempted during earlier upgrade efforts for CLAB to 4.8, but determined to need more time to figure out completely than we were willing to allot time for at at the time. **Additional context** Add any other context, attachments or screenshots **Definition of done** - [x] Investigate technical requirements and dependencies to determine if native CCM update will cover this or if intervention will be required. - [x] Test upgrades in CLAB - [x] Confirm upgrade in KLAB - [x] Perform upgrade in SILVER - [x] Perform upgrade in GOLD - [x] Perform upgrade in GOLDDR
non_priority
investigate technical requirements for grafana operator describe the issue per the cluster status page in clab the current version channel of grafana operator is not going to be compatible with openshift thus the operator will need an upgrade prior to openshift being upgraded this likely coincides with how the grafana operator pod is currently using deprecated api calls that need to be fixed while it s quite possible and likely that grafana operator will receive an update via the current channel we do want to perform an upgrade via channel switch so that we re getting a newer overall version of grafana there is now a channel which was attempted during earlier upgrade efforts for clab to but determined to need more time to figure out completely than we were willing to allot time for at at the time additional context add any other context attachments or screenshots definition of done investigate technical requirements and dependencies to determine if native ccm update will cover this or if intervention will be required test upgrades in clab confirm upgrade in klab perform upgrade in silver perform upgrade in gold perform upgrade in golddr
0
32,748
13,924,849,379
IssuesEvent
2020-10-21 16:03:48
terraform-providers/terraform-provider-aws
https://api.github.com/repos/terraform-providers/terraform-provider-aws
closed
aws_glue_catalog_table.ser_de_info.name is documented as optional, but fails if not specified
bug service/glue
### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment ### Terraform Version Terraform v0.12.24 + provider.aws v2.54.0 ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_glue_catalog_table.ser_de_info.name ### Issue The name field of ser_de_info is documented as being optional, but if it is not specified, and error is given when attempting to apply ``` Error: Error updating Glue Catalog Table: InvalidParameter: 1 validation error(s) found. - minimum field size of 1, UpdateTableInput.TableInput.StorageDescriptor.SerdeInfo.Name. ``` Looks like it's trying to set name to `""` instead of `null` like it says it's going to do in the diff ``` ~ ser_de_info { - name = "testName" -> null parameters = { "serialization.format" = "1" } serialization_library = "org.apache.hadoop.hive.ql.io.parquet.serde.ParquetHiveSerDe" } ``` ### References ser_de_info name - (Optional) Name of the SerDe. https://www.terraform.io/docs/providers/aws/r/glue_catalog_table.html#ser_de_info
1.0
aws_glue_catalog_table.ser_de_info.name is documented as optional, but fails if not specified - ### Community Note * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the community and maintainers prioritize this request * Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request * If you are interested in working on this issue or have submitted a pull request, please leave a comment ### Terraform Version Terraform v0.12.24 + provider.aws v2.54.0 ### Affected Resource(s) <!--- Please list the affected resources and data sources. ---> * aws_glue_catalog_table.ser_de_info.name ### Issue The name field of ser_de_info is documented as being optional, but if it is not specified, and error is given when attempting to apply ``` Error: Error updating Glue Catalog Table: InvalidParameter: 1 validation error(s) found. - minimum field size of 1, UpdateTableInput.TableInput.StorageDescriptor.SerdeInfo.Name. ``` Looks like it's trying to set name to `""` instead of `null` like it says it's going to do in the diff ``` ~ ser_de_info { - name = "testName" -> null parameters = { "serialization.format" = "1" } serialization_library = "org.apache.hadoop.hive.ql.io.parquet.serde.ParquetHiveSerDe" } ``` ### References ser_de_info name - (Optional) Name of the SerDe. https://www.terraform.io/docs/providers/aws/r/glue_catalog_table.html#ser_de_info
non_priority
aws glue catalog table ser de info name is documented as optional but fails if not specified community note please vote on this issue by adding a 👍 to the original issue to help the community and maintainers prioritize this request please do not leave or other comments that do not add relevant new information or questions they generate extra noise for issue followers and do not help prioritize the request if you are interested in working on this issue or have submitted a pull request please leave a comment terraform version terraform provider aws affected resource s aws glue catalog table ser de info name issue the name field of ser de info is documented as being optional but if it is not specified and error is given when attempting to apply error error updating glue catalog table invalidparameter validation error s found minimum field size of updatetableinput tableinput storagedescriptor serdeinfo name looks like it s trying to set name to instead of null like it says it s going to do in the diff ser de info name testname null parameters serialization format serialization library org apache hadoop hive ql io parquet serde parquethiveserde references ser de info name optional name of the serde
0
8,972
7,753,348,761
IssuesEvent
2018-05-31 00:06:24
dotnet/roslyn
https://api.github.com/repos/dotnet/roslyn
closed
Failed windows_debug_es_unit32_prtest
Area-Infrastructure
In PR #25565 `windows_debug_es_unit32_prtest` fails, but I am unable to access it to see why. The link on jenkins says `Not Found`.
1.0
Failed windows_debug_es_unit32_prtest - In PR #25565 `windows_debug_es_unit32_prtest` fails, but I am unable to access it to see why. The link on jenkins says `Not Found`.
non_priority
failed windows debug es prtest in pr windows debug es prtest fails but i am unable to access it to see why the link on jenkins says not found
0
344,356
24,810,182,548
IssuesEvent
2022-10-25 08:48:51
rancher/elemental
https://api.github.com/repos/rancher/elemental
closed
Docs: Elemental community release
kind/documentation kind/epic
While we have all the functional pieces working, noone from the community can consume the great work the team has done in the last 2-3 weeks. Let's share our achievement with the community and enable them to use the "new" elemental stack overhaul of rancher.github.io/elemental (written descending priority) - [x] #235 - [x] #237 - [x] #236 - [x] #241 - [x] #244 - [x] #242 - [x] #243 - [x] #240 - [x] #239 - [x] #224 - [ ] Clarify what en Elemental release encompasses, which are the artifacts, where they are, etc. Related to #193 Goal: Have someone from the community deploy an Elemental cluster (single node k3s is sufficient)
1.0
Docs: Elemental community release - While we have all the functional pieces working, noone from the community can consume the great work the team has done in the last 2-3 weeks. Let's share our achievement with the community and enable them to use the "new" elemental stack overhaul of rancher.github.io/elemental (written descending priority) - [x] #235 - [x] #237 - [x] #236 - [x] #241 - [x] #244 - [x] #242 - [x] #243 - [x] #240 - [x] #239 - [x] #224 - [ ] Clarify what en Elemental release encompasses, which are the artifacts, where they are, etc. Related to #193 Goal: Have someone from the community deploy an Elemental cluster (single node k3s is sufficient)
non_priority
docs elemental community release while we have all the functional pieces working noone from the community can consume the great work the team has done in the last weeks let s share our achievement with the community and enable them to use the new elemental stack overhaul of rancher github io elemental written descending priority clarify what en elemental release encompasses which are the artifacts where they are etc related to goal have someone from the community deploy an elemental cluster single node is sufficient
0
83,432
10,350,247,530
IssuesEvent
2019-09-05 01:59:17
Automattic/jetpack
https://api.github.com/repos/Automattic/jetpack
closed
"Jetpack Search" vs "Search" for dashboard widget
Admin Page Search [Status] Needs Design [Type] Bug
<!-- Thanks for contributing to Jetpack! Pick a clear title ("Sharing: add new Facebook button") and proceed. --> #### Steps to reproduce the issue 1. On a site without a Jetpack Professional plan... 2. Go to the Jetpack dashboard 3. Observe dashboard widget named "Jetpack Search" 4. Subscribe to a Jetpack Pro plan 5. Go back to dashboard and see that widget is now called "Search" #### What I expected Consistent naming #### What happened instead Inconsistent naming **Screenshots** Search unavailable: <img width="477" alt="jetpack-search-widget-off" src="https://user-images.githubusercontent.com/51896/64192575-d8f17b80-ce2f-11e9-9a52-190d546bdc88.png"> Search available: <img width="472" alt="jetpack-search-widget-on" src="https://user-images.githubusercontent.com/51896/64192584-dc850280-ce2f-11e9-8123-6ae4aea0ecae.png"> <!-- PLEASE NOTE - Everything is optional, but try to add as many details as possible. - If requesting a new feature, explain why you'd like to see it added. - This issue tracker is not for support. If you have questions about Jetpack, you can [start a new thread in the Jetpack support forums](https://wordpress.org/support/plugin/jetpack#new-post), or [send us an email](http://jetpack.com/contact-support/). - Do not report potential security vulnerabilities here. For responsible disclosure of security issues and to be eligible for our bug bounty program, please submit your report via [the HackerOne portal](https://hackerone.com/automattic). -->
1.0
"Jetpack Search" vs "Search" for dashboard widget - <!-- Thanks for contributing to Jetpack! Pick a clear title ("Sharing: add new Facebook button") and proceed. --> #### Steps to reproduce the issue 1. On a site without a Jetpack Professional plan... 2. Go to the Jetpack dashboard 3. Observe dashboard widget named "Jetpack Search" 4. Subscribe to a Jetpack Pro plan 5. Go back to dashboard and see that widget is now called "Search" #### What I expected Consistent naming #### What happened instead Inconsistent naming **Screenshots** Search unavailable: <img width="477" alt="jetpack-search-widget-off" src="https://user-images.githubusercontent.com/51896/64192575-d8f17b80-ce2f-11e9-9a52-190d546bdc88.png"> Search available: <img width="472" alt="jetpack-search-widget-on" src="https://user-images.githubusercontent.com/51896/64192584-dc850280-ce2f-11e9-8123-6ae4aea0ecae.png"> <!-- PLEASE NOTE - Everything is optional, but try to add as many details as possible. - If requesting a new feature, explain why you'd like to see it added. - This issue tracker is not for support. If you have questions about Jetpack, you can [start a new thread in the Jetpack support forums](https://wordpress.org/support/plugin/jetpack#new-post), or [send us an email](http://jetpack.com/contact-support/). - Do not report potential security vulnerabilities here. For responsible disclosure of security issues and to be eligible for our bug bounty program, please submit your report via [the HackerOne portal](https://hackerone.com/automattic). -->
non_priority
jetpack search vs search for dashboard widget thanks for contributing to jetpack pick a clear title sharing add new facebook button and proceed steps to reproduce the issue on a site without a jetpack professional plan go to the jetpack dashboard observe dashboard widget named jetpack search subscribe to a jetpack pro plan go back to dashboard and see that widget is now called search what i expected consistent naming what happened instead inconsistent naming screenshots search unavailable img width alt jetpack search widget off src search available img width alt jetpack search widget on src please note everything is optional but try to add as many details as possible if requesting a new feature explain why you d like to see it added this issue tracker is not for support if you have questions about jetpack you can or do not report potential security vulnerabilities here for responsible disclosure of security issues and to be eligible for our bug bounty program please submit your report via
0
27,011
13,163,886,448
IssuesEvent
2020-08-11 01:54:57
mozilla-mobile/fenix
https://api.github.com/repos/mozilla-mobile/fenix
closed
FNX-4605 ⁃ Upgrade to Leanplum 5.4.0
Leanplum eng:performance needs:triage
There's a new version of Leanplum addressing the performance concerns we've raised in: https://github.com/mozilla-mobile/fenix/issues/9563 Let's upgrade and verify.
True
FNX-4605 ⁃ Upgrade to Leanplum 5.4.0 - There's a new version of Leanplum addressing the performance concerns we've raised in: https://github.com/mozilla-mobile/fenix/issues/9563 Let's upgrade and verify.
non_priority
fnx ⁃ upgrade to leanplum there s a new version of leanplum addressing the performance concerns we ve raised in let s upgrade and verify
0
99,070
8,689,268,052
IssuesEvent
2018-12-03 18:13:31
OpenLiberty/open-liberty
https://api.github.com/repos/OpenLiberty/open-liberty
opened
Update the testEl30AssignmentOperator_2 test case to assign a value to x
in:Web Components team:Sirius test bug
The test executes properly if executed in order _1, _2 but if executed out of order which is not guaranteed x does not have a value ( it is set to 3 in _1 test case ), so we need to ensure x has a value.
1.0
Update the testEl30AssignmentOperator_2 test case to assign a value to x - The test executes properly if executed in order _1, _2 but if executed out of order which is not guaranteed x does not have a value ( it is set to 3 in _1 test case ), so we need to ensure x has a value.
non_priority
update the test case to assign a value to x the test executes properly if executed in order but if executed out of order which is not guaranteed x does not have a value it is set to in test case so we need to ensure x has a value
0
73,684
24,752,877,088
IssuesEvent
2022-10-21 15:03:46
matrix-org/synapse
https://api.github.com/repos/matrix-org/synapse
closed
`TypeError: not all arguments converted during string formatting` on SIGHUP
A-Config T-Defect
After I send my synapse a SIGHUP: ``` 2022-10-21 13:50:03,303 - twisted - 274 - ERROR - sentinel - --- Logging error --- 2022-10-21 13:50:03,313 - twisted - 274 - ERROR - sentinel - Traceback (most recent call last): 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 1100, in emit 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - msg = self.format(record) 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 943, in format 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - return fmt.format(record) 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 678, in format 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - record.message = record.getMessage() 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 368, in getMessage 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - msg = msg % self.args 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - TypeError: not all arguments converted during string formatting 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - Call stack: 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - File "/usr/local/pycharm-community-2022.1.3/plugins/python-ce/helpers/pydev/_pydev_bundle/pydev_monkey.py", line 795, in __call__ 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - ret = self.original_func(*self.args, **self.kwargs) 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/threading.py", line 973, in _bootstrap 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - self._bootstrap_inner() 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/threading.py", line 1016, in _bootstrap_inner 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - self.run() 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/threading.py", line 953, in run 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - self._target(*self._args, **self._kwargs) 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - File "/home/rav/work/synapse/synapse/logging/handlers.py", line 84, in _flush_periodically 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - self.flush() 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - Message: 'New cache config. Was:\n %s\nNow:\n' 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - Arguments: ({'root': None, 'default_template_dir': '/home/rav/work/synapse/synapse/res/templates', 'event_cache_size': 102400, 'cache_factors': {}, 'global_factor': 0.5, 'track_memory_usage': False, 'expiry_time_msec': 1800000, 'cache_autotuning': None, 'sync_response_cache_duration': 120000}, {'root': <synapse.config.homeserver.HomeServerConfig object at 0x7ffb0012fb50>, 'default_template_dir': '/home/rav/work/synapse/synapse/res/templates', 'event_cache_size': 102400, 'cache_factors': {}, 'global_factor': 0.5, 'track_memory_usage': False, 'expiry_time_msec': 1800000, 'cache_autotuning': None, 'sync_response_cache_duration': 120000}) ``` looks like a missing %s in https://github.com/matrix-org/synapse/tree/v1.69.0/synapse/app/_base.py#L560-L564
1.0
`TypeError: not all arguments converted during string formatting` on SIGHUP - After I send my synapse a SIGHUP: ``` 2022-10-21 13:50:03,303 - twisted - 274 - ERROR - sentinel - --- Logging error --- 2022-10-21 13:50:03,313 - twisted - 274 - ERROR - sentinel - Traceback (most recent call last): 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 1100, in emit 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - msg = self.format(record) 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 943, in format 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - return fmt.format(record) 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 678, in format 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - record.message = record.getMessage() 2022-10-21 13:50:03,314 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/logging/__init__.py", line 368, in getMessage 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - msg = msg % self.args 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - TypeError: not all arguments converted during string formatting 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - Call stack: 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - File "/usr/local/pycharm-community-2022.1.3/plugins/python-ce/helpers/pydev/_pydev_bundle/pydev_monkey.py", line 795, in __call__ 2022-10-21 13:50:03,315 - twisted - 274 - ERROR - sentinel - ret = self.original_func(*self.args, **self.kwargs) 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/threading.py", line 973, in _bootstrap 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - self._bootstrap_inner() 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/threading.py", line 1016, in _bootstrap_inner 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - self.run() 2022-10-21 13:50:03,316 - twisted - 274 - ERROR - sentinel - File "/usr/lib/python3.10/threading.py", line 953, in run 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - self._target(*self._args, **self._kwargs) 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - File "/home/rav/work/synapse/synapse/logging/handlers.py", line 84, in _flush_periodically 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - self.flush() 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - Message: 'New cache config. Was:\n %s\nNow:\n' 2022-10-21 13:50:03,317 - twisted - 274 - ERROR - sentinel - Arguments: ({'root': None, 'default_template_dir': '/home/rav/work/synapse/synapse/res/templates', 'event_cache_size': 102400, 'cache_factors': {}, 'global_factor': 0.5, 'track_memory_usage': False, 'expiry_time_msec': 1800000, 'cache_autotuning': None, 'sync_response_cache_duration': 120000}, {'root': <synapse.config.homeserver.HomeServerConfig object at 0x7ffb0012fb50>, 'default_template_dir': '/home/rav/work/synapse/synapse/res/templates', 'event_cache_size': 102400, 'cache_factors': {}, 'global_factor': 0.5, 'track_memory_usage': False, 'expiry_time_msec': 1800000, 'cache_autotuning': None, 'sync_response_cache_duration': 120000}) ``` looks like a missing %s in https://github.com/matrix-org/synapse/tree/v1.69.0/synapse/app/_base.py#L560-L564
non_priority
typeerror not all arguments converted during string formatting on sighup after i send my synapse a sighup twisted error sentinel logging error twisted error sentinel traceback most recent call last twisted error sentinel file usr lib logging init py line in emit twisted error sentinel msg self format record twisted error sentinel file usr lib logging init py line in format twisted error sentinel return fmt format record twisted error sentinel file usr lib logging init py line in format twisted error sentinel record message record getmessage twisted error sentinel file usr lib logging init py line in getmessage twisted error sentinel msg msg self args twisted error sentinel typeerror not all arguments converted during string formatting twisted error sentinel call stack twisted error sentinel file usr local pycharm community plugins python ce helpers pydev pydev bundle pydev monkey py line in call twisted error sentinel ret self original func self args self kwargs twisted error sentinel file usr lib threading py line in bootstrap twisted error sentinel self bootstrap inner twisted error sentinel file usr lib threading py line in bootstrap inner twisted error sentinel self run twisted error sentinel file usr lib threading py line in run twisted error sentinel self target self args self kwargs twisted error sentinel file home rav work synapse synapse logging handlers py line in flush periodically twisted error sentinel self flush twisted error sentinel message new cache config was n s nnow n twisted error sentinel arguments root none default template dir home rav work synapse synapse res templates event cache size cache factors global factor track memory usage false expiry time msec cache autotuning none sync response cache duration root default template dir home rav work synapse synapse res templates event cache size cache factors global factor track memory usage false expiry time msec cache autotuning none sync response cache duration looks like a missing s in
0
77,028
14,707,250,371
IssuesEvent
2021-01-04 21:17:04
MicrosoftDocs/azure-devops-docs
https://api.github.com/repos/MicrosoftDocs/azure-devops-docs
closed
Link Create a build definition and follow-through are
Pri1 devops-code-git/tech devops/prod doc-bug
On this page, when you click on the link `Create a build definition` you are taken to a page where all links are HTTP 404 dead ends. There is a banner indicating this page is no longer maintained, and clicking through to most recent version leads to the root of the documentation. It seems implied I need to look for the same or similar resources referenced in the original page. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 7cd986e0-608c-1d8c-6faf-ecdb12e10bc6 * Version Independent ID: d60c996e-187e-dd6b-7f3a-dd056a1603f4 * Content: [Protect your Git branches with policies - Azure Repos](https://docs.microsoft.com/en-us/azure/devops/repos/git/branch-policies?view=azure-devops-2019#build-validation) * Content Source: [docs/repos/git/branch-policies.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/master/docs/repos/git/branch-policies.md) * Product: **devops** * Technology: **devops-code-git** * GitHub Login: @vtbassmatt * Microsoft Alias: **macoope**
1.0
Link Create a build definition and follow-through are - On this page, when you click on the link `Create a build definition` you are taken to a page where all links are HTTP 404 dead ends. There is a banner indicating this page is no longer maintained, and clicking through to most recent version leads to the root of the documentation. It seems implied I need to look for the same or similar resources referenced in the original page. --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: 7cd986e0-608c-1d8c-6faf-ecdb12e10bc6 * Version Independent ID: d60c996e-187e-dd6b-7f3a-dd056a1603f4 * Content: [Protect your Git branches with policies - Azure Repos](https://docs.microsoft.com/en-us/azure/devops/repos/git/branch-policies?view=azure-devops-2019#build-validation) * Content Source: [docs/repos/git/branch-policies.md](https://github.com/MicrosoftDocs/azure-devops-docs/blob/master/docs/repos/git/branch-policies.md) * Product: **devops** * Technology: **devops-code-git** * GitHub Login: @vtbassmatt * Microsoft Alias: **macoope**
non_priority
link create a build definition and follow through are on this page when you click on the link create a build definition you are taken to a page where all links are http dead ends there is a banner indicating this page is no longer maintained and clicking through to most recent version leads to the root of the documentation it seems implied i need to look for the same or similar resources referenced in the original page document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source product devops technology devops code git github login vtbassmatt microsoft alias macoope
0
242,640
26,277,763,106
IssuesEvent
2023-01-07 01:07:35
Abhi347/vid-to-speech-api-json
https://api.github.com/repos/Abhi347/vid-to-speech-api-json
opened
CVE-2022-0155 (Medium) detected in follow-redirects-1.4.1.tgz
security vulnerability
## CVE-2022-0155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.4.1.tgz</b></p></summary> <p>HTTP and HTTPS modules that follow redirects.</p> <p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.4.1.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.4.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/follow-redirects/package.json</p> <p> Dependency Hierarchy: - speech-1.1.0.tgz (Root Library) - google-gax-0.14.5.tgz - google-auto-auth-0.9.6.tgz - gcp-metadata-0.6.2.tgz - axios-0.18.0.tgz - :x: **follow-redirects-1.4.1.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor <p>Publish Date: 2022-01-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0155>CVE-2022-0155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/">https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/</a></p> <p>Release Date: 2022-01-10</p> <p>Fix Resolution (follow-redirects): 1.14.7</p> <p>Direct dependency fix Resolution (@google-cloud/speech): 2.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-0155 (Medium) detected in follow-redirects-1.4.1.tgz - ## CVE-2022-0155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.4.1.tgz</b></p></summary> <p>HTTP and HTTPS modules that follow redirects.</p> <p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.4.1.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.4.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/follow-redirects/package.json</p> <p> Dependency Hierarchy: - speech-1.1.0.tgz (Root Library) - google-gax-0.14.5.tgz - google-auto-auth-0.9.6.tgz - gcp-metadata-0.6.2.tgz - axios-0.18.0.tgz - :x: **follow-redirects-1.4.1.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor <p>Publish Date: 2022-01-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-0155>CVE-2022-0155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/">https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/</a></p> <p>Release Date: 2022-01-10</p> <p>Fix Resolution (follow-redirects): 1.14.7</p> <p>Direct dependency fix Resolution (@google-cloud/speech): 2.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in follow redirects tgz cve medium severity vulnerability vulnerable library follow redirects tgz http and https modules that follow redirects library home page a href path to dependency file package json path to vulnerable library node modules follow redirects package json dependency hierarchy speech tgz root library google gax tgz google auto auth tgz gcp metadata tgz axios tgz x follow redirects tgz vulnerable library vulnerability details follow redirects is vulnerable to exposure of private personal information to an unauthorized actor publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution follow redirects direct dependency fix resolution google cloud speech step up your open source security game with mend
0
89,059
8,188,857,739
IssuesEvent
2018-08-30 04:30:25
humera987/HumTestData
https://api.github.com/repos/humera987/HumTestData
closed
humerafxtest : ApiV1ProjectsIdProjectChecksumsGetQueryParamEmptyValuePage
humerafxtest
Project : humerafxtest Job : UAT Env : UAT Region : FXLabs/US_WEST_1 Result : fail Status Code : 200 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Thu, 30 Aug 2018 04:29:18 GMT]} Endpoint : http://13.56.210.25/api/v1/projects/lyoY0no2/project-checksums?page= Request : Response : { "requestId" : "None", "requestTime" : "2018-08-30T04:29:18.613+0000", "errors" : false, "messages" : [ ], "data" : [ ], "totalPages" : 0, "totalElements" : 0 } Logs : Assertion [@StatusCode != 404] passed, not expecting [404] and found [200]Assertion [@StatusCode != 500] passed, not expecting [500] and found [200]Assertion [@StatusCode != 200] failed, not expecting [200] but found [200]Assertion [@StatusCode != 401] passed, not expecting [401] and found [200] --- FX Bot ---
1.0
humerafxtest : ApiV1ProjectsIdProjectChecksumsGetQueryParamEmptyValuePage - Project : humerafxtest Job : UAT Env : UAT Region : FXLabs/US_WEST_1 Result : fail Status Code : 200 Headers : {X-Content-Type-Options=[nosniff], X-XSS-Protection=[1; mode=block], Cache-Control=[no-cache, no-store, max-age=0, must-revalidate], Pragma=[no-cache], Expires=[0], X-Frame-Options=[DENY], Content-Type=[application/json;charset=UTF-8], Transfer-Encoding=[chunked], Date=[Thu, 30 Aug 2018 04:29:18 GMT]} Endpoint : http://13.56.210.25/api/v1/projects/lyoY0no2/project-checksums?page= Request : Response : { "requestId" : "None", "requestTime" : "2018-08-30T04:29:18.613+0000", "errors" : false, "messages" : [ ], "data" : [ ], "totalPages" : 0, "totalElements" : 0 } Logs : Assertion [@StatusCode != 404] passed, not expecting [404] and found [200]Assertion [@StatusCode != 500] passed, not expecting [500] and found [200]Assertion [@StatusCode != 200] failed, not expecting [200] but found [200]Assertion [@StatusCode != 401] passed, not expecting [401] and found [200] --- FX Bot ---
non_priority
humerafxtest project humerafxtest job uat env uat region fxlabs us west result fail status code headers x content type options x xss protection cache control pragma expires x frame options content type transfer encoding date endpoint request response requestid none requesttime errors false messages data totalpages totalelements logs assertion passed not expecting and found assertion passed not expecting and found assertion failed not expecting but found assertion passed not expecting and found fx bot
0
190,751
22,155,158,913
IssuesEvent
2022-06-03 21:35:06
vincenzodistasio97/ReactSocial
https://api.github.com/repos/vincenzodistasio97/ReactSocial
opened
CVE-2021-23438 (High) detected in mpath-0.6.0.tgz
security vulnerability
## CVE-2021-23438 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mpath-0.6.0.tgz</b></p></summary> <p>{G,S}et object values using MongoDB-like path notation</p> <p>Library home page: <a href="https://registry.npmjs.org/mpath/-/mpath-0.6.0.tgz">https://registry.npmjs.org/mpath/-/mpath-0.6.0.tgz</a></p> <p>Path to dependency file: /server/package.json</p> <p>Path to vulnerable library: /server/node_modules/mpath/package.json</p> <p> Dependency Hierarchy: - mongoose-5.7.7.tgz (Root Library) - :x: **mpath-0.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/ReactSocial/commit/1193d502cdfb37123f347a4ceb67eb9b1fdad386">1193d502cdfb37123f347a4ceb67eb9b1fdad386</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input. <p>Publish Date: 2021-09-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23438>CVE-2021-23438</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23438</a></p> <p>Release Date: 2021-09-01</p> <p>Fix Resolution (mpath): 0.8.4</p> <p>Direct dependency fix Resolution (mongoose): 6.2.11</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-23438 (High) detected in mpath-0.6.0.tgz - ## CVE-2021-23438 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mpath-0.6.0.tgz</b></p></summary> <p>{G,S}et object values using MongoDB-like path notation</p> <p>Library home page: <a href="https://registry.npmjs.org/mpath/-/mpath-0.6.0.tgz">https://registry.npmjs.org/mpath/-/mpath-0.6.0.tgz</a></p> <p>Path to dependency file: /server/package.json</p> <p>Path to vulnerable library: /server/node_modules/mpath/package.json</p> <p> Dependency Hierarchy: - mongoose-5.7.7.tgz (Root Library) - :x: **mpath-0.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/vincenzodistasio97/ReactSocial/commit/1193d502cdfb37123f347a4ceb67eb9b1fdad386">1193d502cdfb37123f347a4ceb67eb9b1fdad386</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package mpath before 0.8.4. A type confusion vulnerability can lead to a bypass of CVE-2018-16490. In particular, the condition ignoreProperties.indexOf(parts[i]) !== -1 returns -1 if parts[i] is ['__proto__']. This is because the method that has been called if the input is an array is Array.prototype.indexOf() and not String.prototype.indexOf(). They behave differently depending on the type of the input. <p>Publish Date: 2021-09-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23438>CVE-2021-23438</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23438">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23438</a></p> <p>Release Date: 2021-09-01</p> <p>Fix Resolution (mpath): 0.8.4</p> <p>Direct dependency fix Resolution (mongoose): 6.2.11</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in mpath tgz cve high severity vulnerability vulnerable library mpath tgz g s et object values using mongodb like path notation library home page a href path to dependency file server package json path to vulnerable library server node modules mpath package json dependency hierarchy mongoose tgz root library x mpath tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects the package mpath before a type confusion vulnerability can lead to a bypass of cve in particular the condition ignoreproperties indexof parts returns if parts is this is because the method that has been called if the input is an array is array prototype indexof and not string prototype indexof they behave differently depending on the type of the input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mpath direct dependency fix resolution mongoose step up your open source security game with mend
0
103,447
8,909,495,675
IssuesEvent
2019-01-18 06:33:32
linkedpipes/etl
https://api.github.com/repos/linkedpipes/etl
closed
t-sparqlConstructToFilesList: Missing prefixes
enhancement test
t-sparqlConstructToFilesList output is missing prefixes, which are present both in the input data and the input query
1.0
t-sparqlConstructToFilesList: Missing prefixes - t-sparqlConstructToFilesList output is missing prefixes, which are present both in the input data and the input query
non_priority
t sparqlconstructtofileslist missing prefixes t sparqlconstructtofileslist output is missing prefixes which are present both in the input data and the input query
0
8,517
3,185,054,849
IssuesEvent
2015-09-27 22:33:29
orome/crypto-enigma
https://api.github.com/repos/orome/crypto-enigma
reopened
Documentation not building on Hackage
bug documentation help wanted
Documentation is not building on Hackage because the package has a dependency on `base >= 4.8.1.0` but Hackage tries to use `base == 4.7.0.1`. This may be a problem to fix since stepping down the base version to see if the library builds is (currently) a pain.
1.0
Documentation not building on Hackage - Documentation is not building on Hackage because the package has a dependency on `base >= 4.8.1.0` but Hackage tries to use `base == 4.7.0.1`. This may be a problem to fix since stepping down the base version to see if the library builds is (currently) a pain.
non_priority
documentation not building on hackage documentation is not building on hackage because the package has a dependency on base but hackage tries to use base this may be a problem to fix since stepping down the base version to see if the library builds is currently a pain
0
174,016
14,444,144,521
IssuesEvent
2020-12-07 20:46:03
battjt/j1939-84
https://api.github.com/repos/battjt/j1939-84
opened
Write Part - 10 Step - 5 & unit test
documentation
Implement Step05Controller and write all unit tests. Verify the display name of the test conforms to the pattern of "Part X Step Y". Follow the standardize naming, comments, etc. to be consistent.
1.0
Write Part - 10 Step - 5 & unit test - Implement Step05Controller and write all unit tests. Verify the display name of the test conforms to the pattern of "Part X Step Y". Follow the standardize naming, comments, etc. to be consistent.
non_priority
write part step unit test implement and write all unit tests verify the display name of the test conforms to the pattern of part x step y follow the standardize naming comments etc to be consistent
0
588
8,743,752,664
IssuesEvent
2018-12-12 20:05:24
rook/rook
https://api.github.com/repos/rook/rook
closed
Support user-space driver
block perf reliability wontfix
<!-- **Are you in the right place?** 1. For issues or feature requests, please create an issue in this repository. 2. For general technical and non-technical questions, we are happy to help you on our [Rook.io Slack](https://Rook-io.slack.com). 3. Did you already search the existing open issues for anything similar? --> **Is this a bug report or feature request?** * Feature Request **What should the feature do:** I have tried to use `rbd-nbd` feature-rich client to support ceph rbd image. But I noticed it was restricted by existing mechanisms. When using rbd-nbd to map rbd image, it would create a user-space process to deal with network IO. Currently ceph client map rbd image in the agent pod. If I use `rbd-nbd` client in the same way, I found that 1. `rbd-nbd list-mapped` not work. Because the rbd-nbd process have different process id in the container and the host. 2. the rook agent became not stateless. The rbd-nbd process would prevent agent stop/restar. I think any user-space driver like `rbd-nbd` would face similar problems. Because the key reason is that the driver process is running in the container but not the host. I hope we can build an unified architecture to support this type driver. It is more suitable that any driver that use user-space process should not be started by the rook agent in a container, but by the flexvolume plugin in the node directly. **What is use case behind this feature:** **Environment**: <!-- Specific environment information that helps with the feature request -->
True
Support user-space driver - <!-- **Are you in the right place?** 1. For issues or feature requests, please create an issue in this repository. 2. For general technical and non-technical questions, we are happy to help you on our [Rook.io Slack](https://Rook-io.slack.com). 3. Did you already search the existing open issues for anything similar? --> **Is this a bug report or feature request?** * Feature Request **What should the feature do:** I have tried to use `rbd-nbd` feature-rich client to support ceph rbd image. But I noticed it was restricted by existing mechanisms. When using rbd-nbd to map rbd image, it would create a user-space process to deal with network IO. Currently ceph client map rbd image in the agent pod. If I use `rbd-nbd` client in the same way, I found that 1. `rbd-nbd list-mapped` not work. Because the rbd-nbd process have different process id in the container and the host. 2. the rook agent became not stateless. The rbd-nbd process would prevent agent stop/restar. I think any user-space driver like `rbd-nbd` would face similar problems. Because the key reason is that the driver process is running in the container but not the host. I hope we can build an unified architecture to support this type driver. It is more suitable that any driver that use user-space process should not be started by the rook agent in a container, but by the flexvolume plugin in the node directly. **What is use case behind this feature:** **Environment**: <!-- Specific environment information that helps with the feature request -->
non_priority
support user space driver are you in the right place for issues or feature requests please create an issue in this repository for general technical and non technical questions we are happy to help you on our did you already search the existing open issues for anything similar is this a bug report or feature request feature request what should the feature do i have tried to use rbd nbd feature rich client to support ceph rbd image but i noticed it was restricted by existing mechanisms when using rbd nbd to map rbd image it would create a user space process to deal with network io currently ceph client map rbd image in the agent pod if i use rbd nbd client in the same way i found that rbd nbd list mapped not work because the rbd nbd process have different process id in the container and the host the rook agent became not stateless the rbd nbd process would prevent agent stop restar i think any user space driver like rbd nbd would face similar problems because the key reason is that the driver process is running in the container but not the host i hope we can build an unified architecture to support this type driver it is more suitable that any driver that use user space process should not be started by the rook agent in a container, but by the flexvolume plugin in the node directly what is use case behind this feature environment
0
251,013
18,922,187,172
IssuesEvent
2021-11-17 03:59:56
girlscript/winter-of-contributing
https://api.github.com/repos/girlscript/winter-of-contributing
closed
[Front End Web-Dev]: CSS User Interface
documentation GWOC21 Assigned Frontend Dev HTML/CSS/JS
### Description Discuss in brief What is CSS User Interface? ### Domain Frontend Dev HTML/CSS/JS ### Type of Contribution Documentation ### Code of Conduct - [X] I follow [Contributing Guidelines](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CONTRIBUTING.md) & [Code of conduct](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CODE_OF_CONDUCT.md) of this project.
1.0
[Front End Web-Dev]: CSS User Interface - ### Description Discuss in brief What is CSS User Interface? ### Domain Frontend Dev HTML/CSS/JS ### Type of Contribution Documentation ### Code of Conduct - [X] I follow [Contributing Guidelines](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CONTRIBUTING.md) & [Code of conduct](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CODE_OF_CONDUCT.md) of this project.
non_priority
css user interface description discuss in brief what is css user interface domain frontend dev html css js type of contribution documentation code of conduct i follow of this project
0
42,233
22,362,168,984
IssuesEvent
2022-06-15 21:47:11
CliMA/TurbulenceConvection.jl
https://api.github.com/repos/CliMA/TurbulenceConvection.jl
opened
Improve performance of RF model
Performance :rocket:
The RF model is suffering from heap allocations, based on looking at some flame graphs. In particular: ```julia function non_dimensional_function(εδ_model::RFEntr, εδ_model_vars) # d inputs, p=2 outputs, m random features nondim_groups = collect(non_dimensional_groups(εδ_model, εδ_model_vars)) d = size(nondim_groups)[1] # Learnable and fixed parameters c_rf_fix = εδ_model.c_rf_fix # 2 x m x (1 + d), fix c_rf_fix = reshape(c_rf_fix, 2, :, 1 + d) m = size(c_rf_fix)[2] c_rf_opt = εδ_model.c_rf_opt # 2 x (m + 1 + d), learn c_rf_opt = reshape(c_rf_opt, 2, m + 1 + d) # Random Features scale_x_entr = (c_rf_opt[1, (m + 2):(m + d + 1)] .^ 2) .* nondim_groups scale_x_detr = (c_rf_opt[2, (m + 2):(m + d + 1)] .^ 2) .* nondim_groups f_entr = c_rf_opt[1, m + 1]^2 * sqrt(2) * cos.(c_rf_fix[1, :, 2:(d + 1)] * scale_x_entr + c_rf_fix[1, :, 1]) f_detr = c_rf_opt[2, m + 1]^2 * sqrt(2) * cos.(c_rf_fix[2, :, 2:(d + 1)] * scale_x_detr + c_rf_fix[2, :, 1]) # Square output for nonnegativity for prediction nondim_ε = sum(c_rf_opt[1, 1:m] .* f_entr) / sqrt(m) nondim_δ = sum(c_rf_opt[2, 1:m] .* f_detr) / sqrt(m) return nondim_ε^2, nondim_δ^2 end ``` is allocating arrays. We can either: - Try passing `d`, and `m` to the compiler, to see if it can stack allocate everything, or - Write the result as the sum of a matrix-vector product, and avoid allocating the intermediate vector
True
Improve performance of RF model - The RF model is suffering from heap allocations, based on looking at some flame graphs. In particular: ```julia function non_dimensional_function(εδ_model::RFEntr, εδ_model_vars) # d inputs, p=2 outputs, m random features nondim_groups = collect(non_dimensional_groups(εδ_model, εδ_model_vars)) d = size(nondim_groups)[1] # Learnable and fixed parameters c_rf_fix = εδ_model.c_rf_fix # 2 x m x (1 + d), fix c_rf_fix = reshape(c_rf_fix, 2, :, 1 + d) m = size(c_rf_fix)[2] c_rf_opt = εδ_model.c_rf_opt # 2 x (m + 1 + d), learn c_rf_opt = reshape(c_rf_opt, 2, m + 1 + d) # Random Features scale_x_entr = (c_rf_opt[1, (m + 2):(m + d + 1)] .^ 2) .* nondim_groups scale_x_detr = (c_rf_opt[2, (m + 2):(m + d + 1)] .^ 2) .* nondim_groups f_entr = c_rf_opt[1, m + 1]^2 * sqrt(2) * cos.(c_rf_fix[1, :, 2:(d + 1)] * scale_x_entr + c_rf_fix[1, :, 1]) f_detr = c_rf_opt[2, m + 1]^2 * sqrt(2) * cos.(c_rf_fix[2, :, 2:(d + 1)] * scale_x_detr + c_rf_fix[2, :, 1]) # Square output for nonnegativity for prediction nondim_ε = sum(c_rf_opt[1, 1:m] .* f_entr) / sqrt(m) nondim_δ = sum(c_rf_opt[2, 1:m] .* f_detr) / sqrt(m) return nondim_ε^2, nondim_δ^2 end ``` is allocating arrays. We can either: - Try passing `d`, and `m` to the compiler, to see if it can stack allocate everything, or - Write the result as the sum of a matrix-vector product, and avoid allocating the intermediate vector
non_priority
improve performance of rf model the rf model is suffering from heap allocations based on looking at some flame graphs in particular julia function non dimensional function εδ model rfentr εδ model vars d inputs p outputs m random features nondim groups collect non dimensional groups εδ model εδ model vars d size nondim groups learnable and fixed parameters c rf fix εδ model c rf fix x m x d fix c rf fix reshape c rf fix d m size c rf fix c rf opt εδ model c rf opt x m d learn c rf opt reshape c rf opt m d random features scale x entr c rf opt nondim groups scale x detr c rf opt nondim groups f entr c rf opt sqrt cos c rf fix scale x entr c rf fix f detr c rf opt sqrt cos c rf fix scale x detr c rf fix square output for nonnegativity for prediction nondim ε sum c rf opt f entr sqrt m nondim δ sum c rf opt f detr sqrt m return nondim ε nondim δ end is allocating arrays we can either try passing d and m to the compiler to see if it can stack allocate everything or write the result as the sum of a matrix vector product and avoid allocating the intermediate vector
0
126,908
17,989,070,201
IssuesEvent
2021-09-15 01:57:20
tj-actions/eslint-changed-files
https://api.github.com/repos/tj-actions/eslint-changed-files
closed
CVE-2021-3757 (High) detected in immer-8.0.1.tgz
security vulnerability
## CVE-2021-3757 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>immer-8.0.1.tgz</b></p></summary> <p>Create your next immutable state by mutating the current one</p> <p>Library home page: <a href="https://registry.npmjs.org/immer/-/immer-8.0.1.tgz">https://registry.npmjs.org/immer/-/immer-8.0.1.tgz</a></p> <p>Path to dependency file: eslint-changed-files/test-app/package.json</p> <p>Path to vulnerable library: eslint-changed-files/test-app/node_modules/immer/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - react-dev-utils-11.0.4.tgz - :x: **immer-8.0.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-09-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3757>CVE-2021-3757</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa/">https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa/</a></p> <p>Release Date: 2021-09-02</p> <p>Fix Resolution: immer - 9.0.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-3757 (High) detected in immer-8.0.1.tgz - ## CVE-2021-3757 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>immer-8.0.1.tgz</b></p></summary> <p>Create your next immutable state by mutating the current one</p> <p>Library home page: <a href="https://registry.npmjs.org/immer/-/immer-8.0.1.tgz">https://registry.npmjs.org/immer/-/immer-8.0.1.tgz</a></p> <p>Path to dependency file: eslint-changed-files/test-app/package.json</p> <p>Path to vulnerable library: eslint-changed-files/test-app/node_modules/immer/package.json</p> <p> Dependency Hierarchy: - react-scripts-4.0.3.tgz (Root Library) - react-dev-utils-11.0.4.tgz - :x: **immer-8.0.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') <p>Publish Date: 2021-09-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3757>CVE-2021-3757</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa/">https://huntr.dev/bounties/23d38099-71cd-42ed-a77a-71e68094adfa/</a></p> <p>Release Date: 2021-09-02</p> <p>Fix Resolution: immer - 9.0.6</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in immer tgz cve high severity vulnerability vulnerable library immer tgz create your next immutable state by mutating the current one library home page a href path to dependency file eslint changed files test app package json path to vulnerable library eslint changed files test app node modules immer package json dependency hierarchy react scripts tgz root library react dev utils tgz x immer tgz vulnerable library found in base branch main vulnerability details immer is vulnerable to improperly controlled modification of object prototype attributes prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution immer step up your open source security game with whitesource
0
143,070
19,142,743,053
IssuesEvent
2021-12-02 02:00:17
shrivastava-prateek/online-jsp-compiler
https://api.github.com/repos/shrivastava-prateek/online-jsp-compiler
opened
CVE-2020-5421 (Medium) detected in spring-web-4.3.27.RELEASE.jar
security vulnerability
## CVE-2020-5421 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.3.27.RELEASE.jar</b></p></summary> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: online-jsp-compiler/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/org/springframework/spring-web/4.3.27.RELEASE/spring-web-4.3.27.RELEASE.jar,online-jsp-compiler/target/online-jsp-compiler/WEB-INF/lib/spring-web-4.3.27.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **spring-web-4.3.27.RELEASE.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. <p>Publish Date: 2020-09-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421>CVE-2020-5421</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2020-5421">https://tanzu.vmware.com/security/cve-2020-5421</a></p> <p>Release Date: 2020-09-19</p> <p>Fix Resolution: org.springframework:spring-web:4.3.29,5.0.19,5.1.18,5.2.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-5421 (Medium) detected in spring-web-4.3.27.RELEASE.jar - ## CVE-2020-5421 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-web-4.3.27.RELEASE.jar</b></p></summary> <p>Spring Web</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: online-jsp-compiler/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/org/springframework/spring-web/4.3.27.RELEASE/spring-web-4.3.27.RELEASE.jar,online-jsp-compiler/target/online-jsp-compiler/WEB-INF/lib/spring-web-4.3.27.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **spring-web-4.3.27.RELEASE.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework versions 5.2.0 - 5.2.8, 5.1.0 - 5.1.17, 5.0.0 - 5.0.18, 4.3.0 - 4.3.28, and older unsupported versions, the protections against RFD attacks from CVE-2015-5211 may be bypassed depending on the browser used through the use of a jsessionid path parameter. <p>Publish Date: 2020-09-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5421>CVE-2020-5421</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2020-5421">https://tanzu.vmware.com/security/cve-2020-5421</a></p> <p>Release Date: 2020-09-19</p> <p>Fix Resolution: org.springframework:spring-web:4.3.29,5.0.19,5.1.18,5.2.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in spring web release jar cve medium severity vulnerability vulnerable library spring web release jar spring web library home page a href path to dependency file online jsp compiler pom xml path to vulnerable library canner repository org springframework spring web release spring web release jar online jsp compiler target online jsp compiler web inf lib spring web release jar dependency hierarchy x spring web release jar vulnerable library found in base branch master vulnerability details in spring framework versions and older unsupported versions the protections against rfd attacks from cve may be bypassed depending on the browser used through the use of a jsessionid path parameter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction required scope changed impact metrics confidentiality impact low integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring web step up your open source security game with whitesource
0
337,857
24,559,947,411
IssuesEvent
2022-10-12 19:16:05
r-lib/lintr
https://api.github.com/repos/r-lib/lintr
closed
Adding examples to documentation of each linter
documentation
I think docs for each linter should have an examples section with at least one example of code that does produce lint and another that doesn't. I think the style guide is good to provide the underlying rationale for the lint (provided that the reader actually clicks on that link!), but it doesn't lead to much exploration on the reader's part. Giving concrete examples means that the reader can just copy-paste examples and start toying around with them to see what does and doesn't lint. Note to self: Make sure all of them follow the style guide, and so use `"` instead of `'`, e.g. ## Progress tracker - [x] absolute_path_linter - [x] any_duplicated_linter - [x] any_is_na_linter - [x] assignment_linter - [x] backport_linter - [x] boolean_arithmetic_linter - [x] brace_linter - [x] class_equals_linter - [x] commas_linter - [x] commented_code_linter - [x] condition_message_linter - [x] conjunct_test_linter - [x] consecutive_stopifnot_linter - [x] cyclocomp_linter - [x] duplicate_argument_linter - [x] equals_na_linter - [x] expect_comparison_linter - [x] expect_identical_linter - [x] expect_length_linter - [x] expect_named_linter - [x] expect_not_linter - [x] expect_null_linter - [x] expect_s3_class_linter - [x] expect_s4_class_linter - [x] expect_true_false_linter - [x] expect_type_linter - [x] extraction_operator_linter - [x] fixed_regex_linter - [x] function_argument_linter - [x] function_left_parentheses_linter - [x] function_return_linter - [x] ifelse_censor_linter - [x] implicit_integer_linter - [x] infix_spaces_linter - [x] inner_combine_linter - [x] lengths_linter - [x] line_length_linter - [x] literal_coercion_linter - [x] missing_argument_linter - [x] missing_package_linter - [x] namespace_linter - [x] nested_ifelse_linter - [x] no_tab_linter - [ ] nonportable_path_linter - [x] numeric_leading_zero_linter - [x] object_length_linter - [x] object_name_linter - [x] object_usage_linter - [x] outer_negation_linter - [x] package_hooks_linter - [x] paren_body_linter - [x] paste_linter - [x] pipe_call_linter - [x] pipe_continuation_linter - [x] redundant_equals_linter - [x] redundant_ifelse_linter - [x] regex_subset_linter - [x] semicolon_linter - [x] seq_linter - [x] single_quotes_linter - [x] spaces_inside_linter - [x] spaces_left_parentheses_linter - [x] sprintf_linter - [x] string_boundary_linter - [x] strings_as_factors_linter - [x] system_file_linter - [x] T_and_F_symbol_linter - [x] todo_comment_linter - [x] trailing_blank_lines_linter - [x] trailing_whitespace_linter - [x] undesirable_function_linter - [x] undesirable_operator_linter - [x] unnecessary_lambda_linter - [x] unneeded_concatenation_linter - [x] unreachable_code_linter - [x] unused_import_linter - [x] vector_logic_linter - [x] yoda_test_linter
1.0
Adding examples to documentation of each linter - I think docs for each linter should have an examples section with at least one example of code that does produce lint and another that doesn't. I think the style guide is good to provide the underlying rationale for the lint (provided that the reader actually clicks on that link!), but it doesn't lead to much exploration on the reader's part. Giving concrete examples means that the reader can just copy-paste examples and start toying around with them to see what does and doesn't lint. Note to self: Make sure all of them follow the style guide, and so use `"` instead of `'`, e.g. ## Progress tracker - [x] absolute_path_linter - [x] any_duplicated_linter - [x] any_is_na_linter - [x] assignment_linter - [x] backport_linter - [x] boolean_arithmetic_linter - [x] brace_linter - [x] class_equals_linter - [x] commas_linter - [x] commented_code_linter - [x] condition_message_linter - [x] conjunct_test_linter - [x] consecutive_stopifnot_linter - [x] cyclocomp_linter - [x] duplicate_argument_linter - [x] equals_na_linter - [x] expect_comparison_linter - [x] expect_identical_linter - [x] expect_length_linter - [x] expect_named_linter - [x] expect_not_linter - [x] expect_null_linter - [x] expect_s3_class_linter - [x] expect_s4_class_linter - [x] expect_true_false_linter - [x] expect_type_linter - [x] extraction_operator_linter - [x] fixed_regex_linter - [x] function_argument_linter - [x] function_left_parentheses_linter - [x] function_return_linter - [x] ifelse_censor_linter - [x] implicit_integer_linter - [x] infix_spaces_linter - [x] inner_combine_linter - [x] lengths_linter - [x] line_length_linter - [x] literal_coercion_linter - [x] missing_argument_linter - [x] missing_package_linter - [x] namespace_linter - [x] nested_ifelse_linter - [x] no_tab_linter - [ ] nonportable_path_linter - [x] numeric_leading_zero_linter - [x] object_length_linter - [x] object_name_linter - [x] object_usage_linter - [x] outer_negation_linter - [x] package_hooks_linter - [x] paren_body_linter - [x] paste_linter - [x] pipe_call_linter - [x] pipe_continuation_linter - [x] redundant_equals_linter - [x] redundant_ifelse_linter - [x] regex_subset_linter - [x] semicolon_linter - [x] seq_linter - [x] single_quotes_linter - [x] spaces_inside_linter - [x] spaces_left_parentheses_linter - [x] sprintf_linter - [x] string_boundary_linter - [x] strings_as_factors_linter - [x] system_file_linter - [x] T_and_F_symbol_linter - [x] todo_comment_linter - [x] trailing_blank_lines_linter - [x] trailing_whitespace_linter - [x] undesirable_function_linter - [x] undesirable_operator_linter - [x] unnecessary_lambda_linter - [x] unneeded_concatenation_linter - [x] unreachable_code_linter - [x] unused_import_linter - [x] vector_logic_linter - [x] yoda_test_linter
non_priority
adding examples to documentation of each linter i think docs for each linter should have an examples section with at least one example of code that does produce lint and another that doesn t i think the style guide is good to provide the underlying rationale for the lint provided that the reader actually clicks on that link but it doesn t lead to much exploration on the reader s part giving concrete examples means that the reader can just copy paste examples and start toying around with them to see what does and doesn t lint note to self make sure all of them follow the style guide and so use instead of e g progress tracker absolute path linter any duplicated linter any is na linter assignment linter backport linter boolean arithmetic linter brace linter class equals linter commas linter commented code linter condition message linter conjunct test linter consecutive stopifnot linter cyclocomp linter duplicate argument linter equals na linter expect comparison linter expect identical linter expect length linter expect named linter expect not linter expect null linter expect class linter expect class linter expect true false linter expect type linter extraction operator linter fixed regex linter function argument linter function left parentheses linter function return linter ifelse censor linter implicit integer linter infix spaces linter inner combine linter lengths linter line length linter literal coercion linter missing argument linter missing package linter namespace linter nested ifelse linter no tab linter nonportable path linter numeric leading zero linter object length linter object name linter object usage linter outer negation linter package hooks linter paren body linter paste linter pipe call linter pipe continuation linter redundant equals linter redundant ifelse linter regex subset linter semicolon linter seq linter single quotes linter spaces inside linter spaces left parentheses linter sprintf linter string boundary linter strings as factors linter system file linter t and f symbol linter todo comment linter trailing blank lines linter trailing whitespace linter undesirable function linter undesirable operator linter unnecessary lambda linter unneeded concatenation linter unreachable code linter unused import linter vector logic linter yoda test linter
0
377,661
26,264,271,898
IssuesEvent
2023-01-06 10:56:37
primefaces/primereact
https://api.github.com/repos/primefaces/primereact
closed
TriStateCheckbox Doc Enhancements
Component: Documentation Status: Needs Triage Core Team
Add following demos below **Templating** - Invalid - Validation - Formik - Hook Form
1.0
TriStateCheckbox Doc Enhancements - Add following demos below **Templating** - Invalid - Validation - Formik - Hook Form
non_priority
tristatecheckbox doc enhancements add following demos below templating invalid validation formik hook form
0
39,120
9,211,721,243
IssuesEvent
2019-03-09 17:44:19
STEllAR-GROUP/phylanx
https://api.github.com/repos/STEllAR-GROUP/phylanx
opened
Stack and concatenate need to accept lists
category: primitives type: compatibility issue type: defect
This code currently fails even if it should succeed: ``` import numpy as np from phylanx import Phylanx, PhylanxSession, execution_tree PhylanxSession.init(1) def variable(value, dtype=None, name=None, constraint=None): if constraint is not None: raise TypeError("Constraint is the projection function to be " "applied to the variable after an optimizer update") return execution_tree.var(np.array(value, dtype)) def eval(func): return func.eval() def parse_shape_or_val(shape_or_val): return shape_or_val, np.random.random(shape_or_val).astype(np.float32) - 0.5 ############################################################################## @Phylanx def concatenate_eager(tensors, axis): return np.concatenate(tensors, axis) def concatenate(tensors, axis=-1): return concatenate_eager.lazy(tensors, axis) @Phylanx def stack_eager(x, axis): return np.stack(x, axis) def stack(x, axis=0): return stack_eager.lazy(x, axis) ############################################################################## def test_concatenate_operation(x_shape_or_val, y_shape_or_val): x_shape, x_val = parse_shape_or_val(x_shape_or_val) y_shape, y_val = parse_shape_or_val(y_shape_or_val) t = concatenate([variable(x_val), variable(y_val)]) z = eval(t) return z def test_stack_operation(x_shape_or_val, y_shape_or_val): x_shape, x_val = parse_shape_or_val(x_shape_or_val) y_shape, y_val = parse_shape_or_val(y_shape_or_val) t = stack([variable(x_val), variable(y_val)]) z = eval(t) return z print(test_concatenate_operation((4, 3), (4, 2))) print(test_stack_operation((5,4,6), (5,4,6))) ```
1.0
Stack and concatenate need to accept lists - This code currently fails even if it should succeed: ``` import numpy as np from phylanx import Phylanx, PhylanxSession, execution_tree PhylanxSession.init(1) def variable(value, dtype=None, name=None, constraint=None): if constraint is not None: raise TypeError("Constraint is the projection function to be " "applied to the variable after an optimizer update") return execution_tree.var(np.array(value, dtype)) def eval(func): return func.eval() def parse_shape_or_val(shape_or_val): return shape_or_val, np.random.random(shape_or_val).astype(np.float32) - 0.5 ############################################################################## @Phylanx def concatenate_eager(tensors, axis): return np.concatenate(tensors, axis) def concatenate(tensors, axis=-1): return concatenate_eager.lazy(tensors, axis) @Phylanx def stack_eager(x, axis): return np.stack(x, axis) def stack(x, axis=0): return stack_eager.lazy(x, axis) ############################################################################## def test_concatenate_operation(x_shape_or_val, y_shape_or_val): x_shape, x_val = parse_shape_or_val(x_shape_or_val) y_shape, y_val = parse_shape_or_val(y_shape_or_val) t = concatenate([variable(x_val), variable(y_val)]) z = eval(t) return z def test_stack_operation(x_shape_or_val, y_shape_or_val): x_shape, x_val = parse_shape_or_val(x_shape_or_val) y_shape, y_val = parse_shape_or_val(y_shape_or_val) t = stack([variable(x_val), variable(y_val)]) z = eval(t) return z print(test_concatenate_operation((4, 3), (4, 2))) print(test_stack_operation((5,4,6), (5,4,6))) ```
non_priority
stack and concatenate need to accept lists this code currently fails even if it should succeed import numpy as np from phylanx import phylanx phylanxsession execution tree phylanxsession init def variable value dtype none name none constraint none if constraint is not none raise typeerror constraint is the projection function to be applied to the variable after an optimizer update return execution tree var np array value dtype def eval func return func eval def parse shape or val shape or val return shape or val np random random shape or val astype np phylanx def concatenate eager tensors axis return np concatenate tensors axis def concatenate tensors axis return concatenate eager lazy tensors axis phylanx def stack eager x axis return np stack x axis def stack x axis return stack eager lazy x axis def test concatenate operation x shape or val y shape or val x shape x val parse shape or val x shape or val y shape y val parse shape or val y shape or val t concatenate z eval t return z def test stack operation x shape or val y shape or val x shape x val parse shape or val x shape or val y shape y val parse shape or val y shape or val t stack z eval t return z print test concatenate operation print test stack operation
0
118,439
15,296,475,453
IssuesEvent
2021-02-24 06:55:12
quantumlib/Cirq
https://api.github.com/repos/quantumlib/Cirq
closed
Support differentiation of gates that are parameterized
area/differentiation area/machine-learning area/parameters complexity/high kind/feature-request needs agreed design roadmap-candidate skill-level/expert triage/accepted
Sympy supports differentiation https://docs.sympy.org/latest/tutorial/calculus.html Current `cirq.unitary` doesn't return a matrix if the gate is parameterized. But we could make it return the formulas, and the this would allow us to perform symbolic differentiation using Sympy. This would be a very useful primitive for simulation in quantum machine learning.
1.0
Support differentiation of gates that are parameterized - Sympy supports differentiation https://docs.sympy.org/latest/tutorial/calculus.html Current `cirq.unitary` doesn't return a matrix if the gate is parameterized. But we could make it return the formulas, and the this would allow us to perform symbolic differentiation using Sympy. This would be a very useful primitive for simulation in quantum machine learning.
non_priority
support differentiation of gates that are parameterized sympy supports differentiation current cirq unitary doesn t return a matrix if the gate is parameterized but we could make it return the formulas and the this would allow us to perform symbolic differentiation using sympy this would be a very useful primitive for simulation in quantum machine learning
0
25,558
5,173,865,835
IssuesEvent
2017-01-18 17:05:51
stealjs/steal
https://api.github.com/repos/stealjs/steal
closed
Progressive loading guide issues
developer relations documentation essential in progress P0
There's a couple of issues in the guide: * [ ] - At [this step](http://stealjs.com/docs/StealJS.guides.progressive_loading.html#install-and-import-bootstrap) the myhub.js uses backtick strings for multi-line and then later you update it [here](http://stealjs.com/docs/StealJS.guides.progressive_loading.html#use-the-module) and it's using normal strings with concatenation. * [ ] - [The export script](http://stealjs.com/docs/StealJS.guides.progressive_loading.html#create-an-export-script) uses `system` instead of `steal` property. * [ ] - Updating the myhub.js to include the puppies code is done in the "Build Production app" section where it doesn't really belong.
1.0
Progressive loading guide issues - There's a couple of issues in the guide: * [ ] - At [this step](http://stealjs.com/docs/StealJS.guides.progressive_loading.html#install-and-import-bootstrap) the myhub.js uses backtick strings for multi-line and then later you update it [here](http://stealjs.com/docs/StealJS.guides.progressive_loading.html#use-the-module) and it's using normal strings with concatenation. * [ ] - [The export script](http://stealjs.com/docs/StealJS.guides.progressive_loading.html#create-an-export-script) uses `system` instead of `steal` property. * [ ] - Updating the myhub.js to include the puppies code is done in the "Build Production app" section where it doesn't really belong.
non_priority
progressive loading guide issues there s a couple of issues in the guide at the myhub js uses backtick strings for multi line and then later you update it and it s using normal strings with concatenation uses system instead of steal property updating the myhub js to include the puppies code is done in the build production app section where it doesn t really belong
0
187,125
14,427,079,854
IssuesEvent
2020-12-06 01:45:40
kalexmills/github-vet-tests-dec2020
https://api.github.com/repos/kalexmills/github-vet-tests-dec2020
closed
wenfengtou/openblibli-common: vendor/code.google.com/p/graphics-go/graphics/blur_test.go; 12 LoC
fresh small test vendored
Found a possible issue in [wenfengtou/openblibli-common](https://www.github.com/wenfengtou/openblibli-common) at [vendor/code.google.com/p/graphics-go/graphics/blur_test.go](https://github.com/wenfengtou/openblibli-common/blob/4bde4c6301a1b5a31cc95d331427e7bd3be92550/vendor/code.google.com/p/graphics-go/graphics/blur_test.go#L130-L141) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > function call which takes a reference to oc at line 138 may start a goroutine [Click here to see the code in its original context.](https://github.com/wenfengtou/openblibli-common/blob/4bde4c6301a1b5a31cc95d331427e7bd3be92550/vendor/code.google.com/p/graphics-go/graphics/blur_test.go#L130-L141) <details> <summary>Click here to show the 12 line(s) of Go which triggered the analyzer.</summary> ```go for _, oc := range blurOneColorTests { dst := oc.newDst() src := oc.newSrc() opt := oc.opt.(*BlurOptions) if err := Blur(dst, src, opt); err != nil { t.Fatal(err) } if !checkTransformTest(t, &oc, dst) { continue } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 4bde4c6301a1b5a31cc95d331427e7bd3be92550
1.0
wenfengtou/openblibli-common: vendor/code.google.com/p/graphics-go/graphics/blur_test.go; 12 LoC - Found a possible issue in [wenfengtou/openblibli-common](https://www.github.com/wenfengtou/openblibli-common) at [vendor/code.google.com/p/graphics-go/graphics/blur_test.go](https://github.com/wenfengtou/openblibli-common/blob/4bde4c6301a1b5a31cc95d331427e7bd3be92550/vendor/code.google.com/p/graphics-go/graphics/blur_test.go#L130-L141) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > function call which takes a reference to oc at line 138 may start a goroutine [Click here to see the code in its original context.](https://github.com/wenfengtou/openblibli-common/blob/4bde4c6301a1b5a31cc95d331427e7bd3be92550/vendor/code.google.com/p/graphics-go/graphics/blur_test.go#L130-L141) <details> <summary>Click here to show the 12 line(s) of Go which triggered the analyzer.</summary> ```go for _, oc := range blurOneColorTests { dst := oc.newDst() src := oc.newSrc() opt := oc.opt.(*BlurOptions) if err := Blur(dst, src, opt); err != nil { t.Fatal(err) } if !checkTransformTest(t, &oc, dst) { continue } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 4bde4c6301a1b5a31cc95d331427e7bd3be92550
non_priority
wenfengtou openblibli common vendor code google com p graphics go graphics blur test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message function call which takes a reference to oc at line may start a goroutine click here to show the line s of go which triggered the analyzer go for oc range bluronecolortests dst oc newdst src oc newsrc opt oc opt bluroptions if err blur dst src opt err nil t fatal err if checktransformtest t oc dst continue leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
337,086
24,526,058,471
IssuesEvent
2022-10-11 13:13:41
fleetdm/fleet
https://api.github.com/repos/fleetdm/fleet
closed
Blogpost: Fleet 4.21.0
:improve documentation
Fleet 4.21.0 is scheduled for release on 2022-09-29 ### Goal Prepare and publish the release blogpost for Fleet 4.21.0 so that folks in the Fleet/osquery community can understand the latest improvements. ### How? - [x] @mike-j-thomas: Hand images for cover and primary improvements to @noahtalerman - [x] @noahtalerman: Write and publish blog post - [ ] @noahtalerman: Complete CHANGELOG for 4.21.0 release ### Primary improvements - Add validation for `config` and `teams` YAML documents: #5222 - Add ability to manage flags for osquery remotely: #6851 - Know how many hosts and which hosts, on a team, are failing a global policy: #6981 ### List of other improvements * Fix side panel tooltips to not be wider than side panel causing scroll bug * Add support for [kubequery](https://github.com/Uptycs/kubequery). * Added validation to raise errors if unknown keys or invalid values are passed to update the organization settings (including the agent options) or the team's agent options. * Fix an error generating Windows packages with `fleetctl package` on non-English localizations of Windows. * Indicate hoverable text on host details/ device user details * Fixes bug which small screen overlay is shown when trying to print * Fix error in adding a new integration to not clear form * This fixes the UI bug where the label filter dropdown goes under the table header and add a "no custom labels" state that shows when the user has not created any custom labels yet. * Added logging to capture user email upon successful login * Placeholder text size small not extra small * adds a custom activity details text for edit agent options for global and team contexts. * Added new EE endpoint at '/api/v1/fleet/device/{token}/desktop' to be used by Fleet Desktop to get the number of failing policies. * Dashboard summary tiles now clickable * Add es_process_file_events, password_policy and windows_update_history to osquery tables
1.0
Blogpost: Fleet 4.21.0 - Fleet 4.21.0 is scheduled for release on 2022-09-29 ### Goal Prepare and publish the release blogpost for Fleet 4.21.0 so that folks in the Fleet/osquery community can understand the latest improvements. ### How? - [x] @mike-j-thomas: Hand images for cover and primary improvements to @noahtalerman - [x] @noahtalerman: Write and publish blog post - [ ] @noahtalerman: Complete CHANGELOG for 4.21.0 release ### Primary improvements - Add validation for `config` and `teams` YAML documents: #5222 - Add ability to manage flags for osquery remotely: #6851 - Know how many hosts and which hosts, on a team, are failing a global policy: #6981 ### List of other improvements * Fix side panel tooltips to not be wider than side panel causing scroll bug * Add support for [kubequery](https://github.com/Uptycs/kubequery). * Added validation to raise errors if unknown keys or invalid values are passed to update the organization settings (including the agent options) or the team's agent options. * Fix an error generating Windows packages with `fleetctl package` on non-English localizations of Windows. * Indicate hoverable text on host details/ device user details * Fixes bug which small screen overlay is shown when trying to print * Fix error in adding a new integration to not clear form * This fixes the UI bug where the label filter dropdown goes under the table header and add a "no custom labels" state that shows when the user has not created any custom labels yet. * Added logging to capture user email upon successful login * Placeholder text size small not extra small * adds a custom activity details text for edit agent options for global and team contexts. * Added new EE endpoint at '/api/v1/fleet/device/{token}/desktop' to be used by Fleet Desktop to get the number of failing policies. * Dashboard summary tiles now clickable * Add es_process_file_events, password_policy and windows_update_history to osquery tables
non_priority
blogpost fleet fleet is scheduled for release on goal prepare and publish the release blogpost for fleet so that folks in the fleet osquery community can understand the latest improvements how mike j thomas hand images for cover and primary improvements to noahtalerman noahtalerman write and publish blog post noahtalerman complete changelog for release primary improvements add validation for config and teams yaml documents add ability to manage flags for osquery remotely know how many hosts and which hosts on a team are failing a global policy list of other improvements fix side panel tooltips to not be wider than side panel causing scroll bug add support for added validation to raise errors if unknown keys or invalid values are passed to update the organization settings including the agent options or the team s agent options fix an error generating windows packages with fleetctl package on non english localizations of windows indicate hoverable text on host details device user details fixes bug which small screen overlay is shown when trying to print fix error in adding a new integration to not clear form this fixes the ui bug where the label filter dropdown goes under the table header and add a no custom labels state that shows when the user has not created any custom labels yet added logging to capture user email upon successful login placeholder text size small not extra small adds a custom activity details text for edit agent options for global and team contexts added new ee endpoint at api fleet device token desktop to be used by fleet desktop to get the number of failing policies dashboard summary tiles now clickable add es process file events password policy and windows update history to osquery tables
0
177,330
13,696,472,596
IssuesEvent
2020-10-01 00:10:20
biocore/empress
https://api.github.com/repos/biocore/empress
closed
Remove pep8 requirement
testing
Going through the required libraries right now -- I don't think there is a need to install pep8, since I think we use flake8 for all of the python linting.
1.0
Remove pep8 requirement - Going through the required libraries right now -- I don't think there is a need to install pep8, since I think we use flake8 for all of the python linting.
non_priority
remove requirement going through the required libraries right now i don t think there is a need to install since i think we use for all of the python linting
0
192,291
14,613,412,405
IssuesEvent
2020-12-22 08:11:24
github-vet/rangeloop-pointer-findings
https://api.github.com/repos/github-vet/rangeloop-pointer-findings
closed
algorand/go-algorand: data/transactions/verify/txn_test.go; 15 LoC
fresh small test
Found a possible issue in [algorand/go-algorand](https://www.github.com/algorand/go-algorand) at [data/transactions/verify/txn_test.go](https://github.com/algorand/go-algorand/blob/3af8232396b16cd9dbf93b6a1e267e569d427398/data/transactions/verify/txn_test.go#L132-L146) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > function call which takes a reference to txn at line 135 may start a goroutine [Click here to see the code in its original context.](https://github.com/algorand/go-algorand/blob/3af8232396b16cd9dbf93b6a1e267e569d427398/data/transactions/verify/txn_test.go#L132-L146) <details> <summary>Click here to show the 15 line(s) of Go which triggered the analyzer.</summary> ```go for _, txn := range signed { groupCtx, err := PrepareGroupContext([]transactions.SignedTxn{txn}, blockHeader) require.NoError(t, err) if Txn(&txn, 0, groupCtx) != nil { t.Errorf("signed transaction %#v did not verify", txn) } x := protocol.Encode(&txn) var signedTx transactions.SignedTxn protocol.Decode(x, &signedTx) if Txn(&signedTx, 0, groupCtx) != nil { t.Errorf("signed transaction %#v did not verify", txn) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 3af8232396b16cd9dbf93b6a1e267e569d427398
1.0
algorand/go-algorand: data/transactions/verify/txn_test.go; 15 LoC - Found a possible issue in [algorand/go-algorand](https://www.github.com/algorand/go-algorand) at [data/transactions/verify/txn_test.go](https://github.com/algorand/go-algorand/blob/3af8232396b16cd9dbf93b6a1e267e569d427398/data/transactions/verify/txn_test.go#L132-L146) Below is the message reported by the analyzer for this snippet of code. Beware that the analyzer only reports the first issue it finds, so please do not limit your consideration to the contents of the below message. > function call which takes a reference to txn at line 135 may start a goroutine [Click here to see the code in its original context.](https://github.com/algorand/go-algorand/blob/3af8232396b16cd9dbf93b6a1e267e569d427398/data/transactions/verify/txn_test.go#L132-L146) <details> <summary>Click here to show the 15 line(s) of Go which triggered the analyzer.</summary> ```go for _, txn := range signed { groupCtx, err := PrepareGroupContext([]transactions.SignedTxn{txn}, blockHeader) require.NoError(t, err) if Txn(&txn, 0, groupCtx) != nil { t.Errorf("signed transaction %#v did not verify", txn) } x := protocol.Encode(&txn) var signedTx transactions.SignedTxn protocol.Decode(x, &signedTx) if Txn(&signedTx, 0, groupCtx) != nil { t.Errorf("signed transaction %#v did not verify", txn) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: 3af8232396b16cd9dbf93b6a1e267e569d427398
non_priority
algorand go algorand data transactions verify txn test go loc found a possible issue in at below is the message reported by the analyzer for this snippet of code beware that the analyzer only reports the first issue it finds so please do not limit your consideration to the contents of the below message function call which takes a reference to txn at line may start a goroutine click here to show the line s of go which triggered the analyzer go for txn range signed groupctx err preparegroupcontext transactions signedtxn txn blockheader require noerror t err if txn txn groupctx nil t errorf signed transaction v did not verify txn x protocol encode txn var signedtx transactions signedtxn protocol decode x signedtx if txn signedtx groupctx nil t errorf signed transaction v did not verify txn leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
329,231
28,208,766,520
IssuesEvent
2023-04-05 01:01:37
dotnet/maui
https://api.github.com/repos/dotnet/maui
closed
[Android] Image is clipped during animation
t/bug area/image :framed_picture: area/controls 🎮 control-image s/try-latest-version
### Description On Windows I don't see this clipping, but on Android it's super obvious when doing a rotation and a translate together. https://user-images.githubusercontent.com/41873/168398831-dcde3c9b-7ac5-4f36-ab5a-8eb2cdb368a8.mp4 ### Steps to Reproduce [Animations.zip](https://github.com/dotnet/maui/files/8691658/Animations.zip) ### Version with bug Release Candidate 3 (current) ### Last version that worked well Unknown/Other ### Affected platforms Android ### Affected platform versions all ### Did you find any workaround? _No response_ ### Relevant log output _No response_
1.0
[Android] Image is clipped during animation - ### Description On Windows I don't see this clipping, but on Android it's super obvious when doing a rotation and a translate together. https://user-images.githubusercontent.com/41873/168398831-dcde3c9b-7ac5-4f36-ab5a-8eb2cdb368a8.mp4 ### Steps to Reproduce [Animations.zip](https://github.com/dotnet/maui/files/8691658/Animations.zip) ### Version with bug Release Candidate 3 (current) ### Last version that worked well Unknown/Other ### Affected platforms Android ### Affected platform versions all ### Did you find any workaround? _No response_ ### Relevant log output _No response_
non_priority
image is clipped during animation description on windows i don t see this clipping but on android it s super obvious when doing a rotation and a translate together steps to reproduce version with bug release candidate current last version that worked well unknown other affected platforms android affected platform versions all did you find any workaround no response relevant log output no response
0
255,470
27,484,967,642
IssuesEvent
2023-03-04 01:40:53
panasalap/linux-4.1.15
https://api.github.com/repos/panasalap/linux-4.1.15
closed
CVE-2018-18690 (Medium) detected in linux-yocto-4.1v4.1.17 - autoclosed
security vulnerability
## CVE-2018-18690 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.1v4.1.17</b></p></summary> <p> <p>[no description]</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.1>https://git.yoctoproject.org/git/linux-yocto-4.1</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_attr.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_attr.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form. <p>Publish Date: 2018-10-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-18690>CVE-2018-18690</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2018-18690">https://www.linuxkernelcves.com/cves/CVE-2018-18690</a></p> <p>Release Date: 2018-10-26</p> <p>Fix Resolution: v4.17-rc4,v3.16.62,v4.14.86,v4.4.172,v4.9.144</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-18690 (Medium) detected in linux-yocto-4.1v4.1.17 - autoclosed - ## CVE-2018-18690 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-4.1v4.1.17</b></p></summary> <p> <p>[no description]</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-4.1>https://git.yoctoproject.org/git/linux-yocto-4.1</a></p> <p>Found in HEAD commit: <a href="https://github.com/panasalap/linux-4.1.15/commit/aae4c2fa46027fd4c477372871df090c6b94f3f1">aae4c2fa46027fd4c477372871df090c6b94f3f1</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_attr.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/fs/xfs/libxfs/xfs_attr.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In the Linux kernel before 4.17, a local attacker able to set attributes on an xfs filesystem could make this filesystem non-operational until the next mount by triggering an unchecked error condition during an xfs attribute change, because xfs_attr_shortform_addname in fs/xfs/libxfs/xfs_attr.c mishandles ATTR_REPLACE operations with conversion of an attr from short to long form. <p>Publish Date: 2018-10-26 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-18690>CVE-2018-18690</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2018-18690">https://www.linuxkernelcves.com/cves/CVE-2018-18690</a></p> <p>Release Date: 2018-10-26</p> <p>Fix Resolution: v4.17-rc4,v3.16.62,v4.14.86,v4.4.172,v4.9.144</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux yocto autoclosed cve medium severity vulnerability vulnerable library linux yocto library home page a href found in head commit a href found in base branch master vulnerable source files fs xfs libxfs xfs attr c fs xfs libxfs xfs attr c vulnerability details in the linux kernel before a local attacker able to set attributes on an xfs filesystem could make this filesystem non operational until the next mount by triggering an unchecked error condition during an xfs attribute change because xfs attr shortform addname in fs xfs libxfs xfs attr c mishandles attr replace operations with conversion of an attr from short to long form publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
31,160
13,451,935,016
IssuesEvent
2020-09-08 21:08:35
badges/shields
https://api.github.com/repos/badges/shields
opened
Badge request : openuserjs.org, greasyfork.org
service-badge
:clipboard: **Description** <!-- A clear and concise description of the new badge. - Which service is this badge for e.g: GitHub, Travis CI - What sort of information should this badge show? Provide an example in plain text e.g: "version | v1.01" or as a static badge (static badge generator can be found at https://shields.io) --> Services : openuserjs.org, greasyfork.org Information : Install count, rating, version code Examples : ![OpenUserJS](https://img.shields.io/badge/OpenUserJS-3%20installs-%232c3e50) ![GreasyFork](https://img.shields.io/badge/GreasyFork-3%20installs-%23990000) :link: **Data** <!-- Where can we get the data from? - Is there a public API? - Does the API requires an API key? - Link to the API documentation. --> * No public API * No key needed Data can be directly accessed from the HTML file. :microphone: **Motivation** <!-- Please explain why this feature should be implemented and how it would be used. - What is the specific use case? --> This feature can help assert a certain "reputation" based on install count for public scripts. More specifically, I want to be able to show off that people have installed my userscript. <!-- Love Shields? Please consider donating $10 to sustain our activities: 👉 https://opencollective.com/shields -->
1.0
Badge request : openuserjs.org, greasyfork.org - :clipboard: **Description** <!-- A clear and concise description of the new badge. - Which service is this badge for e.g: GitHub, Travis CI - What sort of information should this badge show? Provide an example in plain text e.g: "version | v1.01" or as a static badge (static badge generator can be found at https://shields.io) --> Services : openuserjs.org, greasyfork.org Information : Install count, rating, version code Examples : ![OpenUserJS](https://img.shields.io/badge/OpenUserJS-3%20installs-%232c3e50) ![GreasyFork](https://img.shields.io/badge/GreasyFork-3%20installs-%23990000) :link: **Data** <!-- Where can we get the data from? - Is there a public API? - Does the API requires an API key? - Link to the API documentation. --> * No public API * No key needed Data can be directly accessed from the HTML file. :microphone: **Motivation** <!-- Please explain why this feature should be implemented and how it would be used. - What is the specific use case? --> This feature can help assert a certain "reputation" based on install count for public scripts. More specifically, I want to be able to show off that people have installed my userscript. <!-- Love Shields? Please consider donating $10 to sustain our activities: 👉 https://opencollective.com/shields -->
non_priority
badge request openuserjs org greasyfork org clipboard description a clear and concise description of the new badge which service is this badge for e g github travis ci what sort of information should this badge show provide an example in plain text e g version or as a static badge static badge generator can be found at services openuserjs org greasyfork org information install count rating version code examples link data where can we get the data from is there a public api does the api requires an api key link to the api documentation no public api no key needed data can be directly accessed from the html file microphone motivation please explain why this feature should be implemented and how it would be used what is the specific use case this feature can help assert a certain reputation based on install count for public scripts more specifically i want to be able to show off that people have installed my userscript love shields please consider donating to sustain our activities 👉
0
162,208
25,499,153,288
IssuesEvent
2022-11-28 01:12:24
tesshucom/jpsonic
https://api.github.com/repos/tesshucom/jpsonic
closed
Split MediaScannerService
type: enhancement status: pending-design-work in: test in: data-scan
- An interface for MediaScannerService will be created. - The implementation class of MediaScannerService will be divided into several classes in its subpackages - Intuitively, it will be divided into 4 or 5 classes. - A test is added to the class here - Scan-related fixes in v111.6.0 will be made to the post-split classes <details> <summary>According to the sonatype-lift analysis</summary> MediaScannerService is a slightly complex class. Sonatype seems to compare the complexity and update frequency of each class and make such a suggestion. Jpsonic has undergone quite extensive and numerous modifications to correct issues pointed out by various static analysis tools. Therefore, the proposal has some credibility. > #### Refactor God Classes Graphical Overview > This chart suggests which God Class you may wish to fix first, based on the class's Change Proneness vs Effort to Fix. Classes on the top left of the graph are considered higher priority, because they are edited often and are easier to refactor. > ![image](https://user-images.githubusercontent.com/27724847/203266374-142ffc9b-5913-4407-bd53-fcd02e7db617.png) - Sonatype points out 26 God Classes - Subsonic is relatively designed to avoid unnecessary increase in class files. - Airsonic continues that trend. An example of explicit design division in Airsonic is the division of SearchService. No other dramatic changes. - In Jpsonic, the modification was done fairly faithfully according to the per-method complexity check (PMD/Codacy). Simply put, the emphasis is on test convenience, and the methods are very granular. On the other hand, at this stage, the increase of God class is out of consciousness. - There is no point in correcting all these - However, some classes will be candidates. Among these, it is worth paying attention to the classes in which issues are currently concentrated. Perhaps the class should be split before resolving the Issues as a whole. - By doing so, it will be easier to clarify the location and relevance of functional modifications, make it easier to create unit tests, and make it easier to scrutinize coverage. </details>
1.0
Split MediaScannerService - - An interface for MediaScannerService will be created. - The implementation class of MediaScannerService will be divided into several classes in its subpackages - Intuitively, it will be divided into 4 or 5 classes. - A test is added to the class here - Scan-related fixes in v111.6.0 will be made to the post-split classes <details> <summary>According to the sonatype-lift analysis</summary> MediaScannerService is a slightly complex class. Sonatype seems to compare the complexity and update frequency of each class and make such a suggestion. Jpsonic has undergone quite extensive and numerous modifications to correct issues pointed out by various static analysis tools. Therefore, the proposal has some credibility. > #### Refactor God Classes Graphical Overview > This chart suggests which God Class you may wish to fix first, based on the class's Change Proneness vs Effort to Fix. Classes on the top left of the graph are considered higher priority, because they are edited often and are easier to refactor. > ![image](https://user-images.githubusercontent.com/27724847/203266374-142ffc9b-5913-4407-bd53-fcd02e7db617.png) - Sonatype points out 26 God Classes - Subsonic is relatively designed to avoid unnecessary increase in class files. - Airsonic continues that trend. An example of explicit design division in Airsonic is the division of SearchService. No other dramatic changes. - In Jpsonic, the modification was done fairly faithfully according to the per-method complexity check (PMD/Codacy). Simply put, the emphasis is on test convenience, and the methods are very granular. On the other hand, at this stage, the increase of God class is out of consciousness. - There is no point in correcting all these - However, some classes will be candidates. Among these, it is worth paying attention to the classes in which issues are currently concentrated. Perhaps the class should be split before resolving the Issues as a whole. - By doing so, it will be easier to clarify the location and relevance of functional modifications, make it easier to create unit tests, and make it easier to scrutinize coverage. </details>
non_priority
split mediascannerservice an interface for mediascannerservice will be created the implementation class of mediascannerservice will be divided into several classes in its subpackages intuitively it will be divided into or classes a test is added to the class here scan related fixes in will be made to the post split classes according to the sonatype lift analysis mediascannerservice is a slightly complex class sonatype seems to compare the complexity and update frequency of each class and make such a suggestion jpsonic has undergone quite extensive and numerous modifications to correct issues pointed out by various static analysis tools therefore the proposal has some credibility refactor god classes graphical overview this chart suggests which god class you may wish to fix first based on the class s change proneness vs effort to fix classes on the top left of the graph are considered higher priority because they are edited often and are easier to refactor sonatype points out god classes subsonic is relatively designed to avoid unnecessary increase in class files airsonic continues that trend an example of explicit design division in airsonic is the division of searchservice no other dramatic changes in jpsonic the modification was done fairly faithfully according to the per method complexity check pmd codacy simply put the emphasis is on test convenience and the methods are very granular on the other hand at this stage the increase of god class is out of consciousness there is no point in correcting all these however some classes will be candidates among these it is worth paying attention to the classes in which issues are currently concentrated perhaps the class should be split before resolving the issues as a whole by doing so it will be easier to clarify the location and relevance of functional modifications make it easier to create unit tests and make it easier to scrutinize coverage
0
211,242
23,805,531,965
IssuesEvent
2022-09-04 01:05:04
AlexRogalskiy/quotes
https://api.github.com/repos/AlexRogalskiy/quotes
opened
WS-2022-0284 (Medium) detected in moment-timezone-0.5.33.tgz
security vulnerability
## WS-2022-0284 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-timezone-0.5.33.tgz</b></p></summary> <p>Parse and display moments in any timezone.</p> <p>Library home page: <a href="https://registry.npmjs.org/moment-timezone/-/moment-timezone-0.5.33.tgz">https://registry.npmjs.org/moment-timezone/-/moment-timezone-0.5.33.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/moment-timezone/package.json</p> <p> Dependency Hierarchy: - node-cron-3.0.0.tgz (Root Library) - :x: **moment-timezone-0.5.33.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/quotes/commit/e85db90256a7cfed4675f37b1d93c11e6790a18f">e85db90256a7cfed4675f37b1d93c11e6790a18f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Cleartext Transmission of Sensitive Information in moment-timezone <p>Publish Date: 2022-08-30 <p>URL: <a href=https://github.com/moment/moment-timezone/commit/7915ac567ab19700e44ad6b5d8ef0b85e48a9e75>WS-2022-0284</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-v78c-4p63-2j6c">https://github.com/advisories/GHSA-v78c-4p63-2j6c</a></p> <p>Release Date: 2022-08-30</p> <p>Fix Resolution (moment-timezone): 0.5.35</p> <p>Direct dependency fix Resolution (node-cron): 3.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2022-0284 (Medium) detected in moment-timezone-0.5.33.tgz - ## WS-2022-0284 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-timezone-0.5.33.tgz</b></p></summary> <p>Parse and display moments in any timezone.</p> <p>Library home page: <a href="https://registry.npmjs.org/moment-timezone/-/moment-timezone-0.5.33.tgz">https://registry.npmjs.org/moment-timezone/-/moment-timezone-0.5.33.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/moment-timezone/package.json</p> <p> Dependency Hierarchy: - node-cron-3.0.0.tgz (Root Library) - :x: **moment-timezone-0.5.33.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/quotes/commit/e85db90256a7cfed4675f37b1d93c11e6790a18f">e85db90256a7cfed4675f37b1d93c11e6790a18f</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Cleartext Transmission of Sensitive Information in moment-timezone <p>Publish Date: 2022-08-30 <p>URL: <a href=https://github.com/moment/moment-timezone/commit/7915ac567ab19700e44ad6b5d8ef0b85e48a9e75>WS-2022-0284</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-v78c-4p63-2j6c">https://github.com/advisories/GHSA-v78c-4p63-2j6c</a></p> <p>Release Date: 2022-08-30</p> <p>Fix Resolution (moment-timezone): 0.5.35</p> <p>Direct dependency fix Resolution (node-cron): 3.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in moment timezone tgz ws medium severity vulnerability vulnerable library moment timezone tgz parse and display moments in any timezone library home page a href path to dependency file package json path to vulnerable library node modules moment timezone package json dependency hierarchy node cron tgz root library x moment timezone tgz vulnerable library found in head commit a href found in base branch master vulnerability details cleartext transmission of sensitive information in moment timezone publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution moment timezone direct dependency fix resolution node cron step up your open source security game with mend
0
20,020
14,927,500,144
IssuesEvent
2021-01-24 15:42:23
drawpile/Drawpile
https://api.github.com/repos/drawpile/Drawpile
closed
Feature Request: Smoothing per brush?
Usability
Possible to maybe have the smoothing be applied per brush if possible? Sometimes smoothing works great for drawing, but then for details or writing, it tends to interfere.
True
Feature Request: Smoothing per brush? - Possible to maybe have the smoothing be applied per brush if possible? Sometimes smoothing works great for drawing, but then for details or writing, it tends to interfere.
non_priority
feature request smoothing per brush possible to maybe have the smoothing be applied per brush if possible sometimes smoothing works great for drawing but then for details or writing it tends to interfere
0
81,376
10,132,085,987
IssuesEvent
2019-08-01 21:17:43
GoogleChrome/devsummit
https://api.github.com/repos/GoogleChrome/devsummit
opened
Social icons
design
ticket in response to #151 where we're chatting about which icons should stay and which should go. currently in designs: - twitter - youtube - email - chrome developers - chromium should be in designs: - twitter - youtube - ??? #### Essentially Let's avoid filling this area up for no reason and/or forgetting people. Curious if we have analytics about social icon performance, like click rates. Maybe we can make this decision data driven? Curious too what the minimal icons are that marketing thinks are most important.
1.0
Social icons - ticket in response to #151 where we're chatting about which icons should stay and which should go. currently in designs: - twitter - youtube - email - chrome developers - chromium should be in designs: - twitter - youtube - ??? #### Essentially Let's avoid filling this area up for no reason and/or forgetting people. Curious if we have analytics about social icon performance, like click rates. Maybe we can make this decision data driven? Curious too what the minimal icons are that marketing thinks are most important.
non_priority
social icons ticket in response to where we re chatting about which icons should stay and which should go currently in designs twitter youtube email chrome developers chromium should be in designs twitter youtube essentially let s avoid filling this area up for no reason and or forgetting people curious if we have analytics about social icon performance like click rates maybe we can make this decision data driven curious too what the minimal icons are that marketing thinks are most important
0
102,475
32,011,333,709
IssuesEvent
2023-09-21 18:13:24
golang/go
https://api.github.com/repos/golang/go
opened
x/build/cmd/relui: migrate off buildlets
Builders
relui depends heavily on gomotes/buildlets for various tasks. As the LUCI migration progresses we have better alternatives to most of those uses. To reduce our dependency on the old infrastructure, stop using them wherever possible. The full list of uses: - [ ] Running tests and advisory trybots - [ ] Building distpacks - [ ] Running miscellaneous codegen scripts - [ ] Building installers - [ ] Reproducing distpacks on Windows cc @golang/release
1.0
x/build/cmd/relui: migrate off buildlets - relui depends heavily on gomotes/buildlets for various tasks. As the LUCI migration progresses we have better alternatives to most of those uses. To reduce our dependency on the old infrastructure, stop using them wherever possible. The full list of uses: - [ ] Running tests and advisory trybots - [ ] Building distpacks - [ ] Running miscellaneous codegen scripts - [ ] Building installers - [ ] Reproducing distpacks on Windows cc @golang/release
non_priority
x build cmd relui migrate off buildlets relui depends heavily on gomotes buildlets for various tasks as the luci migration progresses we have better alternatives to most of those uses to reduce our dependency on the old infrastructure stop using them wherever possible the full list of uses running tests and advisory trybots building distpacks running miscellaneous codegen scripts building installers reproducing distpacks on windows cc golang release
0
293,501
25,298,551,033
IssuesEvent
2022-11-17 08:58:59
jdi-testing/jdi-light
https://api.github.com/repos/jdi-testing/jdi-light
closed
Update test-site: element Icon
TestSite Vuetify
Need to add testable features: - [x] accessibility (aria-hidden) - [x] theme (dark) - [x] enabled/disabled
1.0
Update test-site: element Icon - Need to add testable features: - [x] accessibility (aria-hidden) - [x] theme (dark) - [x] enabled/disabled
non_priority
update test site element icon need to add testable features accessibility aria hidden theme dark enabled disabled
0
38,826
15,801,809,350
IssuesEvent
2021-04-03 06:40:09
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Resource Health alerting
Pri2 assigned-to-author doc-enhancement service-health/svc triaged
this part appears to be out of date ? https://docs.microsoft.com/en-us/azure/service-health/resource-health-faq#can-i-integrate-resource-health-with-my-monitoring-tools --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: f40ab2aa-4a6d-abb0-f651-22c5c0b2c202 * Version Independent ID: db7c4d4d-32e1-13cf-4fe8-ec42b18a0d10 * Content: [Azure Resource Health FAQ](https://docs.microsoft.com/en-us/azure/service-health/resource-health-faq#can-i-integrate-resource-health-with-my-monitoring-tools) * Content Source: [articles/service-health/resource-health-faq.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-health/resource-health-faq.md) * Service: **service-health** * GitHub Login: @BernardoAMunoz * Microsoft Alias: **BernardoAMunoz**
1.0
Resource Health alerting - this part appears to be out of date ? https://docs.microsoft.com/en-us/azure/service-health/resource-health-faq#can-i-integrate-resource-health-with-my-monitoring-tools --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: f40ab2aa-4a6d-abb0-f651-22c5c0b2c202 * Version Independent ID: db7c4d4d-32e1-13cf-4fe8-ec42b18a0d10 * Content: [Azure Resource Health FAQ](https://docs.microsoft.com/en-us/azure/service-health/resource-health-faq#can-i-integrate-resource-health-with-my-monitoring-tools) * Content Source: [articles/service-health/resource-health-faq.md](https://github.com/Microsoft/azure-docs/blob/master/articles/service-health/resource-health-faq.md) * Service: **service-health** * GitHub Login: @BernardoAMunoz * Microsoft Alias: **BernardoAMunoz**
non_priority
resource health alerting this part appears to be out of date document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service service health github login bernardoamunoz microsoft alias bernardoamunoz
0
151,322
12,032,348,224
IssuesEvent
2020-04-13 11:55:38
passantelsadek/passmh
https://api.github.com/repos/passantelsadek/passmh
opened
where can I find the bug
basabes fb fine hello help passit tag tagtag test-again testing testing-now testtest whats
# :clipboard: Bug Details >where can I find the bug key | value --|-- Reported At | 2019-08-29 20:04:37 UTC Email | pelsadek@gmail.com Categories | Ask a question Tags | hello, testtest, fine, passit, tag, tagtag, testing, help, whats, fb, testing-now, test-again, basabes App Version | 1.0 (1) Session Duration | 17 Device | Google Android SDK built for x86, OS Level 28 Display | 1080x1920 (xhdpi) Location | Cairo, Egypt (en) ## :point_right: [View Full Bug Report on Instabug](https://dashboard.instabug.com/applications/passant-on-boarding/live/bugs/2?utm_source=github&utm_medium=integrations) :point_left: ___ # :camera: Images [![image attachment](https://s3.us-east-1.amazonaws.com/instabug-pro/attachments/bugs/9830873/fd965bf6047f05abeceaf8655b2126e4_one_bug_thumb/9501699/bug_1567109073759_.jpg?1567109107)](https://s3.us-east-1.amazonaws.com/instabug-pro/attachments/bugs/9830873/fd965bf6047f05abeceaf8655b2126e4_original/9501699/bug_1567109073759_.jpg?1567109107) ___ # :warning: Looking for More Details? 1. **Session Profiler**: [**enable them**](https://docs.instabug.com/docs/android-session-profiler?utm_source=github&utm_medium=integrations) to get the most out of your plan and see the changes in the CPU, memory, storage, connectivity, battery, and orientation of the app before the bug was reported. 2. **Network Log**: we are unable to capture your network requests automatically. If you are using HttpUrlConnection or Okhttp requests, [**check the details mentioned here**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations#section-network-logs). 3. **User Steps**: [**enable them**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations#section-user-steps) to get the most out of your plan and see every action users take before reporting a bug. 4. **User Events**: start capturing custom User Events to send them along with each report. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations). 5. **Instabug Log**: start adding Instabug logs to see them right inside each report you receive. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations). 6. **Console Log**: when enabled you will see them right inside each report you receive. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations).
5.0
where can I find the bug - # :clipboard: Bug Details >where can I find the bug key | value --|-- Reported At | 2019-08-29 20:04:37 UTC Email | pelsadek@gmail.com Categories | Ask a question Tags | hello, testtest, fine, passit, tag, tagtag, testing, help, whats, fb, testing-now, test-again, basabes App Version | 1.0 (1) Session Duration | 17 Device | Google Android SDK built for x86, OS Level 28 Display | 1080x1920 (xhdpi) Location | Cairo, Egypt (en) ## :point_right: [View Full Bug Report on Instabug](https://dashboard.instabug.com/applications/passant-on-boarding/live/bugs/2?utm_source=github&utm_medium=integrations) :point_left: ___ # :camera: Images [![image attachment](https://s3.us-east-1.amazonaws.com/instabug-pro/attachments/bugs/9830873/fd965bf6047f05abeceaf8655b2126e4_one_bug_thumb/9501699/bug_1567109073759_.jpg?1567109107)](https://s3.us-east-1.amazonaws.com/instabug-pro/attachments/bugs/9830873/fd965bf6047f05abeceaf8655b2126e4_original/9501699/bug_1567109073759_.jpg?1567109107) ___ # :warning: Looking for More Details? 1. **Session Profiler**: [**enable them**](https://docs.instabug.com/docs/android-session-profiler?utm_source=github&utm_medium=integrations) to get the most out of your plan and see the changes in the CPU, memory, storage, connectivity, battery, and orientation of the app before the bug was reported. 2. **Network Log**: we are unable to capture your network requests automatically. If you are using HttpUrlConnection or Okhttp requests, [**check the details mentioned here**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations#section-network-logs). 3. **User Steps**: [**enable them**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations#section-user-steps) to get the most out of your plan and see every action users take before reporting a bug. 4. **User Events**: start capturing custom User Events to send them along with each report. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations). 5. **Instabug Log**: start adding Instabug logs to see them right inside each report you receive. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations). 6. **Console Log**: when enabled you will see them right inside each report you receive. [**Find all the details in the docs**](https://docs.instabug.com/docs/android-logging?utm_source=github&utm_medium=integrations).
non_priority
where can i find the bug clipboard bug details where can i find the bug key value reported at utc email pelsadek gmail com categories ask a question tags hello testtest fine passit tag tagtag testing help whats fb testing now test again basabes app version session duration device google android sdk built for os level display xhdpi location cairo egypt en point right point left camera images warning looking for more details session profiler to get the most out of your plan and see the changes in the cpu memory storage connectivity battery and orientation of the app before the bug was reported network log we are unable to capture your network requests automatically if you are using httpurlconnection or okhttp requests user steps to get the most out of your plan and see every action users take before reporting a bug user events start capturing custom user events to send them along with each report instabug log start adding instabug logs to see them right inside each report you receive console log when enabled you will see them right inside each report you receive
0
221,682
24,656,939,753
IssuesEvent
2022-10-18 01:04:13
zurichat/zc_main
https://api.github.com/repos/zurichat/zc_main
opened
CVE-2022-37603 (High) detected in loader-utils-2.0.0.tgz
security vulnerability
## CVE-2022-37603 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>loader-utils-2.0.0.tgz</b></p></summary> <p>utils for webpack loaders</p> <p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.0.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.0.tgz</a></p> <p> Dependency Hierarchy: - @zuri/root-config-1.0.0.tgz (Root Library) - webpack-config-single-spa-react-4.0.2.tgz - webpack-config-single-spa-5.1.1.tgz - css-loader-5.2.7.tgz - :x: **loader-utils-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/zurichat/zc_main/commit/b144247b62e851190fe052db385e082185524e69">b144247b62e851190fe052db385e082185524e69</a></p> <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. <p>Publish Date: 2022-10-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37603>CVE-2022-37603</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-14</p> <p>Fix Resolution: loader-utils - 3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-37603 (High) detected in loader-utils-2.0.0.tgz - ## CVE-2022-37603 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>loader-utils-2.0.0.tgz</b></p></summary> <p>utils for webpack loaders</p> <p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.0.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.0.tgz</a></p> <p> Dependency Hierarchy: - @zuri/root-config-1.0.0.tgz (Root Library) - webpack-config-single-spa-react-4.0.2.tgz - webpack-config-single-spa-5.1.1.tgz - css-loader-5.2.7.tgz - :x: **loader-utils-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/zurichat/zc_main/commit/b144247b62e851190fe052db385e082185524e69">b144247b62e851190fe052db385e082185524e69</a></p> <p>Found in base branch: <b>dev</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the url variable in interpolateName.js. <p>Publish Date: 2022-10-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37603>CVE-2022-37603</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-14</p> <p>Fix Resolution: loader-utils - 3.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in loader utils tgz cve high severity vulnerability vulnerable library loader utils tgz utils for webpack loaders library home page a href dependency hierarchy zuri root config tgz root library webpack config single spa react tgz webpack config single spa tgz css loader tgz x loader utils tgz vulnerable library found in head commit a href found in base branch dev vulnerability details a regular expression denial of service redos flaw was found in function interpolatename in interpolatename js in webpack loader utils via the url variable in interpolatename js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution loader utils step up your open source security game with mend
0