Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
16,747
4,082,510,585
IssuesEvent
2016-05-31 13:09:58
punkave/apostrophe
https://api.github.com/repos/punkave/apostrophe
closed
Pass data to widget editor template
documentation question review
I have created a widget called `image` which is based on the `slideshow` and i added additional user options. In my `imageEditor.html` i would like to have some dynamic data. Is that something that is possible or are you planning to add that possibility? Right now i'm doing this: {{ formSelect('proportions', 'Proportions', [{ value: 'keep', label: 'Keep proportions'}, { value: 'img-square', label: 'square'}, { value: 'img-16-9', label: '16:9'}]) }} But ideally i could set up the possible values in `index.js` or `editor.js`
1.0
Pass data to widget editor template - I have created a widget called `image` which is based on the `slideshow` and i added additional user options. In my `imageEditor.html` i would like to have some dynamic data. Is that something that is possible or are you planning to add that possibility? Right now i'm doing this: {{ formSelect('proportions', 'Proportions', [{ value: 'keep', label: 'Keep proportions'}, { value: 'img-square', label: 'square'}, { value: 'img-16-9', label: '16:9'}]) }} But ideally i could set up the possible values in `index.js` or `editor.js`
non_priority
pass data to widget editor template i have created a widget called image which is based on the slideshow and i added additional user options in my imageeditor html i would like to have some dynamic data is that something that is possible or are you planning to add that possibility right now i m doing this formselect proportions proportions but ideally i could set up the possible values in index js or editor js
0
181,670
21,664,427,552
IssuesEvent
2022-05-07 01:19:13
n-devs/Blah-Blah-Blah
https://api.github.com/repos/n-devs/Blah-Blah-Blah
closed
WS-2019-0047 (Medium) detected in tar-2.2.1.tgz - autoclosed
security vulnerability
## WS-2019-0047 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-2.2.1.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p> Dependency Hierarchy: - babel-cli-6.24.1.tgz (Root Library) - chokidar-1.7.0.tgz - fsevents-1.1.2.tgz - node-pre-gyp-0.6.36.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/n-psk/Blah-Blah-Blah/commits/db92da8f4e96fdf292e596c45296e32cef913e69">db92da8f4e96fdf292e596c45296e32cef913e69</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of node-tar prior to 4.4.2 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8>WS-2019-0047</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/803">https://www.npmjs.com/advisories/803</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: 4.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0047 (Medium) detected in tar-2.2.1.tgz - autoclosed - ## WS-2019-0047 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-2.2.1.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p> Dependency Hierarchy: - babel-cli-6.24.1.tgz (Root Library) - chokidar-1.7.0.tgz - fsevents-1.1.2.tgz - node-pre-gyp-0.6.36.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/n-psk/Blah-Blah-Blah/commits/db92da8f4e96fdf292e596c45296e32cef913e69">db92da8f4e96fdf292e596c45296e32cef913e69</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Versions of node-tar prior to 4.4.2 are vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink will overwrite the system's file with the contents of the extracted file. <p>Publish Date: 2019-04-05 <p>URL: <a href=https://github.com/npm/node-tar/commit/b0c58433c22f5e7fe8b1c76373f27e3f81dcd4c8>WS-2019-0047</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>5.0</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/803">https://www.npmjs.com/advisories/803</a></p> <p>Release Date: 2019-04-05</p> <p>Fix Resolution: 4.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in tar tgz autoclosed ws medium severity vulnerability vulnerable library tar tgz tar for node library home page a href dependency hierarchy babel cli tgz root library chokidar tgz fsevents tgz node pre gyp tgz x tar tgz vulnerable library found in head commit a href vulnerability details versions of node tar prior to are vulnerable to arbitrary file overwrite extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system s file with the contents of the extracted file publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
28,111
23,018,221,924
IssuesEvent
2022-07-22 00:27:52
coiled/coiled-runtime
https://api.github.com/repos/coiled/coiled-runtime
closed
Bring benchmarking framework online
infrastructure
As part of https://github.com/coiled/coiled-runtime/issues/148, after decisions have been made on https://github.com/coiled/coiled-runtime/issues/186 and https://github.com/coiled/coiled-runtime/issues/187, we should make the relevant code changes to get our benchmarking framework up and running
1.0
Bring benchmarking framework online - As part of https://github.com/coiled/coiled-runtime/issues/148, after decisions have been made on https://github.com/coiled/coiled-runtime/issues/186 and https://github.com/coiled/coiled-runtime/issues/187, we should make the relevant code changes to get our benchmarking framework up and running
non_priority
bring benchmarking framework online as part of after decisions have been made on and we should make the relevant code changes to get our benchmarking framework up and running
0
24,148
12,224,840,442
IssuesEvent
2020-05-03 01:10:38
dprint/dprint
https://api.github.com/repos/dprint/dprint
opened
Conditional save point reverting
internal performance
The printer currently always jumps back to save points. For performance reasons, it shouldn't jump back unless it needs to because then it just wastes time reprinting the same thing. To implement this, the printer will need to be able to resolve conditions as if the state of the printer were back at the save point.
True
Conditional save point reverting - The printer currently always jumps back to save points. For performance reasons, it shouldn't jump back unless it needs to because then it just wastes time reprinting the same thing. To implement this, the printer will need to be able to resolve conditions as if the state of the printer were back at the save point.
non_priority
conditional save point reverting the printer currently always jumps back to save points for performance reasons it shouldn t jump back unless it needs to because then it just wastes time reprinting the same thing to implement this the printer will need to be able to resolve conditions as if the state of the printer were back at the save point
0
218,362
24,355,421,294
IssuesEvent
2022-10-03 06:56:51
samqws-marketing/walmartlabs-concord
https://api.github.com/repos/samqws-marketing/walmartlabs-concord
opened
WS-2022-0322 (Medium) detected in d3-color-2.0.0.tgz
security vulnerability
## WS-2022-0322 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>d3-color-2.0.0.tgz</b></p></summary> <p>Color spaces! RGB, HSL, Cubehelix, Lab and HCL (Lch).</p> <p>Library home page: <a href="https://registry.npmjs.org/d3-color/-/d3-color-2.0.0.tgz">https://registry.npmjs.org/d3-color/-/d3-color-2.0.0.tgz</a></p> <p>Path to dependency file: /console2/package.json</p> <p>Path to vulnerable library: /console2/node_modules/d3-color/package.json</p> <p> Dependency Hierarchy: - d3-6.7.0.tgz (Root Library) - :x: **d3-color-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/b9420f3b9e73a9d381266ece72f7afb756f35a76">b9420f3b9e73a9d381266ece72f7afb756f35a76</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The d3-color module provides representations for various color spaces in the browser. Versions prior to 3.1.0 are vulnerable to a Regular expression Denial of Service. This issue has been patched in version 3.1.0. There are no known workarounds. <p>Publish Date: 2022-09-29 <p>URL: <a href=https://github.com/d3/d3-color/commit/994d8fd95181484a5a27c5edc919aa625781432d>WS-2022-0322</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-36jr-mh4h-2g58">https://github.com/advisories/GHSA-36jr-mh4h-2g58</a></p> <p>Release Date: 2022-09-29</p> <p>Fix Resolution (d3-color): 3.1.0</p> <p>Direct dependency fix Resolution (d3): 7.0.0</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
True
WS-2022-0322 (Medium) detected in d3-color-2.0.0.tgz - ## WS-2022-0322 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>d3-color-2.0.0.tgz</b></p></summary> <p>Color spaces! RGB, HSL, Cubehelix, Lab and HCL (Lch).</p> <p>Library home page: <a href="https://registry.npmjs.org/d3-color/-/d3-color-2.0.0.tgz">https://registry.npmjs.org/d3-color/-/d3-color-2.0.0.tgz</a></p> <p>Path to dependency file: /console2/package.json</p> <p>Path to vulnerable library: /console2/node_modules/d3-color/package.json</p> <p> Dependency Hierarchy: - d3-6.7.0.tgz (Root Library) - :x: **d3-color-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/samqws-marketing/walmartlabs-concord/commit/b9420f3b9e73a9d381266ece72f7afb756f35a76">b9420f3b9e73a9d381266ece72f7afb756f35a76</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The d3-color module provides representations for various color spaces in the browser. Versions prior to 3.1.0 are vulnerable to a Regular expression Denial of Service. This issue has been patched in version 3.1.0. There are no known workarounds. <p>Publish Date: 2022-09-29 <p>URL: <a href=https://github.com/d3/d3-color/commit/994d8fd95181484a5a27c5edc919aa625781432d>WS-2022-0322</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-36jr-mh4h-2g58">https://github.com/advisories/GHSA-36jr-mh4h-2g58</a></p> <p>Release Date: 2022-09-29</p> <p>Fix Resolution (d3-color): 3.1.0</p> <p>Direct dependency fix Resolution (d3): 7.0.0</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END -->
non_priority
ws medium detected in color tgz ws medium severity vulnerability vulnerable library color tgz color spaces rgb hsl cubehelix lab and hcl lch library home page a href path to dependency file package json path to vulnerable library node modules color package json dependency hierarchy tgz root library x color tgz vulnerable library found in head commit a href found in base branch master vulnerability details the color module provides representations for various color spaces in the browser versions prior to are vulnerable to a regular expression denial of service this issue has been patched in version there are no known workarounds publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution color direct dependency fix resolution check this box to open an automated fix pr
0
62,470
8,614,308,599
IssuesEvent
2018-11-19 17:07:32
open-contracting/kingfisher
https://api.github.com/repos/open-contracting/kingfisher
closed
Write demonstration script in /bin
documentation
The work here is to write and maintain script(s) in /bin that make use of, and serve to demonstrate the functionality and expected usage of the ocdsdata library. This will be hard to call Done, as it's a moving target. During development, the expectation is that this script will be updated alongside tests and the library itself.
1.0
Write demonstration script in /bin - The work here is to write and maintain script(s) in /bin that make use of, and serve to demonstrate the functionality and expected usage of the ocdsdata library. This will be hard to call Done, as it's a moving target. During development, the expectation is that this script will be updated alongside tests and the library itself.
non_priority
write demonstration script in bin the work here is to write and maintain script s in bin that make use of and serve to demonstrate the functionality and expected usage of the ocdsdata library this will be hard to call done as it s a moving target during development the expectation is that this script will be updated alongside tests and the library itself
0
88,820
15,820,494,808
IssuesEvent
2021-04-05 19:03:36
dmyers87/tika
https://api.github.com/repos/dmyers87/tika
closed
CVE-2020-10673 (High) detected in jackson-databind-2.9.9.2.jar - autoclosed
security vulnerability
## CVE-2020-10673 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: tika/tika-parsers/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9.2/jackson-databind-2.9.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/dmyers87/tika/commit/b0634f6d9bc18cc79f623715d40c9e8ed98924fc">b0634f6d9bc18cc79f623715d40c9e8ed98924fc</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus). <p>Publish Date: 2020-03-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673>CVE-2020-10673</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2660">https://github.com/FasterXML/jackson-databind/issues/2660</a></p> <p>Release Date: 2020-03-18</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.9.2","packageFilePaths":["/tika-parsers/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-10673","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-10673 (High) detected in jackson-databind-2.9.9.2.jar - autoclosed - ## CVE-2020-10673 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.9.2.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: tika/tika-parsers/pom.xml</p> <p>Path to vulnerable library: canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.9.2/jackson-databind-2.9.9.2.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.9.2.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/dmyers87/tika/commit/b0634f6d9bc18cc79f623715d40c9e8ed98924fc">b0634f6d9bc18cc79f623715d40c9e8ed98924fc</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus). <p>Publish Date: 2020-03-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673>CVE-2020-10673</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2660">https://github.com/FasterXML/jackson-databind/issues/2660</a></p> <p>Release Date: 2020-03-18</p> <p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p> </p> </details> <p></p> *** <!-- REMEDIATE-OPEN-PR-START --> - [ ] Check this box to open an automated fix PR <!-- REMEDIATE-OPEN-PR-END --> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.9.2","packageFilePaths":["/tika-parsers/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.9.2","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-10673","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tika tika parsers pom xml path to vulnerable library canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com caucho config types resourceref aka caucho quercus publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind check this box to open an automated fix pr isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com caucho config types resourceref aka caucho quercus vulnerabilityurl
0
42,610
12,908,995,067
IssuesEvent
2020-07-15 08:26:00
NixOS/nixpkgs
https://api.github.com/repos/NixOS/nixpkgs
closed
Vulnerability roundup 77: binutils-2.31.1: 3 advisories
1.severity: security
[search](https://search.nix.gsc.io/?q=binutils&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=binutils+in%3Apath&type=Code) * [ ] [CVE-2018-17358](https://nvd.nist.gov/vuln/detail/CVE-2018-17358) (nixos-19.09) * [ ] [CVE-2018-17359](https://nvd.nist.gov/vuln/detail/CVE-2018-17359) (nixos-19.09) * [ ] [CVE-2018-17360](https://nvd.nist.gov/vuln/detail/CVE-2018-17360) (nixos-19.09) Scanned versions: nixos-19.09: 5f506b95f9f. May contain false positives.
True
Vulnerability roundup 77: binutils-2.31.1: 3 advisories - [search](https://search.nix.gsc.io/?q=binutils&i=fosho&repos=NixOS-nixpkgs), [files](https://github.com/NixOS/nixpkgs/search?utf8=%E2%9C%93&q=binutils+in%3Apath&type=Code) * [ ] [CVE-2018-17358](https://nvd.nist.gov/vuln/detail/CVE-2018-17358) (nixos-19.09) * [ ] [CVE-2018-17359](https://nvd.nist.gov/vuln/detail/CVE-2018-17359) (nixos-19.09) * [ ] [CVE-2018-17360](https://nvd.nist.gov/vuln/detail/CVE-2018-17360) (nixos-19.09) Scanned versions: nixos-19.09: 5f506b95f9f. May contain false positives.
non_priority
vulnerability roundup binutils advisories nixos nixos nixos scanned versions nixos may contain false positives
0
21,721
14,739,070,080
IssuesEvent
2021-01-07 06:24:58
kdjstudios/SABillingGitlab
https://api.github.com/repos/kdjstudios/SABillingGitlab
closed
Report - Summary Billing Journal is not working
anc-infrastructure ant-bug ant-child/secondary
In GitLab by @pchaudhary on Aug 29, 2018, 07:33 Summary Billing Journal report page is throwing an error page.
1.0
Report - Summary Billing Journal is not working - In GitLab by @pchaudhary on Aug 29, 2018, 07:33 Summary Billing Journal report page is throwing an error page.
non_priority
report summary billing journal is not working in gitlab by pchaudhary on aug summary billing journal report page is throwing an error page
0
92,988
15,872,942,048
IssuesEvent
2021-04-09 01:09:00
fbennets/HCLC-GDPR-Bot
https://api.github.com/repos/fbennets/HCLC-GDPR-Bot
opened
CVE-2020-35912 (Medium) detected in lock_api-0.4.0.crate
security vulnerability
## CVE-2020-35912 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lock_api-0.4.0.crate</b></p></summary> <p>Wrappers to create fully-featured Mutex and RwLock types. Compatible with no_std.</p> <p>Library home page: <a href="https://crates.io/api/v1/crates/lock_api/0.4.0/download">https://crates.io/api/v1/crates/lock_api/0.4.0/download</a></p> <p> Dependency Hierarchy: - pyo3-0.11.1.crate (Root Library) - parking_lot-0.11.0.crate - :x: **lock_api-0.4.0.crate** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness. <p>Publish Date: 2020-12-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35912>CVE-2020-35912</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/Amanieu/parking_lot/releases/tag/lock_api-0.4.2">https://github.com/Amanieu/parking_lot/releases/tag/lock_api-0.4.2</a></p> <p>Release Date: 2020-12-31</p> <p>Fix Resolution: lock_api-0.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-35912 (Medium) detected in lock_api-0.4.0.crate - ## CVE-2020-35912 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>lock_api-0.4.0.crate</b></p></summary> <p>Wrappers to create fully-featured Mutex and RwLock types. Compatible with no_std.</p> <p>Library home page: <a href="https://crates.io/api/v1/crates/lock_api/0.4.0/download">https://crates.io/api/v1/crates/lock_api/0.4.0/download</a></p> <p> Dependency Hierarchy: - pyo3-0.11.1.crate (Root Library) - parking_lot-0.11.0.crate - :x: **lock_api-0.4.0.crate** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in the lock_api crate before 0.4.2 for Rust. A data race can occur because of MappedRwLockWriteGuard unsoundness. <p>Publish Date: 2020-12-31 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-35912>CVE-2020-35912</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/Amanieu/parking_lot/releases/tag/lock_api-0.4.2">https://github.com/Amanieu/parking_lot/releases/tag/lock_api-0.4.2</a></p> <p>Release Date: 2020-12-31</p> <p>Fix Resolution: lock_api-0.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in lock api crate cve medium severity vulnerability vulnerable library lock api crate wrappers to create fully featured mutex and rwlock types compatible with no std library home page a href dependency hierarchy crate root library parking lot crate x lock api crate vulnerable library found in base branch master vulnerability details an issue was discovered in the lock api crate before for rust a data race can occur because of mappedrwlockwriteguard unsoundness publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution lock api step up your open source security game with whitesource
0
32,111
4,323,837,534
IssuesEvent
2016-07-25 18:15:57
blaze/blaze
https://api.github.com/repos/blaze/blaze
opened
Switch to `return_type='core'` in `compute`
api design testing user experience
We agreed to deprecate the `'native'` return type in favor of `'core'` for `compute` after 0.11. Initial attempts to switch over to `return_type='core'` as the default revealed more than 100 test failues, so there's some work to be done here.
1.0
Switch to `return_type='core'` in `compute` - We agreed to deprecate the `'native'` return type in favor of `'core'` for `compute` after 0.11. Initial attempts to switch over to `return_type='core'` as the default revealed more than 100 test failues, so there's some work to be done here.
non_priority
switch to return type core in compute we agreed to deprecate the native return type in favor of core for compute after initial attempts to switch over to return type core as the default revealed more than test failues so there s some work to be done here
0
271,310
29,418,957,300
IssuesEvent
2023-05-31 01:05:34
MidnightBSD/src
https://api.github.com/repos/MidnightBSD/src
closed
CVE-2016-10012 (High) detected in openssh-portableV_7_9_P1 - autoclosed
Mend: dependency security vulnerability
## CVE-2016-10012 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>openssh-portableV_7_9_P1</b></p></summary> <p> <p>Portable OpenSSH</p> <p>Library home page: <a href=https://github.com/openssh/openssh-portable.git>https://github.com/openssh/openssh-portable.git</a></p> <p>Found in base branch: <b>stable/2.1</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/crypto/openssh/monitor_mm.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/crypto/openssh/monitor_mm.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures. <p>Publish Date: 2017-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10012>CVE-2016-10012</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://gitlab.alpinelinux.org/alpine/aports/issues/6583">https://gitlab.alpinelinux.org/alpine/aports/issues/6583</a></p> <p>Release Date: 2017-01-05</p> <p>Fix Resolution: 7.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-10012 (High) detected in openssh-portableV_7_9_P1 - autoclosed - ## CVE-2016-10012 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>openssh-portableV_7_9_P1</b></p></summary> <p> <p>Portable OpenSSH</p> <p>Library home page: <a href=https://github.com/openssh/openssh-portable.git>https://github.com/openssh/openssh-portable.git</a></p> <p>Found in base branch: <b>stable/2.1</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/crypto/openssh/monitor_mm.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/crypto/openssh/monitor_mm.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> The shared memory manager (associated with pre-authentication compression) in sshd in OpenSSH before 7.4 does not ensure that a bounds check is enforced by all compilers, which might allows local users to gain privileges by leveraging access to a sandboxed privilege-separation process, related to the m_zback and m_zlib data structures. <p>Publish Date: 2017-01-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10012>CVE-2016-10012</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://gitlab.alpinelinux.org/alpine/aports/issues/6583">https://gitlab.alpinelinux.org/alpine/aports/issues/6583</a></p> <p>Release Date: 2017-01-05</p> <p>Fix Resolution: 7.4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in openssh portablev autoclosed cve high severity vulnerability vulnerable library openssh portablev portable openssh library home page a href found in base branch stable vulnerable source files crypto openssh monitor mm c crypto openssh monitor mm c vulnerability details the shared memory manager associated with pre authentication compression in sshd in openssh before does not ensure that a bounds check is enforced by all compilers which might allows local users to gain privileges by leveraging access to a sandboxed privilege separation process related to the m zback and m zlib data structures publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
82,737
16,021,758,048
IssuesEvent
2021-04-21 01:13:12
surge-synthesizer/surge
https://api.github.com/repos/surge-synthesizer/surge
closed
The "Don't Go Back" plan
Code Cleanup Feature Request
At some point after 1.9.0 or maybe 1.9.1 is out there, we will commit to SurgeXT. That means, we will make the main repo only able to build the XTs and will clean up the mess. I've been thinking about this a lot and calling it the 'don't go back' or 'burn the bridges' plan and here's basically how I think we should do it, in order. - [ ] Make a main-repo xt-alpha branch which builds XT properly with multiple commits. - [x] Create an xt-alpha branch in main repo - [x] Make juce a proper submodule not a checkout hack - [x] Remove the non-JUCE targets from CMakeLists.txt - [x] Modify the PR pipeline to build the JUCE-only assets - [x] Remove packaging and piggy scripts - [x] Proper CMake rules for copying and packaging - [x] CodeQual target doesn't need to build JUCE; add a flag - [x] Remove build-linux and build-osx.sh - [x] Line by line scan of CMakeLists.txt to see what we can kill - [x] Make SurgeXT look in %PROGRAM_FILES%/Surge XT and so on for assets so it decouples - [x] About screen fixups - [x] Remove libraries: one commit to remove vstgui vst3sdk lv2 the aupublic stuff nanosvg - [x] Remove old plugins: a separate commit to remove src/vst[23] src/lv2 src/au - [x] Finish #2071 by doing a binary wt load from memory as opposed to file (load_wt_wt_mem) - [ ] Retained Split Branch Strategy - [x] Create and Notify a separate release-xt pipeline - [x] Have that pipeline upload installers - [x] Update the nightly page with a "there be dragons over there" type warning - [x] Update the surge README in *main* explaining what we just did, how to use a tag to build the old code, etc... - [x] Update the surge README in *XT* with new build instructions - [ ] Once that has quiesced we can start chipping out useless code. But these basically become new issues - [ ] basically write an issue for each one of these with the 'cleanup to juce' tag or some such but some ideas are - [x] Rewrite the installers to only install XT. (Note we have a chance to rework the installers in the XT cycle too) - [x] displayinfo, runtime font, user interactions can all be cleaned up to not be compile time or be removed - [ ] All the TARGET_VST3 and LV2 and AU and VST3 - [ ] Collapse the TARGET_HEADLESS and TARGET_JUCE_UI since they should be the same - [ ] Better developer doc Then take a deep breath and take stock and start fixing bugs
1.0
The "Don't Go Back" plan - At some point after 1.9.0 or maybe 1.9.1 is out there, we will commit to SurgeXT. That means, we will make the main repo only able to build the XTs and will clean up the mess. I've been thinking about this a lot and calling it the 'don't go back' or 'burn the bridges' plan and here's basically how I think we should do it, in order. - [ ] Make a main-repo xt-alpha branch which builds XT properly with multiple commits. - [x] Create an xt-alpha branch in main repo - [x] Make juce a proper submodule not a checkout hack - [x] Remove the non-JUCE targets from CMakeLists.txt - [x] Modify the PR pipeline to build the JUCE-only assets - [x] Remove packaging and piggy scripts - [x] Proper CMake rules for copying and packaging - [x] CodeQual target doesn't need to build JUCE; add a flag - [x] Remove build-linux and build-osx.sh - [x] Line by line scan of CMakeLists.txt to see what we can kill - [x] Make SurgeXT look in %PROGRAM_FILES%/Surge XT and so on for assets so it decouples - [x] About screen fixups - [x] Remove libraries: one commit to remove vstgui vst3sdk lv2 the aupublic stuff nanosvg - [x] Remove old plugins: a separate commit to remove src/vst[23] src/lv2 src/au - [x] Finish #2071 by doing a binary wt load from memory as opposed to file (load_wt_wt_mem) - [ ] Retained Split Branch Strategy - [x] Create and Notify a separate release-xt pipeline - [x] Have that pipeline upload installers - [x] Update the nightly page with a "there be dragons over there" type warning - [x] Update the surge README in *main* explaining what we just did, how to use a tag to build the old code, etc... - [x] Update the surge README in *XT* with new build instructions - [ ] Once that has quiesced we can start chipping out useless code. But these basically become new issues - [ ] basically write an issue for each one of these with the 'cleanup to juce' tag or some such but some ideas are - [x] Rewrite the installers to only install XT. (Note we have a chance to rework the installers in the XT cycle too) - [x] displayinfo, runtime font, user interactions can all be cleaned up to not be compile time or be removed - [ ] All the TARGET_VST3 and LV2 and AU and VST3 - [ ] Collapse the TARGET_HEADLESS and TARGET_JUCE_UI since they should be the same - [ ] Better developer doc Then take a deep breath and take stock and start fixing bugs
non_priority
the don t go back plan at some point after or maybe is out there we will commit to surgext that means we will make the main repo only able to build the xts and will clean up the mess i ve been thinking about this a lot and calling it the don t go back or burn the bridges plan and here s basically how i think we should do it in order make a main repo xt alpha branch which builds xt properly with multiple commits create an xt alpha branch in main repo make juce a proper submodule not a checkout hack remove the non juce targets from cmakelists txt modify the pr pipeline to build the juce only assets remove packaging and piggy scripts proper cmake rules for copying and packaging codequal target doesn t need to build juce add a flag remove build linux and build osx sh line by line scan of cmakelists txt to see what we can kill make surgext look in program files surge xt and so on for assets so it decouples about screen fixups remove libraries one commit to remove vstgui the aupublic stuff nanosvg remove old plugins a separate commit to remove src vst src src au finish by doing a binary wt load from memory as opposed to file load wt wt mem retained split branch strategy create and notify a separate release xt pipeline have that pipeline upload installers update the nightly page with a there be dragons over there type warning update the surge readme in main explaining what we just did how to use a tag to build the old code etc update the surge readme in xt with new build instructions once that has quiesced we can start chipping out useless code but these basically become new issues basically write an issue for each one of these with the cleanup to juce tag or some such but some ideas are rewrite the installers to only install xt note we have a chance to rework the installers in the xt cycle too displayinfo runtime font user interactions can all be cleaned up to not be compile time or be removed all the target and and au and collapse the target headless and target juce ui since they should be the same better developer doc then take a deep breath and take stock and start fixing bugs
0
21,611
17,373,581,313
IssuesEvent
2021-07-30 17:15:54
tailscale/tailscale
https://api.github.com/repos/tailscale/tailscale
opened
Tailscale connected prevents GoPro app from working
L1 Very few OS-android P2 Aggravating T5 Usability
ERROR: type should be string, got "https://twitter.com/scottalaird/status/1421137488534380545\r\n\r\n_Steps to reproduce:\r\n\r\nGoPro: Hero9, with v1.52, v1.6, and v1.6 \"GoPro labs\"\r\nAndroid: Galaxy S20 Ultra, Android 11, Tailscale v1.10.2-36fe8addc39\r\n\r\nInstall GoPro Quik app. Connect to GoPro. Click on \"start preview\".\r\n\r\nTailscale active: 100% failure.\r\nTailscale stopped: 100% success._"
True
Tailscale connected prevents GoPro app from working - https://twitter.com/scottalaird/status/1421137488534380545 _Steps to reproduce: GoPro: Hero9, with v1.52, v1.6, and v1.6 "GoPro labs" Android: Galaxy S20 Ultra, Android 11, Tailscale v1.10.2-36fe8addc39 Install GoPro Quik app. Connect to GoPro. Click on "start preview". Tailscale active: 100% failure. Tailscale stopped: 100% success._
non_priority
tailscale connected prevents gopro app from working steps to reproduce gopro with and gopro labs android galaxy ultra android tailscale install gopro quik app connect to gopro click on start preview tailscale active failure tailscale stopped success
0
126,907
12,302,006,705
IssuesEvent
2020-05-11 16:15:47
bazelbuild/bazel
https://api.github.com/repos/bazelbuild/bazel
closed
Publish a blog-post about using Bazel as a custom build-system in Xcode
P3 category: rules > ObjC / iOS / J2ObjC type: documentation
Scenario: A large iOS app has a library dependency, which can already be built using Bazel. To incrementally introduce Bazel into one's workflow, it would be useful to build that library dependency using Bazel, and use the resulting artifact as an input in the larger build. This is a subset of #553.
1.0
Publish a blog-post about using Bazel as a custom build-system in Xcode - Scenario: A large iOS app has a library dependency, which can already be built using Bazel. To incrementally introduce Bazel into one's workflow, it would be useful to build that library dependency using Bazel, and use the resulting artifact as an input in the larger build. This is a subset of #553.
non_priority
publish a blog post about using bazel as a custom build system in xcode scenario a large ios app has a library dependency which can already be built using bazel to incrementally introduce bazel into one s workflow it would be useful to build that library dependency using bazel and use the resulting artifact as an input in the larger build this is a subset of
0
245,771
18,793,606,301
IssuesEvent
2021-11-08 19:29:47
The-Chefs/ProiectColectivG4-2021
https://api.github.com/repos/The-Chefs/ProiectColectivG4-2021
closed
Update README when all details are stable, add code owners and add java pipeline (3SP) (Sprint 2 -> 3)
documentation
- [x] Update README - [x] Add code owners - [x] Add java pipeline
1.0
Update README when all details are stable, add code owners and add java pipeline (3SP) (Sprint 2 -> 3) - - [x] Update README - [x] Add code owners - [x] Add java pipeline
non_priority
update readme when all details are stable add code owners and add java pipeline sprint update readme add code owners add java pipeline
0
63,296
17,572,623,458
IssuesEvent
2021-08-15 01:57:31
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
Mac: Preferences (Settings) doesn't close in the usual way
T-Defect
### Steps to reproduce 1. From Element's application menu, choose Preferences. 2. Attempt to close the resulting "Settings" window by using its Close button or by pressing Cmd-W. ### What happened? The Close button is in the wrong place and has the wrong icon. It should be a red circle in the top-left of the window, and instead it's a grey cross in the top-right. Pressing Cmd-W doesn't close Settings, but rather the entire Element window. ### What did you expect? I expected to have a red Close button in the top-left corner. I expected Cmd-W to close Settings. Side note: "Settings" should be "Preferences" to match other Mac apps. It's correct in the menu bar but not in the app itself. ### Operating system macOS 11.4 ### Application version Element 1.7.34 ### How did you install the app? From https://element.io/get-started
1.0
Mac: Preferences (Settings) doesn't close in the usual way - ### Steps to reproduce 1. From Element's application menu, choose Preferences. 2. Attempt to close the resulting "Settings" window by using its Close button or by pressing Cmd-W. ### What happened? The Close button is in the wrong place and has the wrong icon. It should be a red circle in the top-left of the window, and instead it's a grey cross in the top-right. Pressing Cmd-W doesn't close Settings, but rather the entire Element window. ### What did you expect? I expected to have a red Close button in the top-left corner. I expected Cmd-W to close Settings. Side note: "Settings" should be "Preferences" to match other Mac apps. It's correct in the menu bar but not in the app itself. ### Operating system macOS 11.4 ### Application version Element 1.7.34 ### How did you install the app? From https://element.io/get-started
non_priority
mac preferences settings doesn t close in the usual way steps to reproduce from element s application menu choose preferences attempt to close the resulting settings window by using its close button or by pressing cmd w what happened the close button is in the wrong place and has the wrong icon it should be a red circle in the top left of the window and instead it s a grey cross in the top right pressing cmd w doesn t close settings but rather the entire element window what did you expect i expected to have a red close button in the top left corner i expected cmd w to close settings side note settings should be preferences to match other mac apps it s correct in the menu bar but not in the app itself operating system macos application version element how did you install the app from
0
121,747
17,662,359,959
IssuesEvent
2021-08-21 19:28:57
ghc-dev/Joshua-Braun
https://api.github.com/repos/ghc-dev/Joshua-Braun
opened
CVE-2020-14330 (Medium) detected in ansible-2.9.9.tar.gz
security vulnerability
## CVE-2020-14330 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: Joshua-Braun/requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Joshua-Braun/commit/c33920b35d4c7d67985bc23f375407c17c23a549">c33920b35d4c7d67985bc23f375407c17c23a549</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14330>CVE-2020-14330</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: 2.10.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.10.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-14330","vulnerabilityDetails":"An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14330","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2020-14330 (Medium) detected in ansible-2.9.9.tar.gz - ## CVE-2020-14330 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansible-2.9.9.tar.gz</b></p></summary> <p>Radically simple IT automation</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz">https://files.pythonhosted.org/packages/00/5d/e10b83e0e6056dbd5b4809b451a191395175a57e3175ce04e35d9c5fc2a0/ansible-2.9.9.tar.gz</a></p> <p>Path to dependency file: Joshua-Braun/requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **ansible-2.9.9.tar.gz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/ghc-dev/Joshua-Braun/commit/c33920b35d4c7d67985bc23f375407c17c23a549">c33920b35d4c7d67985bc23f375407c17c23a549</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality. <p>Publish Date: 2020-09-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14330>CVE-2020-14330</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330</a></p> <p>Release Date: 2020-07-21</p> <p>Fix Resolution: 2.10.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Python","packageName":"ansible","packageVersion":"2.9.9","packageFilePaths":["/requirements.txt"],"isTransitiveDependency":false,"dependencyTree":"ansible:2.9.9","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.10.0"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-14330","vulnerabilityDetails":"An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest threat from this vulnerability is to data confidentiality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-14330","cvss3Severity":"medium","cvss3Score":"5.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in ansible tar gz cve medium severity vulnerability vulnerable library ansible tar gz radically simple it automation library home page a href path to dependency file joshua braun requirements txt path to vulnerable library requirements txt dependency hierarchy x ansible tar gz vulnerable library found in head commit a href found in base branch master vulnerability details an improper output neutralization for logs flaw was found in ansible when using the uri module where sensitive data is exposed to content and json output this flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module the highest threat from this vulnerability is to data confidentiality publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree ansible isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails an improper output neutralization for logs flaw was found in ansible when using the uri module where sensitive data is exposed to content and json output this flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module the highest threat from this vulnerability is to data confidentiality vulnerabilityurl
0
172,091
21,031,295,709
IssuesEvent
2022-03-31 01:18:59
L00163425/deployment
https://api.github.com/repos/L00163425/deployment
opened
CVE-2022-22950 (Medium) detected in spring-expression-5.3.1.jar
security vulnerability
## CVE-2022-22950 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-expression-5.3.1.jar</b></p></summary> <p>Spring Expression Language (SpEL)</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.1/spring-expression-5.3.1.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.4.0.jar (Root Library) - spring-webmvc-5.3.1.jar - :x: **spring-expression-5.3.1.jar** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition <p>Publish Date: 2022-01-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22950>CVE-2022-22950</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22950">https://tanzu.vmware.com/security/cve-2022-22950</a></p> <p>Release Date: 2022-01-11</p> <p>Fix Resolution: org.springframework:spring-expression:5.3.17</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-22950 (Medium) detected in spring-expression-5.3.1.jar - ## CVE-2022-22950 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-expression-5.3.1.jar</b></p></summary> <p>Spring Expression Language (SpEL)</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-expression/5.3.1/spring-expression-5.3.1.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-2.4.0.jar (Root Library) - spring-webmvc-5.3.1.jar - :x: **spring-expression-5.3.1.jar** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Spring Framework versions 5.3.0 - 5.3.16 and older unsupported versions, it is possible for a user to provide a specially crafted SpEL expression that may cause a denial of service condition <p>Publish Date: 2022-01-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-22950>CVE-2022-22950</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://tanzu.vmware.com/security/cve-2022-22950">https://tanzu.vmware.com/security/cve-2022-22950</a></p> <p>Release Date: 2022-01-11</p> <p>Fix Resolution: org.springframework:spring-expression:5.3.17</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in spring expression jar cve medium severity vulnerability vulnerable library spring expression jar spring expression language spel library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository org springframework spring expression spring expression jar dependency hierarchy spring boot starter web jar root library spring webmvc jar x spring expression jar vulnerable library found in base branch main vulnerability details in spring framework versions and older unsupported versions it is possible for a user to provide a specially crafted spel expression that may cause a denial of service condition publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org springframework spring expression step up your open source security game with whitesource
0
224,113
24,769,690,848
IssuesEvent
2022-10-23 01:09:31
attesch/zencart
https://api.github.com/repos/attesch/zencart
opened
CVE-2022-37598 (High) detected in uglify-js-3.4.10.tgz, uglify-js-3.6.0.tgz
security vulnerability
## CVE-2022-37598 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-3.4.10.tgz</b>, <b>uglify-js-3.6.0.tgz</b></p></summary> <p> <details><summary><b>uglify-js-3.4.10.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-3.4.10.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-3.4.10.tgz</a></p> <p>Path to dependency file: /zencart/package.json</p> <p>Path to vulnerable library: /node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - laravel-mix-4.0.16.tgz (Root Library) - html-loader-0.5.5.tgz - html-minifier-3.5.21.tgz - :x: **uglify-js-3.4.10.tgz** (Vulnerable Library) </details> <details><summary><b>uglify-js-3.6.0.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.0.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.0.tgz</a></p> <p>Path to dependency file: /zencart/admin/includes/template/javascript/gridstack.js-master/package.json</p> <p>Path to vulnerable library: /admin/includes/template/javascript/gridstack.js-master/node_modules/handlebars/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - karma-coverage-1.1.2.tgz (Root Library) - istanbul-0.4.5.tgz - handlebars-4.1.2.tgz - :x: **uglify-js-3.6.0.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. <p>Publish Date: 2022-10-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37598>CVE-2022-37598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-20</p> <p>Fix Resolution (uglify-js): 3.13.10</p> <p>Direct dependency fix Resolution (laravel-mix): 5.0.8</p><p>Fix Resolution (uglify-js): 3.13.10</p> <p>Direct dependency fix Resolution (karma-coverage): 2.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-37598 (High) detected in uglify-js-3.4.10.tgz, uglify-js-3.6.0.tgz - ## CVE-2022-37598 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>uglify-js-3.4.10.tgz</b>, <b>uglify-js-3.6.0.tgz</b></p></summary> <p> <details><summary><b>uglify-js-3.4.10.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-3.4.10.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-3.4.10.tgz</a></p> <p>Path to dependency file: /zencart/package.json</p> <p>Path to vulnerable library: /node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - laravel-mix-4.0.16.tgz (Root Library) - html-loader-0.5.5.tgz - html-minifier-3.5.21.tgz - :x: **uglify-js-3.4.10.tgz** (Vulnerable Library) </details> <details><summary><b>uglify-js-3.6.0.tgz</b></p></summary> <p>JavaScript parser, mangler/compressor and beautifier toolkit</p> <p>Library home page: <a href="https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.0.tgz">https://registry.npmjs.org/uglify-js/-/uglify-js-3.6.0.tgz</a></p> <p>Path to dependency file: /zencart/admin/includes/template/javascript/gridstack.js-master/package.json</p> <p>Path to vulnerable library: /admin/includes/template/javascript/gridstack.js-master/node_modules/handlebars/node_modules/uglify-js/package.json</p> <p> Dependency Hierarchy: - karma-coverage-1.1.2.tgz (Root Library) - istanbul-0.4.5.tgz - handlebars-4.1.2.tgz - :x: **uglify-js-3.6.0.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prototype pollution vulnerability in function DEFNODE in ast.js in mishoo UglifyJS 3.13.2 via the name variable in ast.js. <p>Publish Date: 2022-10-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-37598>CVE-2022-37598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-20</p> <p>Fix Resolution (uglify-js): 3.13.10</p> <p>Direct dependency fix Resolution (laravel-mix): 5.0.8</p><p>Fix Resolution (uglify-js): 3.13.10</p> <p>Direct dependency fix Resolution (karma-coverage): 2.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in uglify js tgz uglify js tgz cve high severity vulnerability vulnerable libraries uglify js tgz uglify js tgz uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file zencart package json path to vulnerable library node modules uglify js package json dependency hierarchy laravel mix tgz root library html loader tgz html minifier tgz x uglify js tgz vulnerable library uglify js tgz javascript parser mangler compressor and beautifier toolkit library home page a href path to dependency file zencart admin includes template javascript gridstack js master package json path to vulnerable library admin includes template javascript gridstack js master node modules handlebars node modules uglify js package json dependency hierarchy karma coverage tgz root library istanbul tgz handlebars tgz x uglify js tgz vulnerable library vulnerability details prototype pollution vulnerability in function defnode in ast js in mishoo uglifyjs via the name variable in ast js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution uglify js direct dependency fix resolution laravel mix fix resolution uglify js direct dependency fix resolution karma coverage step up your open source security game with mend
0
372,145
25,984,186,204
IssuesEvent
2022-12-19 21:55:00
rosenpin/i3-agenda
https://api.github.com/repos/rosenpin/i3-agenda
closed
help message for the --date-format flag is missleading
documentation good first issue
the date-format flag is only respected if there are no events in the next week. If there's an event today, no date will appear. If the event is tomorrow, "Tomorrow at ..." will appear. If it's this week, it will say "Friday at ..." For example. The help message should mention that it will only be respected if there are no events in the next week ``` python if self.is_today(): return f"{event_datetime:%H:%M} " + result elif self.is_tomorrow(): return f"{event_datetime:Tomorrow at %H:%M} " + result elif self.is_this_week(): return f"{event_datetime:%a at %H:%M} " + result else: return f"{event_datetime:{date_format} at %H:%M} " + result ```
1.0
help message for the --date-format flag is missleading - the date-format flag is only respected if there are no events in the next week. If there's an event today, no date will appear. If the event is tomorrow, "Tomorrow at ..." will appear. If it's this week, it will say "Friday at ..." For example. The help message should mention that it will only be respected if there are no events in the next week ``` python if self.is_today(): return f"{event_datetime:%H:%M} " + result elif self.is_tomorrow(): return f"{event_datetime:Tomorrow at %H:%M} " + result elif self.is_this_week(): return f"{event_datetime:%a at %H:%M} " + result else: return f"{event_datetime:{date_format} at %H:%M} " + result ```
non_priority
help message for the date format flag is missleading the date format flag is only respected if there are no events in the next week if there s an event today no date will appear if the event is tomorrow tomorrow at will appear if it s this week it will say friday at for example the help message should mention that it will only be respected if there are no events in the next week python if self is today return f event datetime h m result elif self is tomorrow return f event datetime tomorrow at h m result elif self is this week return f event datetime a at h m result else return f event datetime date format at h m result
0
191,756
15,303,170,629
IssuesEvent
2021-02-24 15:30:56
Clear-Sight/virtual-gimbal-camera
https://api.github.com/repos/Clear-Sight/virtual-gimbal-camera
closed
Göra dokument redo för granskning:
documentation
- [x] Kravspecifikation - [x] Projektplan - [x] Kvalitetsplan - [x] Arch Doc
1.0
Göra dokument redo för granskning: - - [x] Kravspecifikation - [x] Projektplan - [x] Kvalitetsplan - [x] Arch Doc
non_priority
göra dokument redo för granskning kravspecifikation projektplan kvalitetsplan arch doc
0
7,104
10,260,825,877
IssuesEvent
2019-08-22 08:24:24
didi/mpx
https://api.github.com/repos/didi/mpx
closed
使用ts时,类型推断 mpx.getStorageSync 返回的是promise
processing
``` mpx.getStorageSync('xxx') // (property) getStorageSync: (key: string) => Promise<any> wx.getStorageSync('xxx') // function wx.getStorageSync(key: string): any ``` 是不是应该跟微信的保持一致,类型推断是promise,会造成一些困扰
1.0
使用ts时,类型推断 mpx.getStorageSync 返回的是promise - ``` mpx.getStorageSync('xxx') // (property) getStorageSync: (key: string) => Promise<any> wx.getStorageSync('xxx') // function wx.getStorageSync(key: string): any ``` 是不是应该跟微信的保持一致,类型推断是promise,会造成一些困扰
non_priority
使用ts时,类型推断 mpx getstoragesync 返回的是promise mpx getstoragesync xxx property getstoragesync key string promise wx getstoragesync xxx function wx getstoragesync key string any 是不是应该跟微信的保持一致,类型推断是promise,会造成一些困扰
0
231,847
25,552,024,460
IssuesEvent
2022-11-30 01:07:47
yakimovim/json-patch
https://api.github.com/repos/yakimovim/json-patch
closed
CVE-2017-0256 (Medium) detected in system.net.http.4.3.0.nupkg - autoclosed
security vulnerability
## CVE-2017-0256 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>system.net.http.4.3.0.nupkg</b></p></summary> <p>Provides a programming interface for modern HTTP applications, including HTTP client components that...</p> <p>Library home page: <a href="https://api.nuget.org/packages/system.net.http.4.3.0.nupkg">https://api.nuget.org/packages/system.net.http.4.3.0.nupkg</a></p> <p>Path to dependency file: /test/EdlinSoftware.JsonPatch.Tests/EdlinSoftware.JsonPatch.Tests.csproj</p> <p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg</p> <p> Dependency Hierarchy: - xunit.2.4.1.nupkg (Root Library) - xunit.assert.2.4.1.nupkg - netstandard.library.1.6.1.nupkg - :x: **system.net.http.4.3.0.nupkg** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/yakimovim/json-patch/commit/0dd411f46a9ccf311bcb23c5da9b5c4694d3fae5">0dd411f46a9ccf311bcb23c5da9b5c4694d3fae5</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. <p>Publish Date: 2017-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0256>CVE-2017-0256</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-0256">https://nvd.nist.gov/vuln/detail/CVE-2017-0256</a></p> <p>Release Date: 2017-05-12</p> <p>Fix Resolution: Microsoft.AspNetCore.Mvc.ApiExplorer - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Abstractions - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.1.3,1.0.4;System.Net.Http - 4.1.2,4.3.2;Microsoft.AspNetCore.Mvc.Razor - 1.1.3,1.0.4;System.Net.Http.WinHttpHandler - 4.0.2,4.3.0-preview1-24530-04;System.Net.Security - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;System.Text.Encodings.Web - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Razor.Host - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3;System.Net.WebSockets.Client - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2017-0256 (Medium) detected in system.net.http.4.3.0.nupkg - autoclosed - ## CVE-2017-0256 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>system.net.http.4.3.0.nupkg</b></p></summary> <p>Provides a programming interface for modern HTTP applications, including HTTP client components that...</p> <p>Library home page: <a href="https://api.nuget.org/packages/system.net.http.4.3.0.nupkg">https://api.nuget.org/packages/system.net.http.4.3.0.nupkg</a></p> <p>Path to dependency file: /test/EdlinSoftware.JsonPatch.Tests/EdlinSoftware.JsonPatch.Tests.csproj</p> <p>Path to vulnerable library: /home/wss-scanner/.nuget/packages/system.net.http/4.3.0/system.net.http.4.3.0.nupkg</p> <p> Dependency Hierarchy: - xunit.2.4.1.nupkg (Root Library) - xunit.assert.2.4.1.nupkg - netstandard.library.1.6.1.nupkg - :x: **system.net.http.4.3.0.nupkg** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/yakimovim/json-patch/commit/0dd411f46a9ccf311bcb23c5da9b5c4694d3fae5">0dd411f46a9ccf311bcb23c5da9b5c4694d3fae5</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests. <p>Publish Date: 2017-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-0256>CVE-2017-0256</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-0256">https://nvd.nist.gov/vuln/detail/CVE-2017-0256</a></p> <p>Release Date: 2017-05-12</p> <p>Fix Resolution: Microsoft.AspNetCore.Mvc.ApiExplorer - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Abstractions - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Core - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Cors - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.Localization - 1.1.3,1.0.4;System.Net.Http - 4.1.2,4.3.2;Microsoft.AspNetCore.Mvc.Razor - 1.1.3,1.0.4;System.Net.Http.WinHttpHandler - 4.0.2,4.3.0-preview1-24530-04;System.Net.Security - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.ViewFeatures - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.TagHelpers - 1.0.4,1.1.3;System.Text.Encodings.Web - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Razor.Host - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.Formatters.Json - 1.0.4,1.1.3;Microsoft.AspNetCore.Mvc.WebApiCompatShim - 1.0.4,1.1.3;System.Net.WebSockets.Client - 4.3.0-preview1-24530-04,4.0.1;Microsoft.AspNetCore.Mvc.Formatters.Xml - 1.1.3,1.0.4;Microsoft.AspNetCore.Mvc.DataAnnotations - 1.0.4,1.1.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in system net http nupkg autoclosed cve medium severity vulnerability vulnerable library system net http nupkg provides a programming interface for modern http applications including http client components that library home page a href path to dependency file test edlinsoftware jsonpatch tests edlinsoftware jsonpatch tests csproj path to vulnerable library home wss scanner nuget packages system net http system net http nupkg dependency hierarchy xunit nupkg root library xunit assert nupkg netstandard library nupkg x system net http nupkg vulnerable library found in head commit a href found in base branch master vulnerability details a spoofing vulnerability exists when the asp net core fails to properly sanitize web requests publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution microsoft aspnetcore mvc apiexplorer microsoft aspnetcore mvc abstractions microsoft aspnetcore mvc core microsoft aspnetcore mvc cors microsoft aspnetcore mvc localization system net http microsoft aspnetcore mvc razor system net http winhttphandler system net security microsoft aspnetcore mvc viewfeatures microsoft aspnetcore mvc taghelpers system text encodings web microsoft aspnetcore mvc razor host microsoft aspnetcore mvc formatters json microsoft aspnetcore mvc webapicompatshim system net websockets client microsoft aspnetcore mvc formatters xml microsoft aspnetcore mvc dataannotations step up your open source security game with mend
0
72,565
31,768,942,352
IssuesEvent
2023-09-12 10:29:32
gauravrs18/issue_onboarding
https://api.github.com/repos/gauravrs18/issue_onboarding
closed
dev-angular-integration-account-services-new-connection-component-approve-component -consumer-details-component -activate-component -details-component
CX-account-services
dev-angular-integration-account-services-new-connection-component-approve-component -consumer-details-component -activate-component -details-component
1.0
dev-angular-integration-account-services-new-connection-component-approve-component -consumer-details-component -activate-component -details-component - dev-angular-integration-account-services-new-connection-component-approve-component -consumer-details-component -activate-component -details-component
non_priority
dev angular integration account services new connection component approve component consumer details component activate component details component dev angular integration account services new connection component approve component consumer details component activate component details component
0
15,319
9,958,001,435
IssuesEvent
2019-07-05 19:08:30
openstreetmap/iD
https://api.github.com/repos/openstreetmap/iD
closed
Don't discard drawn feature when pressing number shortcut while drawing
usability
You can start drawing a quick preset via the number key shortcuts even when the ribbon UI isn't shown. This is a time savings, but when you do this while drawing a way something your work is discarded. We should instead end the drawing, keep the work, and then enter the add mode for the selected preset.
True
Don't discard drawn feature when pressing number shortcut while drawing - You can start drawing a quick preset via the number key shortcuts even when the ribbon UI isn't shown. This is a time savings, but when you do this while drawing a way something your work is discarded. We should instead end the drawing, keep the work, and then enter the add mode for the selected preset.
non_priority
don t discard drawn feature when pressing number shortcut while drawing you can start drawing a quick preset via the number key shortcuts even when the ribbon ui isn t shown this is a time savings but when you do this while drawing a way something your work is discarded we should instead end the drawing keep the work and then enter the add mode for the selected preset
0
33,470
6,206,545,563
IssuesEvent
2017-07-06 18:40:29
google/earthenterprise
https://api.github.com/repos/google/earthenterprise
opened
Move installation instructions from wiki to docs
documentation
Since the installation instructions are user focused (rather than developer focused), we should move the to the docs instead of the wiki. The docs thread on installing starts at 4492598. We can include a link to the documentation from the wiki.
1.0
Move installation instructions from wiki to docs - Since the installation instructions are user focused (rather than developer focused), we should move the to the docs instead of the wiki. The docs thread on installing starts at 4492598. We can include a link to the documentation from the wiki.
non_priority
move installation instructions from wiki to docs since the installation instructions are user focused rather than developer focused we should move the to the docs instead of the wiki the docs thread on installing starts at we can include a link to the documentation from the wiki
0
2,257
7,569,183,584
IssuesEvent
2018-04-23 02:43:26
HackTheDeep/teamgoop
https://api.github.com/repos/HackTheDeep/teamgoop
opened
Stitching / Compositing
Architecture Images
For Release 2, it'd be awesome to replace the need for photoshop and do compositing of multiple photograms into a single slice. This breaks the faulty Milestone 1.0 assumption of one image per slice. This would require: * Multiple images could be imported / transformed / layered eg: multiple images at different magnifications. * Perhaps non-linear transformations ala gridwarps? * might want to go back to scope and replace an image with a higher resolution image * might be hard to know how to automatically update shapes if image is tweaked in a complex way; maybe we just show a flag that indicates that the source slice has changed so the user knows to update their shapes...
1.0
Stitching / Compositing - For Release 2, it'd be awesome to replace the need for photoshop and do compositing of multiple photograms into a single slice. This breaks the faulty Milestone 1.0 assumption of one image per slice. This would require: * Multiple images could be imported / transformed / layered eg: multiple images at different magnifications. * Perhaps non-linear transformations ala gridwarps? * might want to go back to scope and replace an image with a higher resolution image * might be hard to know how to automatically update shapes if image is tweaked in a complex way; maybe we just show a flag that indicates that the source slice has changed so the user knows to update their shapes...
non_priority
stitching compositing for release it d be awesome to replace the need for photoshop and do compositing of multiple photograms into a single slice this breaks the faulty milestone assumption of one image per slice this would require multiple images could be imported transformed layered eg multiple images at different magnifications perhaps non linear transformations ala gridwarps might want to go back to scope and replace an image with a higher resolution image might be hard to know how to automatically update shapes if image is tweaked in a complex way maybe we just show a flag that indicates that the source slice has changed so the user knows to update their shapes
0
77,609
14,888,786,238
IssuesEvent
2021-01-20 20:23:25
backstage/backstage
https://api.github.com/repos/backstage/backstage
closed
TechDocs: Create type for TechDocs Metadata
docs-like-code enhancement help wanted
Every TechDocs site has a TechDocs Metadata (A JSON with information like site name and description). This is stored in a `techdocs_metadata.json` file along at the root of TechDocs storage with other generated documentation site files. A Techdocs Publisher implements a method called [`fetchTechDocsMetadata`](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/types.ts#L53) which reads the `techdocs_metadata.json` file and responds to TechDocs frontend. Instead of a responding with string, this method should return a typed object. Create a type like this ```ts export type TechDocsMetadata = { site_name: string site_description: string } ``` in `publish/types.ts`(https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/types.ts) and use it in `packages/techdocs-common` and `plugins/techdocs-backend`. `plugins/techdocs-backend` already imports the techdocs-common package. Make the changes to the [Local Publisher](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/local.ts#L91) and [Google Storage publisher](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/googleStorage.ts#L135) as well, since they implement this method. Use the same type defined in `techdocs-common` package in [this `techdocs-backend` endpoint's response](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/plugins/techdocs-backend/src/service/router.ts#L56-L69). The above changes are in TechDocs backend. TechDocs frontend plugin uses the metadata endpoint defined in TechDocs backend to render those metadata (site name and description). This is done [here](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/plugins/techdocs/src/reader/components/TechDocsPage.tsx#L31). Add the same type defined above in the `plugins/techdocs` package and use it for all the occurrences of the TechDocs Metadata object.
1.0
TechDocs: Create type for TechDocs Metadata - Every TechDocs site has a TechDocs Metadata (A JSON with information like site name and description). This is stored in a `techdocs_metadata.json` file along at the root of TechDocs storage with other generated documentation site files. A Techdocs Publisher implements a method called [`fetchTechDocsMetadata`](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/types.ts#L53) which reads the `techdocs_metadata.json` file and responds to TechDocs frontend. Instead of a responding with string, this method should return a typed object. Create a type like this ```ts export type TechDocsMetadata = { site_name: string site_description: string } ``` in `publish/types.ts`(https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/types.ts) and use it in `packages/techdocs-common` and `plugins/techdocs-backend`. `plugins/techdocs-backend` already imports the techdocs-common package. Make the changes to the [Local Publisher](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/local.ts#L91) and [Google Storage publisher](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/packages/techdocs-common/src/stages/publish/googleStorage.ts#L135) as well, since they implement this method. Use the same type defined in `techdocs-common` package in [this `techdocs-backend` endpoint's response](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/plugins/techdocs-backend/src/service/router.ts#L56-L69). The above changes are in TechDocs backend. TechDocs frontend plugin uses the metadata endpoint defined in TechDocs backend to render those metadata (site name and description). This is done [here](https://github.com/backstage/backstage/blob/767b679f4388b9296d2f18af12f4f7ccc994b38b/plugins/techdocs/src/reader/components/TechDocsPage.tsx#L31). Add the same type defined above in the `plugins/techdocs` package and use it for all the occurrences of the TechDocs Metadata object.
non_priority
techdocs create type for techdocs metadata every techdocs site has a techdocs metadata a json with information like site name and description this is stored in a techdocs metadata json file along at the root of techdocs storage with other generated documentation site files a techdocs publisher implements a method called which reads the techdocs metadata json file and responds to techdocs frontend instead of a responding with string this method should return a typed object create a type like this ts export type techdocsmetadata site name string site description string in publish types ts and use it in packages techdocs common and plugins techdocs backend plugins techdocs backend already imports the techdocs common package make the changes to the and as well since they implement this method use the same type defined in techdocs common package in the above changes are in techdocs backend techdocs frontend plugin uses the metadata endpoint defined in techdocs backend to render those metadata site name and description this is done add the same type defined above in the plugins techdocs package and use it for all the occurrences of the techdocs metadata object
0
200,558
15,801,740,934
IssuesEvent
2021-04-03 06:22:24
oeiyiping/ped
https://api.github.com/repos/oeiyiping/ped
opened
UG screenshot for `find` command does not reflect what is shown in the program.
severity.Low type.DocumentationBug
Outdated screenshot provided in `find` command, under the Features section. <!--session: 1617429921343-dc1a7e21-ed22-4a1c-8858-3fe42edd12e6-->
1.0
UG screenshot for `find` command does not reflect what is shown in the program. - Outdated screenshot provided in `find` command, under the Features section. <!--session: 1617429921343-dc1a7e21-ed22-4a1c-8858-3fe42edd12e6-->
non_priority
ug screenshot for find command does not reflect what is shown in the program outdated screenshot provided in find command under the features section
0
352,429
32,066,636,504
IssuesEvent
2023-09-25 03:58:40
Tusharagg1/chest-x-ray-ai
https://api.github.com/repos/Tusharagg1/chest-x-ray-ai
reopened
Create "Pull Request" template
setup testing
## Summary - Added 'Pull request template': [pull_request_template.md](https://github.com/Tusharagg1/chest-x-ray-ai/blob/main/.github/pull_request_template.md) ## Estimated Work Time (in hrs) - 0.5 hr Related commit: [updated issue templates, added pull req template](https://github.com/Tusharagg1/chest-x-ray-ai/commit/ccaffecf9293e7059b3225df596bc0fefffb576a)
1.0
Create "Pull Request" template - ## Summary - Added 'Pull request template': [pull_request_template.md](https://github.com/Tusharagg1/chest-x-ray-ai/blob/main/.github/pull_request_template.md) ## Estimated Work Time (in hrs) - 0.5 hr Related commit: [updated issue templates, added pull req template](https://github.com/Tusharagg1/chest-x-ray-ai/commit/ccaffecf9293e7059b3225df596bc0fefffb576a)
non_priority
create pull request template summary added pull request template estimated work time in hrs hr related commit
0
11,454
9,201,448,188
IssuesEvent
2019-03-07 19:39:45
filecoin-project/go-filecoin
https://api.github.com/repos/filecoin-project/go-filecoin
opened
[bug] Failed to deploy nightly devnet
A-infrastructure C-bug
**Describe the bug** The user-data startup script failed while checking if balance was transferred via faucet ``` ++ docker exec filecoin-4 go-filecoin --repodir=/var/local/filecoin wallet balance fcq3uyzzrrhce782ck3juchaqce6spxnpm9xt68u0 + balance=89.9999998 ++ echo '89.9999998 > 89.9999998' ++ bc -l + (( 0 )) + sleep 30 + (( count-- )) + (( count>0 )) + '[' 0 -eq 0 ']' + send_alert 'nightly faucet' 'Faucet did not transfer funds in required time during devnet setup' ```
1.0
[bug] Failed to deploy nightly devnet - **Describe the bug** The user-data startup script failed while checking if balance was transferred via faucet ``` ++ docker exec filecoin-4 go-filecoin --repodir=/var/local/filecoin wallet balance fcq3uyzzrrhce782ck3juchaqce6spxnpm9xt68u0 + balance=89.9999998 ++ echo '89.9999998 > 89.9999998' ++ bc -l + (( 0 )) + sleep 30 + (( count-- )) + (( count>0 )) + '[' 0 -eq 0 ']' + send_alert 'nightly faucet' 'Faucet did not transfer funds in required time during devnet setup' ```
non_priority
failed to deploy nightly devnet describe the bug the user data startup script failed while checking if balance was transferred via faucet docker exec filecoin go filecoin repodir var local filecoin wallet balance balance echo bc l sleep count count send alert nightly faucet faucet did not transfer funds in required time during devnet setup
0
12,872
4,545,416,355
IssuesEvent
2016-09-11 07:47:44
sridharrajs/yabt
https://api.github.com/repos/sridharrajs/yabt
closed
Standardize the name of the gulp task
code improvements
When starting a dev server, we need to `gulp stream` for ynbt to transpile ES6 to ES5, other project seem to use `gulp serve`. We can change this name of the task to `serve` just to be consistent with others.
1.0
Standardize the name of the gulp task - When starting a dev server, we need to `gulp stream` for ynbt to transpile ES6 to ES5, other project seem to use `gulp serve`. We can change this name of the task to `serve` just to be consistent with others.
non_priority
standardize the name of the gulp task when starting a dev server we need to gulp stream for ynbt to transpile to other project seem to use gulp serve we can change this name of the task to serve just to be consistent with others
0
429,440
30,054,340,027
IssuesEvent
2023-06-28 05:07:19
geosolutions-it/MapStore2
https://api.github.com/repos/geosolutions-it/MapStore2
opened
g
Documentation
## Description <!-- A few sentences describing the documentation request --> <!-- screenshot, video, or link to mockup/prototype are welcome --> *Documentation section involved* - [ ] User Guide - [ ] Developer Guide ## Other useful information
1.0
g - ## Description <!-- A few sentences describing the documentation request --> <!-- screenshot, video, or link to mockup/prototype are welcome --> *Documentation section involved* - [ ] User Guide - [ ] Developer Guide ## Other useful information
non_priority
g description documentation section involved user guide developer guide other useful information
0
26,239
5,238,959,171
IssuesEvent
2017-01-31 07:58:31
WeblateOrg/weblate
https://api.github.com/repos/WeblateOrg/weblate
closed
How I can clone repository from the weblate to resolve conflicts
documentation
Recently I had conflicts in .po file on the weblate server. I tried to follow this article https://docs.weblate.org/en/latest/faq.html#how-to-fix-merge-conflicts-in-translations but I can't realize how to get proper url for the component, to be able to clone it. I have added `weblate.gitexport` to INSTALLED_APPS and see 'Exported repository URL' setting in the admin interface. My weblate host is http://weblate.dev-cluster.uaprom. I have set exported repository url to `http://weblate.dev-cluster.uaprom/git/uaprom-vas/vas-frontend` and tried to clone it with: ```sh git clone http://weblate.dev-cluster.uaprom/git/uaprom-vas/vas-frontend ``` I guess I am missing something from the documentation, can someone help me?
1.0
How I can clone repository from the weblate to resolve conflicts - Recently I had conflicts in .po file on the weblate server. I tried to follow this article https://docs.weblate.org/en/latest/faq.html#how-to-fix-merge-conflicts-in-translations but I can't realize how to get proper url for the component, to be able to clone it. I have added `weblate.gitexport` to INSTALLED_APPS and see 'Exported repository URL' setting in the admin interface. My weblate host is http://weblate.dev-cluster.uaprom. I have set exported repository url to `http://weblate.dev-cluster.uaprom/git/uaprom-vas/vas-frontend` and tried to clone it with: ```sh git clone http://weblate.dev-cluster.uaprom/git/uaprom-vas/vas-frontend ``` I guess I am missing something from the documentation, can someone help me?
non_priority
how i can clone repository from the weblate to resolve conflicts recently i had conflicts in po file on the weblate server i tried to follow this article but i can t realize how to get proper url for the component to be able to clone it i have added weblate gitexport to installed apps and see exported repository url setting in the admin interface my weblate host is i have set exported repository url to and tried to clone it with sh git clone i guess i am missing something from the documentation can someone help me
0
320,201
23,804,468,860
IssuesEvent
2022-09-03 20:32:42
marekmaskarinec/tophat
https://api.github.com/repos/marekmaskarinec/tophat
opened
Documentation
documentation
* cookbook * fix typos * update to the current API * split into multiple pages * more "recipes" * extensions * particles * shaders * tilemaps * ui - after it is in "final" state * how to structure a game - might get too opinionated * API reference * document missing functions * fix typos * add constant and variable support to doc.um * C side docs * video tutorials * how to setup an environment for using tophat
1.0
Documentation - * cookbook * fix typos * update to the current API * split into multiple pages * more "recipes" * extensions * particles * shaders * tilemaps * ui - after it is in "final" state * how to structure a game - might get too opinionated * API reference * document missing functions * fix typos * add constant and variable support to doc.um * C side docs * video tutorials * how to setup an environment for using tophat
non_priority
documentation cookbook fix typos update to the current api split into multiple pages more recipes extensions particles shaders tilemaps ui after it is in final state how to structure a game might get too opinionated api reference document missing functions fix typos add constant and variable support to doc um c side docs video tutorials how to setup an environment for using tophat
0
221,524
17,356,132,637
IssuesEvent
2021-07-29 14:35:57
keptn/keptn
https://api.github.com/repos/keptn/keptn
closed
Activate Snyk protection
area:security automation estimate: 3 test
## Action Item Activate Snyk to have security scans for all PRs. ## Acceptance Criteria - [x] Snyk dependency checks are integrated into build pipeline and executed on a nightly schedule
1.0
Activate Snyk protection - ## Action Item Activate Snyk to have security scans for all PRs. ## Acceptance Criteria - [x] Snyk dependency checks are integrated into build pipeline and executed on a nightly schedule
non_priority
activate snyk protection action item activate snyk to have security scans for all prs acceptance criteria snyk dependency checks are integrated into build pipeline and executed on a nightly schedule
0
109,391
16,843,684,490
IssuesEvent
2021-06-19 02:50:35
bharathirajatut/fitbit-api-example-java2
https://api.github.com/repos/bharathirajatut/fitbit-api-example-java2
opened
CVE-2016-9878 (High) detected in spring-webmvc-4.3.2.RELEASE.jar
security vulnerability
## CVE-2016-9878 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-webmvc-4.3.2.RELEASE.jar</b></p></summary> <p>Spring Web MVC</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: fitbit-api-example-java2/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - :x: **spring-webmvc-4.3.2.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/bharathirajatut/fitbit-api-example-java2/commits/8c153ad064e8f07a4ddade35ac13a9b485ca3dac">8c153ad064e8f07a4ddade35ac13a9b485ca3dac</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks. <p>Publish Date: 2016-12-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-9878>CVE-2016-9878</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878</a></p> <p>Release Date: 2016-12-29</p> <p>Fix Resolution: 3.2.18,4.2.9,4.3.5.</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-9878 (High) detected in spring-webmvc-4.3.2.RELEASE.jar - ## CVE-2016-9878 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>spring-webmvc-4.3.2.RELEASE.jar</b></p></summary> <p>Spring Web MVC</p> <p>Library home page: <a href="https://github.com/spring-projects/spring-framework">https://github.com/spring-projects/spring-framework</a></p> <p>Path to dependency file: fitbit-api-example-java2/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/springframework/spring-webmvc/4.3.2.RELEASE/spring-webmvc-4.3.2.RELEASE.jar</p> <p> Dependency Hierarchy: - spring-boot-starter-web-1.4.0.RELEASE.jar (Root Library) - :x: **spring-webmvc-4.3.2.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/bharathirajatut/fitbit-api-example-java2/commits/8c153ad064e8f07a4ddade35ac13a9b485ca3dac">8c153ad064e8f07a4ddade35ac13a9b485ca3dac</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> An issue was discovered in Pivotal Spring Framework before 3.2.18, 4.2.x before 4.2.9, and 4.3.x before 4.3.5. Paths provided to the ResourceServlet were not properly sanitized and as a result exposed to directory traversal attacks. <p>Publish Date: 2016-12-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-9878>CVE-2016-9878</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9878</a></p> <p>Release Date: 2016-12-29</p> <p>Fix Resolution: 3.2.18,4.2.9,4.3.5.</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in spring webmvc release jar cve high severity vulnerability vulnerable library spring webmvc release jar spring web mvc library home page a href path to dependency file fitbit api example pom xml path to vulnerable library home wss scanner repository org springframework spring webmvc release spring webmvc release jar dependency hierarchy spring boot starter web release jar root library x spring webmvc release jar vulnerable library found in head commit a href found in base branch master vulnerability details an issue was discovered in pivotal spring framework before x before and x before paths provided to the resourceservlet were not properly sanitized and as a result exposed to directory traversal attacks publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
56,567
32,061,095,448
IssuesEvent
2023-09-24 17:12:01
hajimehoshi/ebiten
https://api.github.com/repos/hajimehoshi/ebiten
closed
Low FPS at the very beginning of running
performance
On any platforms, FPS is about 30 or 40 and the application is very heavy just after launching the application. First I need to take profiling.
True
Low FPS at the very beginning of running - On any platforms, FPS is about 30 or 40 and the application is very heavy just after launching the application. First I need to take profiling.
non_priority
low fps at the very beginning of running on any platforms fps is about or and the application is very heavy just after launching the application first i need to take profiling
0
63,331
12,304,690,692
IssuesEvent
2020-05-11 20:56:48
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
opened
JIT: general tail recursion elimination
area-CodeGen-coreclr
Just writing up an old idea since I didn't see an issue for it. The jit can currently transform a recursive tail call into a loop. However, only call sites that target the root method are eligible for this optimization. So if when jitting a method `A` we inline a method `B` that has a recursive tail call, the call to `B` now made by `A` is not optimized into a loop within `A`, despite the fact that `A` has a copy of the entirety of `B` and so has `B`'s entry point is in there somewhere. In other words, for each call site, we could walk up the inline context tree to see if any inline parent is the method being called. Then, in principle, we could change the call into an assignment + branch to the appropriate spot. Currently we only ever check this for the root of the tree. This transformation can be foiled if we do "direct sub" when inlining, so we'd also need to keep track of whether that happened and bail out on such cases. We'd also need to retain the arg to local mapping from those inlines, so we could figure out the right assignments to make. It might also create more cases where we mark blocks as being within "backward" branches and complicate the logic for "deferred zero init" that was added recently in #35148. Likely such opportunities are rare, but it would be interesting to do some preliminary screens to see how often we find candidates. category:cq theme:tail-call skill-level:intermediate cost:medium
1.0
JIT: general tail recursion elimination - Just writing up an old idea since I didn't see an issue for it. The jit can currently transform a recursive tail call into a loop. However, only call sites that target the root method are eligible for this optimization. So if when jitting a method `A` we inline a method `B` that has a recursive tail call, the call to `B` now made by `A` is not optimized into a loop within `A`, despite the fact that `A` has a copy of the entirety of `B` and so has `B`'s entry point is in there somewhere. In other words, for each call site, we could walk up the inline context tree to see if any inline parent is the method being called. Then, in principle, we could change the call into an assignment + branch to the appropriate spot. Currently we only ever check this for the root of the tree. This transformation can be foiled if we do "direct sub" when inlining, so we'd also need to keep track of whether that happened and bail out on such cases. We'd also need to retain the arg to local mapping from those inlines, so we could figure out the right assignments to make. It might also create more cases where we mark blocks as being within "backward" branches and complicate the logic for "deferred zero init" that was added recently in #35148. Likely such opportunities are rare, but it would be interesting to do some preliminary screens to see how often we find candidates. category:cq theme:tail-call skill-level:intermediate cost:medium
non_priority
jit general tail recursion elimination just writing up an old idea since i didn t see an issue for it the jit can currently transform a recursive tail call into a loop however only call sites that target the root method are eligible for this optimization so if when jitting a method a we inline a method b that has a recursive tail call the call to b now made by a is not optimized into a loop within a despite the fact that a has a copy of the entirety of b and so has b s entry point is in there somewhere in other words for each call site we could walk up the inline context tree to see if any inline parent is the method being called then in principle we could change the call into an assignment branch to the appropriate spot currently we only ever check this for the root of the tree this transformation can be foiled if we do direct sub when inlining so we d also need to keep track of whether that happened and bail out on such cases we d also need to retain the arg to local mapping from those inlines so we could figure out the right assignments to make it might also create more cases where we mark blocks as being within backward branches and complicate the logic for deferred zero init that was added recently in likely such opportunities are rare but it would be interesting to do some preliminary screens to see how often we find candidates category cq theme tail call skill level intermediate cost medium
0
25,457
4,326,435,695
IssuesEvent
2016-07-26 06:20:44
dpi/rng
https://api.github.com/repos/dpi/rng
closed
Issue messaging all registrants on a date
defect
Hey, my team and I have been having an issue getting RNG's "message all registrants on a date" feature working. The other two options, (users are emailed upon registering and upon updating said registration) work perfectly. Upon activating a timed message to all registrants, RNG adds the message to the 'rng_rule_scheduler' table just fine, however, RNG fails to ever trigger the rule. The 'attempts' and 'in_queue' columns in the table don't change, and the message is not added to the queue, nor removed from the 'rng_rule_scheduler' table. We have tested this over several days, the scheduler table is eventually cleaned out, but the message is never queued or sent. We're using the latest version of RNG and it's associated modules, and Drupal 8.1.0. If you have any ideas, we'd really appreciate it.
1.0
Issue messaging all registrants on a date - Hey, my team and I have been having an issue getting RNG's "message all registrants on a date" feature working. The other two options, (users are emailed upon registering and upon updating said registration) work perfectly. Upon activating a timed message to all registrants, RNG adds the message to the 'rng_rule_scheduler' table just fine, however, RNG fails to ever trigger the rule. The 'attempts' and 'in_queue' columns in the table don't change, and the message is not added to the queue, nor removed from the 'rng_rule_scheduler' table. We have tested this over several days, the scheduler table is eventually cleaned out, but the message is never queued or sent. We're using the latest version of RNG and it's associated modules, and Drupal 8.1.0. If you have any ideas, we'd really appreciate it.
non_priority
issue messaging all registrants on a date hey my team and i have been having an issue getting rng s message all registrants on a date feature working the other two options users are emailed upon registering and upon updating said registration work perfectly upon activating a timed message to all registrants rng adds the message to the rng rule scheduler table just fine however rng fails to ever trigger the rule the attempts and in queue columns in the table don t change and the message is not added to the queue nor removed from the rng rule scheduler table we have tested this over several days the scheduler table is eventually cleaned out but the message is never queued or sent we re using the latest version of rng and it s associated modules and drupal if you have any ideas we d really appreciate it
0
141,271
11,410,628,916
IssuesEvent
2020-02-01 00:11:45
dotnet/machinelearning
https://api.github.com/repos/dotnet/machinelearning
closed
Set seed in PredictorTests
P0 test
All the tests in [TestPredictors.cs](https://github.com/dotnet/machinelearning/blob/master/test/Microsoft.ML.Predictor.Tests/TestPredictors.cs) call some combination of `RunAllTests`, `RunOneAllTests`, `Run_TrainTest`, and `Run_CV`. https://github.com/dotnet/machinelearning/blob/76777592cf7e094f5361285bc64111d09d5bdb7c/test/Microsoft.ML.TestFramework/BaseTestPredictorsMaml.cs#L95 where `ctx.ExtraArgs` is used to add additional arguments when building the `maml` command to be run https://github.com/dotnet/machinelearning/blob/76777592cf7e094f5361285bc64111d09d5bdb7c/test/Microsoft.ML.TestFramework/BaseTestPredictorsMaml.cs#L143-L147 This can be used to set the seed for `maml`. All calls to `Run*` in `TestPredictiors.cs` should pass `extraSettings: new[] { "seed=1" }` to set the seed. cc: @harishsk
1.0
Set seed in PredictorTests - All the tests in [TestPredictors.cs](https://github.com/dotnet/machinelearning/blob/master/test/Microsoft.ML.Predictor.Tests/TestPredictors.cs) call some combination of `RunAllTests`, `RunOneAllTests`, `Run_TrainTest`, and `Run_CV`. https://github.com/dotnet/machinelearning/blob/76777592cf7e094f5361285bc64111d09d5bdb7c/test/Microsoft.ML.TestFramework/BaseTestPredictorsMaml.cs#L95 where `ctx.ExtraArgs` is used to add additional arguments when building the `maml` command to be run https://github.com/dotnet/machinelearning/blob/76777592cf7e094f5361285bc64111d09d5bdb7c/test/Microsoft.ML.TestFramework/BaseTestPredictorsMaml.cs#L143-L147 This can be used to set the seed for `maml`. All calls to `Run*` in `TestPredictiors.cs` should pass `extraSettings: new[] { "seed=1" }` to set the seed. cc: @harishsk
non_priority
set seed in predictortests all the tests in call some combination of runalltests runonealltests run traintest and run cv where ctx extraargs is used to add additional arguments when building the maml command to be run this can be used to set the seed for maml all calls to run in testpredictiors cs should pass extrasettings new seed to set the seed cc harishsk
0
286,281
31,470,274,563
IssuesEvent
2023-08-30 07:00:41
hshivhare67/kernel_v4.19.72_CVE-2023-0461
https://api.github.com/repos/hshivhare67/kernel_v4.19.72_CVE-2023-0461
opened
CVE-2023-3812 (High) detected in linuxlinux-4.19.282
Mend: dependency security vulnerability
## CVE-2023-3812 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.282</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/tun.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. <p>Publish Date: 2023-07-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-3812>CVE-2023-3812</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-3812">https://www.linuxkernelcves.com/cves/CVE-2023-3812</a></p> <p>Release Date: 2023-07-24</p> <p>Fix Resolution: v4.19.265,v5.4.224,v5.10.154,v5.15.78,v6.0.8,v6.1-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-3812 (High) detected in linuxlinux-4.19.282 - ## CVE-2023-3812 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.282</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/net/tun.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> An out-of-bounds memory access flaw was found in the Linux kernel’s TUN/TAP device driver functionality in how a user generates a malicious (too big) networking packet when napi frags is enabled. This flaw allows a local user to crash or potentially escalate their privileges on the system. <p>Publish Date: 2023-07-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-3812>CVE-2023-3812</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-3812">https://www.linuxkernelcves.com/cves/CVE-2023-3812</a></p> <p>Release Date: 2023-07-24</p> <p>Fix Resolution: v4.19.265,v5.4.224,v5.10.154,v5.15.78,v6.0.8,v6.1-rc4</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in base branch master vulnerable source files drivers net tun c vulnerability details an out of bounds memory access flaw was found in the linux kernel’s tun tap device driver functionality in how a user generates a malicious too big networking packet when napi frags is enabled this flaw allows a local user to crash or potentially escalate their privileges on the system publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
8,091
20,832,017,879
IssuesEvent
2022-03-19 15:54:14
runner-be/RunnerBe-Android
https://api.github.com/repos/runner-be/RunnerBe-Android
closed
shared 모듈 정리
architecture issue 후순위 refactoring
현재 shared 모듈 3개가 다 흩어져 있음 `:shared:android`, `:shared:domain`, `:shared:compose` 로 만들어서, `:shared` 하나로 묶어야 함
1.0
shared 모듈 정리 - 현재 shared 모듈 3개가 다 흩어져 있음 `:shared:android`, `:shared:domain`, `:shared:compose` 로 만들어서, `:shared` 하나로 묶어야 함
non_priority
shared 모듈 정리 현재 shared 모듈 다 흩어져 있음 shared android shared domain shared compose 로 만들어서 shared 하나로 묶어야 함
0
291,728
25,169,167,924
IssuesEvent
2022-11-11 00:34:06
kiwiroy/alien-libdeflate
https://api.github.com/repos/kiwiroy/alien-libdeflate
closed
Investigate ffi.t fails on cpantesters
cpantesters
``` t/00-basic.t .. ok # Version Info # Mod Lib # 0.03 1.10 t/basic.t ..... ok t/compile.t ... ok # Failed test 'ffi' # at t/ffi.t line 11. # libdeflate_alloc_compressor not found # libdeflate_deflate_compress not found # libdeflate_deflate_compress_bound not found # libdeflate_zlib_compress not found # libdeflate_zlib_compress_bound not found # libdeflate_gzip_compress not found # libdeflate_gzip_compress_bound not found # libdeflate_free_compressor not found # Looks like you failed 1 test of 2. t/ffi.t ....... Dubious, test returned 1 (wstat 256, 0x100) Failed 1/2 subtests Test Summary Report ------------------- t/ffi.t (Wstat: 256 (exited 1) Tests: 2 Failed: 1) Failed test: 2 Non-zero exit status: 1 Files=4, Tests=22, 4 wallclock secs ( 0.03 usr 0.04 sys + 1.36 cusr 0.49 csys = 1.92 CPU) Result: FAIL Failed 1/4 test programs. 1/22 subtests failed. make: *** [Makefile:916: test_dynamic] Error 1 ```
1.0
Investigate ffi.t fails on cpantesters - ``` t/00-basic.t .. ok # Version Info # Mod Lib # 0.03 1.10 t/basic.t ..... ok t/compile.t ... ok # Failed test 'ffi' # at t/ffi.t line 11. # libdeflate_alloc_compressor not found # libdeflate_deflate_compress not found # libdeflate_deflate_compress_bound not found # libdeflate_zlib_compress not found # libdeflate_zlib_compress_bound not found # libdeflate_gzip_compress not found # libdeflate_gzip_compress_bound not found # libdeflate_free_compressor not found # Looks like you failed 1 test of 2. t/ffi.t ....... Dubious, test returned 1 (wstat 256, 0x100) Failed 1/2 subtests Test Summary Report ------------------- t/ffi.t (Wstat: 256 (exited 1) Tests: 2 Failed: 1) Failed test: 2 Non-zero exit status: 1 Files=4, Tests=22, 4 wallclock secs ( 0.03 usr 0.04 sys + 1.36 cusr 0.49 csys = 1.92 CPU) Result: FAIL Failed 1/4 test programs. 1/22 subtests failed. make: *** [Makefile:916: test_dynamic] Error 1 ```
non_priority
investigate ffi t fails on cpantesters t basic t ok version info mod lib t basic t ok t compile t ok failed test ffi at t ffi t line libdeflate alloc compressor not found libdeflate deflate compress not found libdeflate deflate compress bound not found libdeflate zlib compress not found libdeflate zlib compress bound not found libdeflate gzip compress not found libdeflate gzip compress bound not found libdeflate free compressor not found looks like you failed test of t ffi t dubious test returned wstat failed subtests test summary report t ffi t wstat exited tests failed failed test non zero exit status files tests wallclock secs usr sys cusr csys cpu result fail failed test programs subtests failed make error
0
82,524
23,805,338,716
IssuesEvent
2022-09-04 00:13:19
ClickHouse/ClickHouse
https://api.github.com/repos/ClickHouse/ClickHouse
closed
Build Failed on macOS 12.5.1 llvm13
build
The entire build process succeed. But clickhouse-server binary startup with segmentfault. It seems that OwnSplitChannel.h is ambiguous in same binary because of different `WITH_TEXT_LOG` compile flag. **Operating system** macOS 12.5.1 **Cmake version** cmake version 3.22.2 **Ninja version** 1.10.2 **Compiler name and version** llvm13 **Full cmake and/or ninja output**
1.0
Build Failed on macOS 12.5.1 llvm13 - The entire build process succeed. But clickhouse-server binary startup with segmentfault. It seems that OwnSplitChannel.h is ambiguous in same binary because of different `WITH_TEXT_LOG` compile flag. **Operating system** macOS 12.5.1 **Cmake version** cmake version 3.22.2 **Ninja version** 1.10.2 **Compiler name and version** llvm13 **Full cmake and/or ninja output**
non_priority
build failed on macos the entire build process succeed but clickhouse server binary startup with segmentfault it seems that ownsplitchannel h is ambiguous in same binary because of different with text log compile flag operating system macos cmake version cmake version ninja version compiler name and version full cmake and or ninja output
0
21,756
30,275,659,981
IssuesEvent
2023-07-07 19:22:10
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
closed
Installing auto replies will force the pty host to spawn
bug terminal-process
Repro: 1. Open VS Code 2. Close all terminal 3. Exit VS Code 4. Open VS Code (a terminal is not restored) 5. Set: ``` "terminal.integrated.autoReplies": { "Terminate batch job (Y/N)": "Y\r" } ``` 6. Open process explorer, 🐛 the pty host process should not be in the process tree
1.0
Installing auto replies will force the pty host to spawn - Repro: 1. Open VS Code 2. Close all terminal 3. Exit VS Code 4. Open VS Code (a terminal is not restored) 5. Set: ``` "terminal.integrated.autoReplies": { "Terminate batch job (Y/N)": "Y\r" } ``` 6. Open process explorer, 🐛 the pty host process should not be in the process tree
non_priority
installing auto replies will force the pty host to spawn repro open vs code close all terminal exit vs code open vs code a terminal is not restored set terminal integrated autoreplies terminate batch job y n y r open process explorer 🐛 the pty host process should not be in the process tree
0
67,121
20,910,860,787
IssuesEvent
2022-03-24 09:11:27
vector-im/element-web
https://api.github.com/repos/vector-im/element-web
opened
"Unable to load event" in main timeline
T-Defect
### Steps to reproduce This msg looks to be a reply to a msg in a thread, but for whatever reason it doesn't know about the msg being replied to? <img width="1647" alt="Screenshot 2022-03-24 at 09 09 41" src="https://user-images.githubusercontent.com/1294269/159881991-cb0e400d-11b7-46ff-93cc-f989046022e9.png"> ### Outcome #### What did you expect? No unknown reply #### What happened instead? Unknown reply ### Operating system macOS 12.3 on M1 ### Browser information nightly ### URL for webapp nightly ### Application version nightly ### Homeserver matrix.org ### Will you send logs? No
1.0
"Unable to load event" in main timeline - ### Steps to reproduce This msg looks to be a reply to a msg in a thread, but for whatever reason it doesn't know about the msg being replied to? <img width="1647" alt="Screenshot 2022-03-24 at 09 09 41" src="https://user-images.githubusercontent.com/1294269/159881991-cb0e400d-11b7-46ff-93cc-f989046022e9.png"> ### Outcome #### What did you expect? No unknown reply #### What happened instead? Unknown reply ### Operating system macOS 12.3 on M1 ### Browser information nightly ### URL for webapp nightly ### Application version nightly ### Homeserver matrix.org ### Will you send logs? No
non_priority
unable to load event in main timeline steps to reproduce this msg looks to be a reply to a msg in a thread but for whatever reason it doesn t know about the msg being replied to img width alt screenshot at src outcome what did you expect no unknown reply what happened instead unknown reply operating system macos on browser information nightly url for webapp nightly application version nightly homeserver matrix org will you send logs no
0
183,210
21,719,413,429
IssuesEvent
2022-05-10 21:37:50
harrinry/canopy
https://api.github.com/repos/harrinry/canopy
closed
addon-knobs-5.3.21.tgz: 1 vulnerabilities (highest severity is: 7.5) - autoclosed
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>addon-knobs-5.3.21.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/harrinry/canopy/commit/1063e9b1165e94d5aeb532d4c07a31aeebe83160">1063e9b1165e94d5aeb532d4c07a31aeebe83160</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-44907](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.7.0.tgz | Transitive | 6.0.0-alpha.0 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44907</summary> ### Vulnerable Library - <b>qs-6.7.0.tgz</b></p> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.7.0.tgz">https://registry.npmjs.org/qs/-/qs-6.7.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - addon-knobs-5.3.21.tgz (Root Library) - :x: **qs-6.7.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/harrinry/canopy/commit/1063e9b1165e94d5aeb532d4c07a31aeebe83160">1063e9b1165e94d5aeb532d4c07a31aeebe83160</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior. <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907>CVE-2021-44907</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution (qs): 6.8.1</p> <p>Direct dependency fix Resolution (@storybook/addon-knobs): 6.0.0-alpha.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"@storybook/addon-knobs","packageVersion":"5.3.21","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"@storybook/addon-knobs:5.3.21","isMinimumFixVersionAvailable":true,"minimumFixVersion":"6.0.0-alpha.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-44907","vulnerabilityDetails":"A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
True
addon-knobs-5.3.21.tgz: 1 vulnerabilities (highest severity is: 7.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>addon-knobs-5.3.21.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/harrinry/canopy/commit/1063e9b1165e94d5aeb532d4c07a31aeebe83160">1063e9b1165e94d5aeb532d4c07a31aeebe83160</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | --- | --- | | [CVE-2021-44907](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | qs-6.7.0.tgz | Transitive | 6.0.0-alpha.0 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44907</summary> ### Vulnerable Library - <b>qs-6.7.0.tgz</b></p> <p>A querystring parser that supports nesting and arrays, with a depth limit</p> <p>Library home page: <a href="https://registry.npmjs.org/qs/-/qs-6.7.0.tgz">https://registry.npmjs.org/qs/-/qs-6.7.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/qs/package.json</p> <p> Dependency Hierarchy: - addon-knobs-5.3.21.tgz (Root Library) - :x: **qs-6.7.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/harrinry/canopy/commit/1063e9b1165e94d5aeb532d4c07a31aeebe83160">1063e9b1165e94d5aeb532d4c07a31aeebe83160</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior. <p>Publish Date: 2022-03-17 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907>CVE-2021-44907</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44907</a></p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution (qs): 6.8.1</p> <p>Direct dependency fix Resolution (@storybook/addon-knobs): 6.0.0-alpha.0</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> <!-- <REMEDIATE>[{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"@storybook/addon-knobs","packageVersion":"5.3.21","packageFilePaths":["/package.json"],"isTransitiveDependency":false,"dependencyTree":"@storybook/addon-knobs:5.3.21","isMinimumFixVersionAvailable":true,"minimumFixVersion":"6.0.0-alpha.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-44907","vulnerabilityDetails":"A Denial of Service vulnerability exists in qs up to 6.8.0 due to insufficient sanitization of property in the gs.parse function. The merge() function allows the assignment of properties on an array in the query. For any property being assigned, a value in the array is converted to an object containing these properties. Essentially, this means that the property whose expected type is Array always has to be checked with Array.isArray() by the user. This may not be obvious to the user and can cause unexpected behavior.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44907","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}]</REMEDIATE> -->
non_priority
addon knobs tgz vulnerabilities highest severity is autoclosed vulnerable library addon knobs tgz path to dependency file package json path to vulnerable library node modules qs package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in remediation available high qs tgz transitive alpha details cve vulnerable library qs tgz a querystring parser that supports nesting and arrays with a depth limit library home page a href path to dependency file package json path to vulnerable library node modules qs package json dependency hierarchy addon knobs tgz root library x qs tgz vulnerable library found in head commit a href found in base branch master vulnerability details a denial of service vulnerability exists in qs up to due to insufficient sanitization of property in the gs parse function the merge function allows the assignment of properties on an array in the query for any property being assigned a value in the array is converted to an object containing these properties essentially this means that the property whose expected type is array always has to be checked with array isarray by the user this may not be obvious to the user and can cause unexpected behavior publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution qs direct dependency fix resolution storybook addon knobs alpha rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue istransitivedependency false dependencytree storybook addon knobs isminimumfixversionavailable true minimumfixversion alpha isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a denial of service vulnerability exists in qs up to due to insufficient sanitization of property in the gs parse function the merge function allows the assignment of properties on an array in the query for any property being assigned a value in the array is converted to an object containing these properties essentially this means that the property whose expected type is array always has to be checked with array isarray by the user this may not be obvious to the user and can cause unexpected behavior vulnerabilityurl
0
331,037
24,288,525,802
IssuesEvent
2022-09-29 02:12:29
oracle/cluster-api-provider-oci
https://api.github.com/repos/oracle/cluster-api-provider-oci
closed
Document GPU support
documentation
GPU support is implemented via NVIDIA operator. How to do this should be added to the documentation.
1.0
Document GPU support - GPU support is implemented via NVIDIA operator. How to do this should be added to the documentation.
non_priority
document gpu support gpu support is implemented via nvidia operator how to do this should be added to the documentation
0
264,461
28,181,753,886
IssuesEvent
2023-04-04 03:26:55
Dima2021/MCW5
https://api.github.com/repos/Dima2021/MCW5
opened
forever-2.0.0.tgz: 14 vulnerabilities (highest severity is: 9.8)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>forever-2.0.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nconf/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (forever version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-10747](https://www.mend.io/vulnerability-database/CVE-2019-10747) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | 3.0.0 | &#9989; | | [CVE-2019-10746](https://www.mend.io/vulnerability-database/CVE-2019-10746) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | mixin-deep-1.3.1.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2021-44906](https://www.mend.io/vulnerability-database/CVE-2021-44906) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | 3.0.0 | &#9989; | | [CVE-2020-7788](https://www.mend.io/vulnerability-database/CVE-2020-7788) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | ini-1.3.5.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2021-23440](https://www.mend.io/vulnerability-database/CVE-2021-23440) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-7774](https://www.mend.io/vulnerability-database/CVE-2020-7774) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | y18n-3.2.1.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2019-20149](https://www.mend.io/vulnerability-database/CVE-2019-20149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | kind-of-6.0.2.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2020-28469](https://www.mend.io/vulnerability-database/CVE-2020-28469) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | glob-parent-3.1.0.tgz | Transitive | N/A* | &#10060; | | [WS-2018-0148](https://hackerone.com/reports/321701) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-3517](https://www.mend.io/vulnerability-database/CVE-2022-3517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-3.0.4.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-21803](https://www.mend.io/vulnerability-database/CVE-2022-21803) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 4.0.0 | &#9989; | | [CVE-2022-38900](https://www.mend.io/vulnerability-database/CVE-2022-38900) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | decode-uri-component-0.2.0.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2021-3820](https://www.mend.io/vulnerability-database/CVE-2021-3820) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | i-0.3.6.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2020-7598](https://www.mend.io/vulnerability-database/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | detected in multiple dependencies | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10747</summary> ### Vulnerable Libraries - <b>set-value-0.4.3.tgz</b>, <b>set-value-2.0.0.tgz</b></p> <p> ### <b>set-value-0.4.3.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/union-value/node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - union-value-1.0.0.tgz - :x: **set-value-0.4.3.tgz** (Vulnerable Library) ### <b>set-value-2.0.0.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - :x: **set-value-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and _proto_ payloads. <p>Publish Date: 2019-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10747>CVE-2019-10747</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-29</p> <p>Fix Resolution (set-value): 2.0.1</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p><p>Fix Resolution (set-value): 2.0.1</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10746</summary> ### Vulnerable Library - <b>mixin-deep-1.3.1.tgz</b></p> <p>Deeply mix the properties of objects into the first object. Like merge-deep, but doesn't clone.</p> <p>Library home page: <a href="https://registry.npmjs.org/mixin-deep/-/mixin-deep-1.3.1.tgz">https://registry.npmjs.org/mixin-deep/-/mixin-deep-1.3.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mixin-deep/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - :x: **mixin-deep-1.3.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload. <p>Publish Date: 2019-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10746>CVE-2019-10746</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-08-23</p> <p>Fix Resolution (mixin-deep): 1.3.2</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44906</summary> ### Vulnerable Libraries - <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.5.tgz</b>, <b>minimist-0.0.8.tgz</b></p> <p> ### <b>minimist-0.0.10.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) ### <b>minimist-1.2.5.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/prettyjson/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - prettyjson-1.2.1.tgz - :x: **minimist-1.2.5.tgz** (Vulnerable Library) ### <b>minimist-0.0.8.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-44906>CVE-2021-44906</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution (minimist): 1.2.6</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7788</summary> ### Vulnerable Library - <b>ini-1.3.5.tgz</b></p> <p>An ini encoder/decoder for node</p> <p>Library home page: <a href="https://registry.npmjs.org/ini/-/ini-1.3.5.tgz">https://registry.npmjs.org/ini/-/ini-1.3.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ini/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - nconf-0.10.0.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7788>CVE-2020-7788</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution (ini): 1.3.6</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23440</summary> ### Vulnerable Libraries - <b>set-value-0.4.3.tgz</b>, <b>set-value-2.0.0.tgz</b></p> <p> ### <b>set-value-0.4.3.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/union-value/node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - union-value-1.0.0.tgz - :x: **set-value-0.4.3.tgz** (Vulnerable Library) ### <b>set-value-2.0.0.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - :x: **set-value-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440. <p>Publish Date: 2021-09-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23440>CVE-2021-23440</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/">https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/</a></p> <p>Release Date: 2021-09-12</p> <p>Fix Resolution: set-value - 2.0.1,4.0.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7774</summary> ### Vulnerable Library - <b>y18n-3.2.1.tgz</b></p> <p>the bare-bones internationalization library used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz">https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/y18n/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - nconf-0.10.0.tgz - yargs-3.32.0.tgz - :x: **y18n-3.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution. <p>Publish Date: 2020-11-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7774>CVE-2020-7774</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1654">https://www.npmjs.com/advisories/1654</a></p> <p>Release Date: 2020-11-17</p> <p>Fix Resolution (y18n): 3.2.2</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20149</summary> ### Vulnerable Library - <b>kind-of-6.0.2.tgz</b></p> <p>Get the native type of a value.</p> <p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz">https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/base/node_modules/kind-of/package.json,/node_modules/micromatch/node_modules/kind-of/package.json,/node_modules/nanomatch/node_modules/kind-of/package.json,/node_modules/define-property/node_modules/kind-of/package.json,/node_modules/snapdragon-node/node_modules/kind-of/package.json,/node_modules/extglob/node_modules/kind-of/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - anymatch-2.0.0.tgz - micromatch-3.1.10.tgz - :x: **kind-of-6.0.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. <p>Publish Date: 2019-12-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20149>CVE-2019-20149</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20149">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20149</a></p> <p>Release Date: 2019-12-30</p> <p>Fix Resolution (kind-of): 6.0.3</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-28469</summary> ### Vulnerable Library - <b>glob-parent-3.1.0.tgz</b></p> <p>Strips glob magic from a string to provide the parent directory path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - :x: **glob-parent-3.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. <p>Publish Date: 2021-06-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-28469>CVE-2020-28469</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p> <p>Release Date: 2021-06-03</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0148</summary> ### Vulnerable Libraries - <b>utile-0.3.0.tgz</b>, <b>utile-0.2.1.tgz</b></p> <p> ### <b>utile-0.3.0.tgz</b></p> <p>A drop-in replacement for `util` with some additional advantageous functions</p> <p>Library home page: <a href="https://registry.npmjs.org/utile/-/utile-0.3.0.tgz">https://registry.npmjs.org/utile/-/utile-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/utile/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - :x: **utile-0.3.0.tgz** (Vulnerable Library) ### <b>utile-0.2.1.tgz</b></p> <p>A drop-in replacement for `util` with some additional advantageous functions</p> <p>Library home page: <a href="https://registry.npmjs.org/utile/-/utile-0.2.1.tgz">https://registry.npmjs.org/utile/-/utile-0.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/prompt/node_modules/utile/package.json,/node_modules/broadway/node_modules/utile/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - flatiron-0.4.3.tgz - prompt-0.2.14.tgz - :x: **utile-0.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The `utile` npm module, version 0.3.0, allows to extract sensitive data from uninitialized memory or to cause a DoS by passing in a large number, in setups where typed user input can be passed (e.g. from JSON). <p>Publish Date: 2018-07-16 <p>URL: <a href=https://hackerone.com/reports/321701>WS-2018-0148</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/WS-2018-0148">https://nvd.nist.gov/vuln/detail/WS-2018-0148</a></p> <p>Release Date: 2018-01-16</p> <p>Fix Resolution: JetBrains.Rider.Frontend5 - 213.0.20211008.154703-eap03</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3517</summary> ### Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3517>CVE-2022-3517</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-21803</summary> ### Vulnerable Libraries - <b>nconf-0.6.9.tgz</b>, <b>nconf-0.10.0.tgz</b></p> <p> ### <b>nconf-0.6.9.tgz</b></p> <p>Hierarchical node.js configuration with files, environment variables, command-line arguments, and atomic object merging.</p> <p>Library home page: <a href="https://registry.npmjs.org/nconf/-/nconf-0.6.9.tgz">https://registry.npmjs.org/nconf/-/nconf-0.6.9.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/broadway/node_modules/nconf/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - flatiron-0.4.3.tgz - broadway-0.3.6.tgz - :x: **nconf-0.6.9.tgz** (Vulnerable Library) ### <b>nconf-0.10.0.tgz</b></p> <p>Hierarchical node.js configuration with files, environment variables, command-line arguments, and atomic object merging.</p> <p>Library home page: <a href="https://registry.npmjs.org/nconf/-/nconf-0.10.0.tgz">https://registry.npmjs.org/nconf/-/nconf-0.10.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nconf/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - :x: **nconf-0.10.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21803>CVE-2022-21803</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21803">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21803</a></p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution (nconf): 0.11.4</p> <p>Direct dependency fix Resolution (forever): 4.0.0</p><p>Fix Resolution (nconf): 0.11.4</p> <p>Direct dependency fix Resolution (forever): 4.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-38900</summary> ### Vulnerable Library - <b>decode-uri-component-0.2.0.tgz</b></p> <p>A better decodeURIComponent</p> <p>Library home page: <a href="https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz">https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/decode-uri-component/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - source-map-resolve-0.5.2.tgz - :x: **decode-uri-component-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS. <p>Publish Date: 2022-11-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38900>CVE-2022-38900</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-w573-4hg7-7wgq">https://github.com/advisories/GHSA-w573-4hg7-7wgq</a></p> <p>Release Date: 2022-11-28</p> <p>Fix Resolution (decode-uri-component): 0.2.1</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-3820</summary> ### Vulnerable Library - <b>i-0.3.6.tgz</b></p> <p>custom inflections for nodejs</p> <p>Library home page: <a href="https://registry.npmjs.org/i/-/i-0.3.6.tgz">https://registry.npmjs.org/i/-/i-0.3.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/i/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - utile-0.3.0.tgz - :x: **i-0.3.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> inflect is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3820>CVE-2021-3820</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3820">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3820</a></p> <p>Release Date: 2021-09-27</p> <p>Fix Resolution (i): 0.3.7</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary> ### Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b></p> <p> ### <b>minimist-0.0.8.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) ### <b>minimist-0.0.10.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7598>CVE-2020-7598</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> <p></p> </details> *** <p>In order to enable automatic remediation for this issue, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p>
True
forever-2.0.0.tgz: 14 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>forever-2.0.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nconf/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (forever version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2019-10747](https://www.mend.io/vulnerability-database/CVE-2019-10747) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | 3.0.0 | &#9989; | | [CVE-2019-10746](https://www.mend.io/vulnerability-database/CVE-2019-10746) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | mixin-deep-1.3.1.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2021-44906](https://www.mend.io/vulnerability-database/CVE-2021-44906) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | 3.0.0 | &#9989; | | [CVE-2020-7788](https://www.mend.io/vulnerability-database/CVE-2020-7788) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | ini-1.3.5.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2021-23440](https://www.mend.io/vulnerability-database/CVE-2021-23440) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2020-7774](https://www.mend.io/vulnerability-database/CVE-2020-7774) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | y18n-3.2.1.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2019-20149](https://www.mend.io/vulnerability-database/CVE-2019-20149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | kind-of-6.0.2.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2020-28469](https://www.mend.io/vulnerability-database/CVE-2020-28469) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | glob-parent-3.1.0.tgz | Transitive | N/A* | &#10060; | | [WS-2018-0148](https://hackerone.com/reports/321701) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | N/A* | &#10060; | | [CVE-2022-3517](https://www.mend.io/vulnerability-database/CVE-2022-3517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-3.0.4.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-21803](https://www.mend.io/vulnerability-database/CVE-2022-21803) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | detected in multiple dependencies | Transitive | 4.0.0 | &#9989; | | [CVE-2022-38900](https://www.mend.io/vulnerability-database/CVE-2022-38900) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | decode-uri-component-0.2.0.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2021-3820](https://www.mend.io/vulnerability-database/CVE-2021-3820) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | i-0.3.6.tgz | Transitive | 3.0.0 | &#9989; | | [CVE-2020-7598](https://www.mend.io/vulnerability-database/CVE-2020-7598) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.6 | detected in multiple dependencies | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10747</summary> ### Vulnerable Libraries - <b>set-value-0.4.3.tgz</b>, <b>set-value-2.0.0.tgz</b></p> <p> ### <b>set-value-0.4.3.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/union-value/node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - union-value-1.0.0.tgz - :x: **set-value-0.4.3.tgz** (Vulnerable Library) ### <b>set-value-2.0.0.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - :x: **set-value-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> set-value is vulnerable to Prototype Pollution in versions lower than 3.0.1. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using any of the constructor, prototype and _proto_ payloads. <p>Publish Date: 2019-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10747>CVE-2019-10747</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-10-29</p> <p>Fix Resolution (set-value): 2.0.1</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p><p>Fix Resolution (set-value): 2.0.1</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-10746</summary> ### Vulnerable Library - <b>mixin-deep-1.3.1.tgz</b></p> <p>Deeply mix the properties of objects into the first object. Like merge-deep, but doesn't clone.</p> <p>Library home page: <a href="https://registry.npmjs.org/mixin-deep/-/mixin-deep-1.3.1.tgz">https://registry.npmjs.org/mixin-deep/-/mixin-deep-1.3.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mixin-deep/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - :x: **mixin-deep-1.3.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> mixin-deep is vulnerable to Prototype Pollution in versions before 1.3.2 and version 2.0.0. The function mixin-deep could be tricked into adding or modifying properties of Object.prototype using a constructor payload. <p>Publish Date: 2019-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-10746>CVE-2019-10746</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2019-08-23</p> <p>Fix Resolution (mixin-deep): 1.3.2</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44906</summary> ### Vulnerable Libraries - <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.5.tgz</b>, <b>minimist-0.0.8.tgz</b></p> <p> ### <b>minimist-0.0.10.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) ### <b>minimist-1.2.5.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/prettyjson/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - prettyjson-1.2.1.tgz - :x: **minimist-1.2.5.tgz** (Vulnerable Library) ### <b>minimist-0.0.8.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-44906>CVE-2021-44906</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution (minimist): 1.2.6</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7788</summary> ### Vulnerable Library - <b>ini-1.3.5.tgz</b></p> <p>An ini encoder/decoder for node</p> <p>Library home page: <a href="https://registry.npmjs.org/ini/-/ini-1.3.5.tgz">https://registry.npmjs.org/ini/-/ini-1.3.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/ini/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - nconf-0.10.0.tgz - :x: **ini-1.3.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package ini before 1.3.6. If an attacker submits a malicious INI file to an application that parses it with ini.parse, they will pollute the prototype on the application. This can be exploited further depending on the context. <p>Publish Date: 2020-12-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7788>CVE-2020-7788</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7788</a></p> <p>Release Date: 2020-12-11</p> <p>Fix Resolution (ini): 1.3.6</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-23440</summary> ### Vulnerable Libraries - <b>set-value-0.4.3.tgz</b>, <b>set-value-2.0.0.tgz</b></p> <p> ### <b>set-value-0.4.3.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz">https://registry.npmjs.org/set-value/-/set-value-0.4.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/union-value/node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - union-value-1.0.0.tgz - :x: **set-value-0.4.3.tgz** (Vulnerable Library) ### <b>set-value-2.0.0.tgz</b></p> <p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p> <p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/set-value/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - base-0.11.2.tgz - cache-base-1.0.1.tgz - :x: **set-value-2.0.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440. <p>Publish Date: 2021-09-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23440>CVE-2021-23440</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/">https://www.huntr.dev/bounties/2eae1159-01de-4f82-a177-7478a408c4a2/</a></p> <p>Release Date: 2021-09-12</p> <p>Fix Resolution: set-value - 2.0.1,4.0.1</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7774</summary> ### Vulnerable Library - <b>y18n-3.2.1.tgz</b></p> <p>the bare-bones internationalization library used by yargs</p> <p>Library home page: <a href="https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz">https://registry.npmjs.org/y18n/-/y18n-3.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/y18n/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - nconf-0.10.0.tgz - yargs-3.32.0.tgz - :x: **y18n-3.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package y18n before 3.2.2, 4.0.1 and 5.0.5, is vulnerable to Prototype Pollution. <p>Publish Date: 2020-11-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7774>CVE-2020-7774</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1654">https://www.npmjs.com/advisories/1654</a></p> <p>Release Date: 2020-11-17</p> <p>Fix Resolution (y18n): 3.2.2</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2019-20149</summary> ### Vulnerable Library - <b>kind-of-6.0.2.tgz</b></p> <p>Get the native type of a value.</p> <p>Library home page: <a href="https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz">https://registry.npmjs.org/kind-of/-/kind-of-6.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/base/node_modules/kind-of/package.json,/node_modules/micromatch/node_modules/kind-of/package.json,/node_modules/nanomatch/node_modules/kind-of/package.json,/node_modules/define-property/node_modules/kind-of/package.json,/node_modules/snapdragon-node/node_modules/kind-of/package.json,/node_modules/extglob/node_modules/kind-of/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - anymatch-2.0.0.tgz - micromatch-3.1.10.tgz - :x: **kind-of-6.0.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> ctorName in index.js in kind-of v6.0.2 allows external user input to overwrite certain internal attributes via a conflicting name, as demonstrated by 'constructor': {'name':'Symbol'}. Hence, a crafted payload can overwrite this builtin attribute to manipulate the type detection result. <p>Publish Date: 2019-12-30 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2019-20149>CVE-2019-20149</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20149">http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20149</a></p> <p>Release Date: 2019-12-30</p> <p>Fix Resolution (kind-of): 6.0.3</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-28469</summary> ### Vulnerable Library - <b>glob-parent-3.1.0.tgz</b></p> <p>Strips glob magic from a string to provide the parent directory path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - :x: **glob-parent-3.1.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package glob-parent before 5.1.2. The enclosure regex used to check for strings ending in enclosure containing path separator. <p>Publish Date: 2021-06-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-28469>CVE-2020-28469</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28469</a></p> <p>Release Date: 2021-06-03</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2018-0148</summary> ### Vulnerable Libraries - <b>utile-0.3.0.tgz</b>, <b>utile-0.2.1.tgz</b></p> <p> ### <b>utile-0.3.0.tgz</b></p> <p>A drop-in replacement for `util` with some additional advantageous functions</p> <p>Library home page: <a href="https://registry.npmjs.org/utile/-/utile-0.3.0.tgz">https://registry.npmjs.org/utile/-/utile-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/utile/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - :x: **utile-0.3.0.tgz** (Vulnerable Library) ### <b>utile-0.2.1.tgz</b></p> <p>A drop-in replacement for `util` with some additional advantageous functions</p> <p>Library home page: <a href="https://registry.npmjs.org/utile/-/utile-0.2.1.tgz">https://registry.npmjs.org/utile/-/utile-0.2.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/prompt/node_modules/utile/package.json,/node_modules/broadway/node_modules/utile/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - flatiron-0.4.3.tgz - prompt-0.2.14.tgz - :x: **utile-0.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The `utile` npm module, version 0.3.0, allows to extract sensitive data from uninitialized memory or to cause a DoS by passing in a large number, in setups where typed user input can be passed (e.g. from JSON). <p>Publish Date: 2018-07-16 <p>URL: <a href=https://hackerone.com/reports/321701>WS-2018-0148</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/WS-2018-0148">https://nvd.nist.gov/vuln/detail/WS-2018-0148</a></p> <p>Release Date: 2018-01-16</p> <p>Fix Resolution: JetBrains.Rider.Frontend5 - 213.0.20211008.154703-eap03</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3517</summary> ### Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3517>CVE-2022-3517</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> <p></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-21803</summary> ### Vulnerable Libraries - <b>nconf-0.6.9.tgz</b>, <b>nconf-0.10.0.tgz</b></p> <p> ### <b>nconf-0.6.9.tgz</b></p> <p>Hierarchical node.js configuration with files, environment variables, command-line arguments, and atomic object merging.</p> <p>Library home page: <a href="https://registry.npmjs.org/nconf/-/nconf-0.6.9.tgz">https://registry.npmjs.org/nconf/-/nconf-0.6.9.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/broadway/node_modules/nconf/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - flatiron-0.4.3.tgz - broadway-0.3.6.tgz - :x: **nconf-0.6.9.tgz** (Vulnerable Library) ### <b>nconf-0.10.0.tgz</b></p> <p>Hierarchical node.js configuration with files, environment variables, command-line arguments, and atomic object merging.</p> <p>Library home page: <a href="https://registry.npmjs.org/nconf/-/nconf-0.10.0.tgz">https://registry.npmjs.org/nconf/-/nconf-0.10.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/nconf/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - :x: **nconf-0.10.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> This affects the package nconf before 0.11.4. When using the memory engine, it is possible to store a nested JSON representation of the configuration. The .set() function, that is responsible for setting the configuration properties, is vulnerable to Prototype Pollution. By providing a crafted property, it is possible to modify the properties on the Object.prototype. <p>Publish Date: 2022-04-12 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-21803>CVE-2022-21803</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21803">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-21803</a></p> <p>Release Date: 2022-04-12</p> <p>Fix Resolution (nconf): 0.11.4</p> <p>Direct dependency fix Resolution (forever): 4.0.0</p><p>Fix Resolution (nconf): 0.11.4</p> <p>Direct dependency fix Resolution (forever): 4.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-38900</summary> ### Vulnerable Library - <b>decode-uri-component-0.2.0.tgz</b></p> <p>A better decodeURIComponent</p> <p>Library home page: <a href="https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz">https://registry.npmjs.org/decode-uri-component/-/decode-uri-component-0.2.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/decode-uri-component/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - forever-monitor-2.0.0.tgz - chokidar-2.1.8.tgz - braces-2.3.2.tgz - snapdragon-0.8.2.tgz - source-map-resolve-0.5.2.tgz - :x: **decode-uri-component-0.2.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS. <p>Publish Date: 2022-11-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-38900>CVE-2022-38900</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-w573-4hg7-7wgq">https://github.com/advisories/GHSA-w573-4hg7-7wgq</a></p> <p>Release Date: 2022-11-28</p> <p>Fix Resolution (decode-uri-component): 0.2.1</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-3820</summary> ### Vulnerable Library - <b>i-0.3.6.tgz</b></p> <p>custom inflections for nodejs</p> <p>Library home page: <a href="https://registry.npmjs.org/i/-/i-0.3.6.tgz">https://registry.npmjs.org/i/-/i-0.3.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/i/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - utile-0.3.0.tgz - :x: **i-0.3.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> inflect is vulnerable to Inefficient Regular Expression Complexity <p>Publish Date: 2021-09-27 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-3820>CVE-2021-3820</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3820">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3820</a></p> <p>Release Date: 2021-09-27</p> <p>Fix Resolution (i): 0.3.7</p> <p>Direct dependency fix Resolution (forever): 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2020-7598</summary> ### Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b></p> <p> ### <b>minimist-0.0.8.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) ### <b>minimist-0.0.10.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - forever-2.0.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Dima2021/MCW5/commit/c3a86499c8dab38d50eb7430d62810cc4a90db85">c3a86499c8dab38d50eb7430d62810cc4a90db85</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7598>CVE-2020-7598</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> <p></p> </details> *** <p>In order to enable automatic remediation for this issue, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p>
non_priority
forever tgz vulnerabilities highest severity is vulnerable library forever tgz path to dependency file package json path to vulnerable library node modules nconf package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in forever version remediation available high detected in multiple dependencies transitive high mixin deep tgz transitive high detected in multiple dependencies transitive high ini tgz transitive high detected in multiple dependencies transitive n a high tgz transitive high kind of tgz transitive high glob parent tgz transitive n a high detected in multiple dependencies transitive n a high minimatch tgz transitive n a high detected in multiple dependencies transitive high decode uri component tgz transitive high i tgz transitive medium detected in multiple dependencies transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the details section below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable libraries set value tgz set value tgz set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable library node modules union value node modules set value package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz braces tgz snapdragon tgz base tgz cache base tgz union value tgz x set value tgz vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable library node modules set value package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz braces tgz snapdragon tgz base tgz cache base tgz x set value tgz vulnerable library found in head commit a href found in base branch main vulnerability details set value is vulnerable to prototype pollution in versions lower than the function mixin deep could be tricked into adding or modifying properties of object prototype using any of the constructor prototype and proto payloads publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution set value direct dependency fix resolution forever fix resolution set value direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable library mixin deep tgz deeply mix the properties of objects into the first object like merge deep but doesn t clone library home page a href path to dependency file package json path to vulnerable library node modules mixin deep package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz braces tgz snapdragon tgz base tgz x mixin deep tgz vulnerable library found in head commit a href found in base branch main vulnerability details mixin deep is vulnerable to prototype pollution in versions before and version the function mixin deep could be tricked into adding or modifying properties of object prototype using a constructor payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution mixin deep direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules minimist package json dependency hierarchy forever tgz root library optimist tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules prettyjson node modules minimist package json dependency hierarchy forever tgz root library prettyjson tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules mkdirp node modules minimist package json dependency hierarchy forever tgz root library mkdirp tgz x minimist tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimist is vulnerable to prototype pollution via file index js function setkey lines publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution minimist direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable library ini tgz an ini encoder decoder for node library home page a href path to dependency file package json path to vulnerable library node modules ini package json dependency hierarchy forever tgz root library nconf tgz x ini tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects the package ini before if an attacker submits a malicious ini file to an application that parses it with ini parse they will pollute the prototype on the application this can be exploited further depending on the context publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ini direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable libraries set value tgz set value tgz set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable library node modules union value node modules set value package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz braces tgz snapdragon tgz base tgz cache base tgz union value tgz x set value tgz vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable library node modules set value package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz braces tgz snapdragon tgz base tgz cache base tgz x set value tgz vulnerable library found in head commit a href found in base branch main vulnerability details mend note after conducting further research mend has determined that all versions of set value up to version are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution set value cve vulnerable library tgz the bare bones internationalization library used by yargs library home page a href path to dependency file package json path to vulnerable library node modules package json dependency hierarchy forever tgz root library nconf tgz yargs tgz x tgz vulnerable library found in head commit a href found in base branch main vulnerability details the package before and is vulnerable to prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable library kind of tgz get the native type of a value library home page a href path to dependency file package json path to vulnerable library node modules base node modules kind of package json node modules micromatch node modules kind of package json node modules nanomatch node modules kind of package json node modules define property node modules kind of package json node modules snapdragon node node modules kind of package json node modules extglob node modules kind of package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz anymatch tgz micromatch tgz x kind of tgz vulnerable library found in head commit a href found in base branch main vulnerability details ctorname in index js in kind of allows external user input to overwrite certain internal attributes via a conflicting name as demonstrated by constructor name symbol hence a crafted payload can overwrite this builtin attribute to manipulate the type detection result publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution kind of direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable library glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file package json path to vulnerable library node modules glob parent package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects the package glob parent before the enclosure regex used to check for strings ending in enclosure containing path separator publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent ws vulnerable libraries utile tgz utile tgz utile tgz a drop in replacement for util with some additional advantageous functions library home page a href path to dependency file package json path to vulnerable library node modules utile package json dependency hierarchy forever tgz root library x utile tgz vulnerable library utile tgz a drop in replacement for util with some additional advantageous functions library home page a href path to dependency file package json path to vulnerable library node modules prompt node modules utile package json node modules broadway node modules utile package json dependency hierarchy forever tgz root library flatiron tgz prompt tgz x utile tgz vulnerable library found in head commit a href found in base branch main vulnerability details the utile npm module version allows to extract sensitive data from uninitialized memory or to cause a dos by passing in a large number in setups where typed user input can be passed e g from json publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jetbrains rider cve vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules minimatch package json dependency hierarchy forever tgz root library forever monitor tgz x minimatch tgz vulnerable library found in head commit a href found in base branch main vulnerability details a vulnerability was found in the minimatch package this flaw allows a regular expression denial of service redos when calling the braceexpand function with specific arguments resulting in a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution minimatch cve vulnerable libraries nconf tgz nconf tgz nconf tgz hierarchical node js configuration with files environment variables command line arguments and atomic object merging library home page a href path to dependency file package json path to vulnerable library node modules broadway node modules nconf package json dependency hierarchy forever tgz root library flatiron tgz broadway tgz x nconf tgz vulnerable library nconf tgz hierarchical node js configuration with files environment variables command line arguments and atomic object merging library home page a href path to dependency file package json path to vulnerable library node modules nconf package json dependency hierarchy forever tgz root library x nconf tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects the package nconf before when using the memory engine it is possible to store a nested json representation of the configuration the set function that is responsible for setting the configuration properties is vulnerable to prototype pollution by providing a crafted property it is possible to modify the properties on the object prototype publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution nconf direct dependency fix resolution forever fix resolution nconf direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable library decode uri component tgz a better decodeuricomponent library home page a href path to dependency file package json path to vulnerable library node modules decode uri component package json dependency hierarchy forever tgz root library forever monitor tgz chokidar tgz braces tgz snapdragon tgz source map resolve tgz x decode uri component tgz vulnerable library found in head commit a href found in base branch main vulnerability details decode uri component is vulnerable to improper input validation resulting in dos publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution decode uri component direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable library i tgz custom inflections for nodejs library home page a href path to dependency file package json path to vulnerable library node modules i package json dependency hierarchy forever tgz root library utile tgz x i tgz vulnerable library found in head commit a href found in base branch main vulnerability details inflect is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution i direct dependency fix resolution forever in order to enable automatic remediation please create cve vulnerable libraries minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules mkdirp node modules minimist package json dependency hierarchy forever tgz root library mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules minimist package json dependency hierarchy forever tgz root library optimist tgz x minimist tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version release date fix resolution minimist in order to enable automatic remediation for this issue please create
0
252,143
27,229,875,132
IssuesEvent
2023-02-21 12:27:05
uriel-naor/HOTFIX
https://api.github.com/repos/uriel-naor/HOTFIX
closed
dustjs-linkedin-2.6.0.tgz: 5 vulnerabilities (highest severity is: 8.8) - autoclosed
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dustjs-linkedin-2.6.0.tgz</b></p></summary> <p>Asynchronous templates for the browser and node.js ( LinkedIn fork )</p> <p>Library home page: <a href="https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz">https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/dustjs-linkedin/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (dustjs-linkedin version) | Fix PR available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-4264](https://www.mend.io/vulnerability-database/CVE-2021-4264) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | dustjs-linkedin-2.6.0.tgz | Direct | N/A | &#10060; | | [WS-2016-0036](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | cli-0.6.6.tgz | Transitive | 2.7.5 | &#9989; | | [CVE-2022-3517](https://www.mend.io/vulnerability-database/CVE-2022-3517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-0.3.0.tgz | Transitive | 2.7.5 | &#9989; | | [CVE-2016-10540](https://www.mend.io/vulnerability-database/CVE-2016-10540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-0.3.0.tgz | Transitive | 2.7.5 | &#9989; | | [CVE-2016-10538](https://www.mend.io/vulnerability-database/CVE-2016-10538) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.5 | cli-0.6.6.tgz | Transitive | 2.7.5 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-4264</summary> ### Vulnerable Library - <b>dustjs-linkedin-2.6.0.tgz</b></p> <p>Asynchronous templates for the browser and node.js ( LinkedIn fork )</p> <p>Library home page: <a href="https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz">https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/dustjs-linkedin/package.json</p> <p> Dependency Hierarchy: - :x: **dustjs-linkedin-2.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. <p>Publish Date: 2022-12-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4264>CVE-2021-4264</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2021-4264">https://www.cve.org/CVERecord?id=CVE-2021-4264</a></p> <p>Release Date: 2022-12-21</p> <p>Fix Resolution: dustjs-linkedin - 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2016-0036</summary> ### Vulnerable Library - <b>cli-0.6.6.tgz</b></p> <p>A tool for rapidly building command line apps</p> <p>Library home page: <a href="https://registry.npmjs.org/cli/-/cli-0.6.6.tgz">https://registry.npmjs.org/cli/-/cli-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - :x: **cli-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package node-cli insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to. <p>Publish Date: 2016-08-16 <p>URL: <a href=https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252>WS-2016-0036</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2016-08-16</p> <p>Fix Resolution (cli): 1.0.0</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3517</summary> ### Vulnerable Library - <b>minimatch-0.3.0.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - cli-0.6.6.tgz - glob-3.2.11.tgz - :x: **minimatch-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3517>CVE-2022-3517</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution (minimatch): minimatch - 3.0.5</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-10540</summary> ### Vulnerable Library - <b>minimatch-0.3.0.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - cli-0.6.6.tgz - glob-3.2.11.tgz - :x: **minimatch-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10540>CVE-2016-10540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10540">https://nvd.nist.gov/vuln/detail/CVE-2016-10540</a></p> <p>Release Date: 2018-04-26</p> <p>Fix Resolution (minimatch): Pvc.Browserify - 0.0.1.1;JetBrains.Rider.Frontend4 - 203.0.20201014.202610-eap04;JetBrains.Rider.Frontend5 - 203.0.20201006.200056-eap03,213.0.20211008.154703-eap03;Bridge.AWS - 0.3.30.36;tslint - 3.11.0;MIDIator.WebClient - 1.0.105;BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;ng-grid - 2.0.4;minimatch - 3.0.2;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Triarc.Web.Build - 1.3.0;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Mustache.Reports.Data - 1.2.2;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 2.0.0,1.0.2;AntData.ORM - 1.2.9;ApiExplorer.HelpPage - 1.0.0-alpha3;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;BumperLane.Public.Api.Client - 0.23.35.214-prerelease</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2016-10538</summary> ### Vulnerable Library - <b>cli-0.6.6.tgz</b></p> <p>A tool for rapidly building command line apps</p> <p>Library home page: <a href="https://registry.npmjs.org/cli/-/cli-0.6.6.tgz">https://registry.npmjs.org/cli/-/cli-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - :x: **cli-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package `node-cli` before 1.0.0 insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10538>CVE-2016-10538</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10538">https://nvd.nist.gov/vuln/detail/CVE-2016-10538</a></p> <p>Release Date: 2018-05-31</p> <p>Fix Resolution (cli): 1.0.0</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
dustjs-linkedin-2.6.0.tgz: 5 vulnerabilities (highest severity is: 8.8) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dustjs-linkedin-2.6.0.tgz</b></p></summary> <p>Asynchronous templates for the browser and node.js ( LinkedIn fork )</p> <p>Library home page: <a href="https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz">https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/dustjs-linkedin/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (dustjs-linkedin version) | Fix PR available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-4264](https://www.mend.io/vulnerability-database/CVE-2021-4264) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | dustjs-linkedin-2.6.0.tgz | Direct | N/A | &#10060; | | [WS-2016-0036](https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | cli-0.6.6.tgz | Transitive | 2.7.5 | &#9989; | | [CVE-2022-3517](https://www.mend.io/vulnerability-database/CVE-2022-3517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-0.3.0.tgz | Transitive | 2.7.5 | &#9989; | | [CVE-2016-10540](https://www.mend.io/vulnerability-database/CVE-2016-10540) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-0.3.0.tgz | Transitive | 2.7.5 | &#9989; | | [CVE-2016-10538](https://www.mend.io/vulnerability-database/CVE-2016-10538) | <img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low | 3.5 | cli-0.6.6.tgz | Transitive | 2.7.5 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-4264</summary> ### Vulnerable Library - <b>dustjs-linkedin-2.6.0.tgz</b></p> <p>Asynchronous templates for the browser and node.js ( LinkedIn fork )</p> <p>Library home page: <a href="https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz">https://registry.npmjs.org/dustjs-linkedin/-/dustjs-linkedin-2.6.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/dustjs-linkedin/package.json</p> <p> Dependency Hierarchy: - :x: **dustjs-linkedin-2.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in LinkedIn dustjs up to 2.x and classified as problematic. Affected by this issue is some unknown functionality. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is ddb6523832465d38c9d80189e9de60519ac307c3. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216464. <p>Publish Date: 2022-12-21 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-4264>CVE-2021-4264</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2021-4264">https://www.cve.org/CVERecord?id=CVE-2021-4264</a></p> <p>Release Date: 2022-12-21</p> <p>Fix Resolution: dustjs-linkedin - 3.0.0</p> </p> <p></p> <p>In order to enable automatic remediation, please create <a target="_blank" href="https://docs.mend.io/bundle/integrations/page/mend_for_github_com.html#MendforGitHub.com-RemediateSettings(remediateSettings)">workflow rules</a></p> </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> WS-2016-0036</summary> ### Vulnerable Library - <b>cli-0.6.6.tgz</b></p> <p>A tool for rapidly building command line apps</p> <p>Library home page: <a href="https://registry.npmjs.org/cli/-/cli-0.6.6.tgz">https://registry.npmjs.org/cli/-/cli-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - :x: **cli-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package node-cli insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to. <p>Publish Date: 2016-08-16 <p>URL: <a href=https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=809252>WS-2016-0036</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2016-08-16</p> <p>Fix Resolution (cli): 1.0.0</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3517</summary> ### Vulnerable Library - <b>minimatch-0.3.0.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - cli-0.6.6.tgz - glob-3.2.11.tgz - :x: **minimatch-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: 2022-10-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3517>CVE-2022-3517</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-17</p> <p>Fix Resolution (minimatch): minimatch - 3.0.5</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2016-10540</summary> ### Vulnerable Library - <b>minimatch-0.3.0.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz">https://registry.npmjs.org/minimatch/-/minimatch-0.3.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - cli-0.6.6.tgz - glob-3.2.11.tgz - :x: **minimatch-0.3.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimatch is a minimal matching utility that works by converting glob expressions into JavaScript `RegExp` objects. The primary function, `minimatch(path, pattern)` in Minimatch 3.0.1 and earlier is vulnerable to ReDoS in the `pattern` parameter. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10540>CVE-2016-10540</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10540">https://nvd.nist.gov/vuln/detail/CVE-2016-10540</a></p> <p>Release Date: 2018-04-26</p> <p>Fix Resolution (minimatch): Pvc.Browserify - 0.0.1.1;JetBrains.Rider.Frontend4 - 203.0.20201014.202610-eap04;JetBrains.Rider.Frontend5 - 203.0.20201006.200056-eap03,213.0.20211008.154703-eap03;Bridge.AWS - 0.3.30.36;tslint - 3.11.0;MIDIator.WebClient - 1.0.105;BumperLane.Public.Service.Contracts - 0.23.35.214-prerelease;ng-grid - 2.0.4;minimatch - 3.0.2;Virteom.Tenant.Mobile.Bluetooth - 0.21.29.159-prerelease;ShowingVault.DotNet.Sdk - 0.13.41.190-prerelease;Triarc.Web.Build - 1.3.0;Virteom.Tenant.Mobile.Framework.UWP - 0.20.41.103-prerelease;Virteom.Tenant.Mobile.Framework.iOS - 0.20.41.103-prerelease;BumperLane.Public.Api.V2.ClientModule - 0.23.35.214-prerelease;Virteom.Tenant.Mobile.Bluetooth.iOS - 0.20.41.103-prerelease;Virteom.Public.Utilities - 0.23.37.212-prerelease;Mustache.Reports.Data - 1.2.2;Virteom.Tenant.Mobile.Framework - 0.21.29.159-prerelease;Virteom.Tenant.Mobile.Bluetooth.Android - 0.20.41.103-prerelease;z4a-dotnet-scaffold - 1.0.0.2;Raml.Parser - 2.0.0,1.0.2;AntData.ORM - 1.2.9;ApiExplorer.HelpPage - 1.0.0-alpha3;SitecoreMaster.TrueDynamicPlaceholders - 1.0.3;Virteom.Tenant.Mobile.Framework.Android - 0.20.41.103-prerelease;BumperLane.Public.Api.Client - 0.23.35.214-prerelease</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> CVE-2016-10538</summary> ### Vulnerable Library - <b>cli-0.6.6.tgz</b></p> <p>A tool for rapidly building command line apps</p> <p>Library home page: <a href="https://registry.npmjs.org/cli/-/cli-0.6.6.tgz">https://registry.npmjs.org/cli/-/cli-0.6.6.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/cli/package.json</p> <p> Dependency Hierarchy: - dustjs-linkedin-2.6.0.tgz (Root Library) - :x: **cli-0.6.6.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/uriel-naor/HOTFIX/commit/3bc753a65c01eab39a0bf5cf3aed58995c79c72a">3bc753a65c01eab39a0bf5cf3aed58995c79c72a</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> The package `node-cli` before 1.0.0 insecurely uses the lock_file and log_file. Both of these are temporary, but it allows the starting user to overwrite any file they have access to. <p>Publish Date: 2018-05-31 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-10538>CVE-2016-10538</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>3.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-10538">https://nvd.nist.gov/vuln/detail/CVE-2016-10538</a></p> <p>Release Date: 2018-05-31</p> <p>Fix Resolution (cli): 1.0.0</p> <p>Direct dependency fix Resolution (dustjs-linkedin): 2.7.5</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
dustjs linkedin tgz vulnerabilities highest severity is autoclosed vulnerable library dustjs linkedin tgz asynchronous templates for the browser and node js linkedin fork library home page a href path to dependency file package json path to vulnerable library node modules dustjs linkedin package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in dustjs linkedin version fix pr available high dustjs linkedin tgz direct n a high cli tgz transitive high minimatch tgz transitive high minimatch tgz transitive low cli tgz transitive details cve vulnerable library dustjs linkedin tgz asynchronous templates for the browser and node js linkedin fork library home page a href path to dependency file package json path to vulnerable library node modules dustjs linkedin package json dependency hierarchy x dustjs linkedin tgz vulnerable library found in head commit a href found in base branch main vulnerability details a vulnerability was found in linkedin dustjs up to x and classified as problematic affected by this issue is some unknown functionality the manipulation leads to improperly controlled modification of object prototype attributes prototype pollution the attack may be launched remotely the exploit has been disclosed to the public and may be used upgrading to version is able to address this issue the name of the patch is it is recommended to upgrade the affected component the identifier of this vulnerability is vdb publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution dustjs linkedin in order to enable automatic remediation please create ws vulnerable library cli tgz a tool for rapidly building command line apps library home page a href path to dependency file package json path to vulnerable library node modules cli package json dependency hierarchy dustjs linkedin tgz root library x cli tgz vulnerable library found in head commit a href found in base branch main vulnerability details the package node cli insecurely uses the lock file and log file both of these are temporary but it allows the starting user to overwrite any file they have access to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version release date fix resolution cli direct dependency fix resolution dustjs linkedin rescue worker helmet automatic remediation is available for this issue cve vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules cli node modules minimatch package json dependency hierarchy dustjs linkedin tgz root library cli tgz glob tgz x minimatch tgz vulnerable library found in head commit a href found in base branch main vulnerability details a vulnerability was found in the minimatch package this flaw allows a regular expression denial of service redos when calling the braceexpand function with specific arguments resulting in a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution minimatch minimatch direct dependency fix resolution dustjs linkedin rescue worker helmet automatic remediation is available for this issue cve vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules cli node modules minimatch package json dependency hierarchy dustjs linkedin tgz root library cli tgz glob tgz x minimatch tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimatch is a minimal matching utility that works by converting glob expressions into javascript regexp objects the primary function minimatch path pattern in minimatch and earlier is vulnerable to redos in the pattern parameter publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimatch pvc browserify jetbrains rider jetbrains rider bridge aws tslint midiator webclient bumperlane public service contracts prerelease ng grid minimatch virteom tenant mobile bluetooth prerelease showingvault dotnet sdk prerelease triarc web build virteom tenant mobile framework uwp prerelease virteom tenant mobile framework ios prerelease bumperlane public api clientmodule prerelease virteom tenant mobile bluetooth ios prerelease virteom public utilities prerelease mustache reports data virteom tenant mobile framework prerelease virteom tenant mobile bluetooth android prerelease dotnet scaffold raml parser antdata orm apiexplorer helppage sitecoremaster truedynamicplaceholders virteom tenant mobile framework android prerelease bumperlane public api client prerelease direct dependency fix resolution dustjs linkedin rescue worker helmet automatic remediation is available for this issue cve vulnerable library cli tgz a tool for rapidly building command line apps library home page a href path to dependency file package json path to vulnerable library node modules cli package json dependency hierarchy dustjs linkedin tgz root library x cli tgz vulnerable library found in head commit a href found in base branch main vulnerability details the package node cli before insecurely uses the lock file and log file both of these are temporary but it allows the starting user to overwrite any file they have access to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction required scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cli direct dependency fix resolution dustjs linkedin rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
327,846
24,156,342,515
IssuesEvent
2022-09-22 08:01:48
haruka98/ak_oneclick_installer
https://api.github.com/repos/haruka98/ak_oneclick_installer
closed
Link to clients on the message after the installation is done
documentation enhancement
Hi, this project is a very helpful project and it would be even more awesome. if u could add to that green message that is displayed at the end with the database password the link to download the client you choose at the start because looking thru the ragezone forums at this point is very confusing. And since u seem to be doing it for distinct client versions that were posted, it would be really helpful if u could either add the ragezone link to the client or a mediafire/mega link to it. best regards.
1.0
Link to clients on the message after the installation is done - Hi, this project is a very helpful project and it would be even more awesome. if u could add to that green message that is displayed at the end with the database password the link to download the client you choose at the start because looking thru the ragezone forums at this point is very confusing. And since u seem to be doing it for distinct client versions that were posted, it would be really helpful if u could either add the ragezone link to the client or a mediafire/mega link to it. best regards.
non_priority
link to clients on the message after the installation is done hi this project is a very helpful project and it would be even more awesome if u could add to that green message that is displayed at the end with the database password the link to download the client you choose at the start because looking thru the ragezone forums at this point is very confusing and since u seem to be doing it for distinct client versions that were posted it would be really helpful if u could either add the ragezone link to the client or a mediafire mega link to it best regards
0
67,407
16,977,009,720
IssuesEvent
2021-06-30 01:30:49
ironmansoftware/issues
https://api.github.com/repos/ironmansoftware/issues
closed
No scrollbar in logs
Fixed in Nightly Build PowerShell Universal bug completed
> No scrollbar for logs, or scripts or any other part with long data. It is not comfortable to scroll long parts with Mouse Wheel Up/Down. Version: 2.0.3
1.0
No scrollbar in logs - > No scrollbar for logs, or scripts or any other part with long data. It is not comfortable to scroll long parts with Mouse Wheel Up/Down. Version: 2.0.3
non_priority
no scrollbar in logs no scrollbar for logs or scripts or any other part with long data it is not comfortable to scroll long parts with mouse wheel up down version
0
148,822
19,552,504,162
IssuesEvent
2022-01-03 01:03:16
artsking/linux-5.12.9
https://api.github.com/repos/artsking/linux-5.12.9
opened
WS-2021-0455 (Medium) detected in linux-yocto-devv5.12.14
security vulnerability
## WS-2021-0455 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv5.12.14</b></p></summary> <p> <p>Linux Embedded Kernel - tracks the next mainline release</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-dev>https://git.yoctoproject.org/git/linux-yocto-dev</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/gpu/drm/nouveau/nouveau_gem.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Linux/Kernel is vulnerable to avoid a use-after-free when BO init fails in drivers/gpu/drm/nouveau/nouveau_gem.c <p>Publish Date: 2021-11-29 <p>URL: <a href=https://github.com/gregkh/linux/commit/548f2ff8ea5e0ce767ae3418d1ec5308990be87d>WS-2021-0455</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001689">https://osv.dev/vulnerability/UVI-2021-1001689</a></p> <p>Release Date: 2021-11-29</p> <p>Fix Resolution: Linux/Kernel - v5.14.12, v5.10.73, v5.15-rc5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2021-0455 (Medium) detected in linux-yocto-devv5.12.14 - ## WS-2021-0455 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-yocto-devv5.12.14</b></p></summary> <p> <p>Linux Embedded Kernel - tracks the next mainline release</p> <p>Library home page: <a href=https://git.yoctoproject.org/git/linux-yocto-dev>https://git.yoctoproject.org/git/linux-yocto-dev</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/gpu/drm/nouveau/nouveau_gem.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In Linux/Kernel is vulnerable to avoid a use-after-free when BO init fails in drivers/gpu/drm/nouveau/nouveau_gem.c <p>Publish Date: 2021-11-29 <p>URL: <a href=https://github.com/gregkh/linux/commit/548f2ff8ea5e0ce767ae3418d1ec5308990be87d>WS-2021-0455</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://osv.dev/vulnerability/UVI-2021-1001689">https://osv.dev/vulnerability/UVI-2021-1001689</a></p> <p>Release Date: 2021-11-29</p> <p>Fix Resolution: Linux/Kernel - v5.14.12, v5.10.73, v5.15-rc5</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws medium detected in linux yocto ws medium severity vulnerability vulnerable library linux yocto linux embedded kernel tracks the next mainline release library home page a href found in base branch master vulnerable source files drivers gpu drm nouveau nouveau gem c vulnerability details in linux kernel is vulnerable to avoid a use after free when bo init fails in drivers gpu drm nouveau nouveau gem c publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution linux kernel step up your open source security game with whitesource
0
54,283
30,002,615,094
IssuesEvent
2023-06-26 10:17:01
vuestorefront/storefront-ui
https://api.github.com/repos/vuestorefront/storefront-ui
closed
[BUG] Load only images that are needed at the time of usage
bug performance v1.x.x
**Describe the bug** There is a problem with hero mobile and desktop banners. On desktop everything is ok, but on mobile there are 2 images downloaded (for desktop and for mobile) even if one of them is not used. This has real impact on perf on mobile because we are downloading unnecessary big images (if there are 3 items in hero there are additional 3 images). ┆Issue is synchronized with this [Jira Zadanie](https://vsf.atlassian.net/browse/SFUI-102) by [Unito](https://www.unito.io)
True
[BUG] Load only images that are needed at the time of usage - **Describe the bug** There is a problem with hero mobile and desktop banners. On desktop everything is ok, but on mobile there are 2 images downloaded (for desktop and for mobile) even if one of them is not used. This has real impact on perf on mobile because we are downloading unnecessary big images (if there are 3 items in hero there are additional 3 images). ┆Issue is synchronized with this [Jira Zadanie](https://vsf.atlassian.net/browse/SFUI-102) by [Unito](https://www.unito.io)
non_priority
load only images that are needed at the time of usage describe the bug there is a problem with hero mobile and desktop banners on desktop everything is ok but on mobile there are images downloaded for desktop and for mobile even if one of them is not used this has real impact on perf on mobile because we are downloading unnecessary big images if there are items in hero there are additional images ┆issue is synchronized with this by
0
98,404
8,676,169,339
IssuesEvent
2018-11-30 13:19:22
tgoodlet/tractor
https://api.github.com/repos/tgoodlet/tractor
closed
Task already disappeared teardown error?
bug testing
I got this testing out the new options data feed in `piker`: ``` 27.0.0.1', 1616), raddr=('127.0.0.1', 59706)> Nov 28 22:43:28 (MainProcess: MainThread) [TRACE] tractor.ipc _ipc.py:122 send `None` Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:416 Exiting msg loop for <Channel fd=7, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=6, laddr=('127.0.0.1', 1616), raddr=('127.0.0.1', 59696)> from ('anonymous', 'da40804a-f387-11e8-80a0-a402b9cc051a') Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:272 Releasing channel <Channel fd=7, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=6, laddr=('127.0.0.1', 1616), raddr=('127.0.0.1', 59696)> from ('anonymous', 'da40804a-f387-11e8-80a0-a402b9cc051a') Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:276 No more channels for ('anonymous', 'da40804a-f387-11e8-80a0-a402b9cc051a') Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:279 Peers is defaultdict(<class 'list'>, {}) Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:283 Signalling no more peer channels Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:287 Disconnecting channel <Channel fd=7, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=6, laddr=('127.0.0.1', 1616), raddr=('127.0.0.1', 59696)> Nov 28 22:43:28 (MainProcess: MainThread) [TRACE] tractor.ipc _ipc.py:122 send `None` Nov 28 22:43:28 (MainProcess: MainThread) [INFO] piker.broker.data data.py:371 No more subscriptions for questrade Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] piker.broker-config config.py:33 Writing config file /home/tyler/.config/piker/brokers.ini Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:537 All peer channels are complete Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:619 Shutting down channel server Traceback (most recent call last): File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/bin/pikerd", line 11, in <module> load_entry_point('piker', 'console_scripts', 'pikerd')() File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 764, in __call__ return self.main(*args, **kwargs) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 717, in main rv = self.invoke(ctx) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 956, in invoke return ctx.invoke(self.callback, **ctx.params) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 555, in invoke return callback(*args, **kwargs) File "/home/tyler/repos/piker/piker/cli.py", line 37, in pikerd loglevel=loglevel if tl else None, File "/home/tyler/repos/tractor/tractor/__init__.py", line 116, in run_daemon return run(partial(trio.sleep, float('inf')), **kwargs) File "/home/tyler/repos/tractor/tractor/__init__.py", line 98, in run return trio.run(_main, async_fn, args, kwargs, name, arbiter_addr) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/trio/_core/_run.py", line 1337, in run raise runner.main_task_outcome.error File "/home/tyler/repos/tractor/tractor/__init__.py", line 83, in _main actor, main, host, port, arbiter_addr=arbiter_addr) File "/home/tyler/repos/tractor/tractor/_actor.py", line 738, in _start_actor actor.cancel_server() File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/trio/_core/_run.py", line 397, in __aexit__ raise combined_error_from_nursery File "/home/tyler/repos/tractor/tractor/_actor.py", line 500, in _async_main log.debug("Waiting on root nursery to complete") File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/trio/_core/_run.py", line 397, in __aexit__ raise combined_error_from_nursery File "/home/tyler/repos/tractor/tractor/_actor.py", line 140, in _invoke tasks.remove((cs, func)) ValueError: list.remove(x): x not in list ``` Setup was: - started `pikerd` as standalone daemon-actor - started `piker monitor` - started options feed test from `piker` test suite - close the `piker monitor` - `pikerd` bailed as above...
1.0
Task already disappeared teardown error? - I got this testing out the new options data feed in `piker`: ``` 27.0.0.1', 1616), raddr=('127.0.0.1', 59706)> Nov 28 22:43:28 (MainProcess: MainThread) [TRACE] tractor.ipc _ipc.py:122 send `None` Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:416 Exiting msg loop for <Channel fd=7, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=6, laddr=('127.0.0.1', 1616), raddr=('127.0.0.1', 59696)> from ('anonymous', 'da40804a-f387-11e8-80a0-a402b9cc051a') Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:272 Releasing channel <Channel fd=7, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=6, laddr=('127.0.0.1', 1616), raddr=('127.0.0.1', 59696)> from ('anonymous', 'da40804a-f387-11e8-80a0-a402b9cc051a') Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:276 No more channels for ('anonymous', 'da40804a-f387-11e8-80a0-a402b9cc051a') Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:279 Peers is defaultdict(<class 'list'>, {}) Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:283 Signalling no more peer channels Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:287 Disconnecting channel <Channel fd=7, family=AddressFamily.AF_INET, type=SocketKind.SOCK_STREAM, proto=6, laddr=('127.0.0.1', 1616), raddr=('127.0.0.1', 59696)> Nov 28 22:43:28 (MainProcess: MainThread) [TRACE] tractor.ipc _ipc.py:122 send `None` Nov 28 22:43:28 (MainProcess: MainThread) [INFO] piker.broker.data data.py:371 No more subscriptions for questrade Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] piker.broker-config config.py:33 Writing config file /home/tyler/.config/piker/brokers.ini Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:537 All peer channels are complete Nov 28 22:43:28 (MainProcess: MainThread) [DEBUG] tractor _actor.py:619 Shutting down channel server Traceback (most recent call last): File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/bin/pikerd", line 11, in <module> load_entry_point('piker', 'console_scripts', 'pikerd')() File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 764, in __call__ return self.main(*args, **kwargs) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 717, in main rv = self.invoke(ctx) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 956, in invoke return ctx.invoke(self.callback, **ctx.params) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/click/core.py", line 555, in invoke return callback(*args, **kwargs) File "/home/tyler/repos/piker/piker/cli.py", line 37, in pikerd loglevel=loglevel if tl else None, File "/home/tyler/repos/tractor/tractor/__init__.py", line 116, in run_daemon return run(partial(trio.sleep, float('inf')), **kwargs) File "/home/tyler/repos/tractor/tractor/__init__.py", line 98, in run return trio.run(_main, async_fn, args, kwargs, name, arbiter_addr) File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/trio/_core/_run.py", line 1337, in run raise runner.main_task_outcome.error File "/home/tyler/repos/tractor/tractor/__init__.py", line 83, in _main actor, main, host, port, arbiter_addr=arbiter_addr) File "/home/tyler/repos/tractor/tractor/_actor.py", line 738, in _start_actor actor.cancel_server() File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/trio/_core/_run.py", line 397, in __aexit__ raise combined_error_from_nursery File "/home/tyler/repos/tractor/tractor/_actor.py", line 500, in _async_main log.debug("Waiting on root nursery to complete") File "/home/tyler/.local/share/virtualenvs/piker-PaB62peT/lib/python3.7/site-packages/trio/_core/_run.py", line 397, in __aexit__ raise combined_error_from_nursery File "/home/tyler/repos/tractor/tractor/_actor.py", line 140, in _invoke tasks.remove((cs, func)) ValueError: list.remove(x): x not in list ``` Setup was: - started `pikerd` as standalone daemon-actor - started `piker monitor` - started options feed test from `piker` test suite - close the `piker monitor` - `pikerd` bailed as above...
non_priority
task already disappeared teardown error i got this testing out the new options data feed in piker raddr nov mainprocess mainthread tractor ipc ipc py send none nov mainprocess mainthread tractor actor py exiting msg loop for from anonymous nov mainprocess mainthread tractor actor py releasing channel from anonymous nov mainprocess mainthread tractor actor py no more channels for anonymous nov mainprocess mainthread tractor actor py peers is defaultdict nov mainprocess mainthread tractor actor py signalling no more peer channels nov mainprocess mainthread tractor actor py disconnecting channel nov mainprocess mainthread tractor ipc ipc py send none nov mainprocess mainthread piker broker data data py no more subscriptions for questrade nov mainprocess mainthread piker broker config config py writing config file home tyler config piker brokers ini nov mainprocess mainthread tractor actor py all peer channels are complete nov mainprocess mainthread tractor actor py shutting down channel server traceback most recent call last file home tyler local share virtualenvs piker bin pikerd line in load entry point piker console scripts pikerd file home tyler local share virtualenvs piker lib site packages click core py line in call return self main args kwargs file home tyler local share virtualenvs piker lib site packages click core py line in main rv self invoke ctx file home tyler local share virtualenvs piker lib site packages click core py line in invoke return ctx invoke self callback ctx params file home tyler local share virtualenvs piker lib site packages click core py line in invoke return callback args kwargs file home tyler repos piker piker cli py line in pikerd loglevel loglevel if tl else none file home tyler repos tractor tractor init py line in run daemon return run partial trio sleep float inf kwargs file home tyler repos tractor tractor init py line in run return trio run main async fn args kwargs name arbiter addr file home tyler local share virtualenvs piker lib site packages trio core run py line in run raise runner main task outcome error file home tyler repos tractor tractor init py line in main actor main host port arbiter addr arbiter addr file home tyler repos tractor tractor actor py line in start actor actor cancel server file home tyler local share virtualenvs piker lib site packages trio core run py line in aexit raise combined error from nursery file home tyler repos tractor tractor actor py line in async main log debug waiting on root nursery to complete file home tyler local share virtualenvs piker lib site packages trio core run py line in aexit raise combined error from nursery file home tyler repos tractor tractor actor py line in invoke tasks remove cs func valueerror list remove x x not in list setup was started pikerd as standalone daemon actor started piker monitor started options feed test from piker test suite close the piker monitor pikerd bailed as above
0
169,818
13,162,503,087
IssuesEvent
2020-08-10 21:45:35
rancher/rke2
https://api.github.com/repos/rancher/rke2
closed
Rancher Integration: Recognize RKE2 cluster on import
[zube]: To Test kind/task rancher-integration
Much like with K3s, add support for recognizing an imported RKE2 cluster.
1.0
Rancher Integration: Recognize RKE2 cluster on import - Much like with K3s, add support for recognizing an imported RKE2 cluster.
non_priority
rancher integration recognize cluster on import much like with add support for recognizing an imported cluster
0
81,721
31,472,567,405
IssuesEvent
2023-08-30 08:33:20
primefaces/primefaces
https://api.github.com/repos/primefaces/primefaces
closed
Menu : MenuItem oncomplete script is not called if no action is specified
:lady_beetle: defect :bangbang: needs-triage
### Describe the bug Hi ! Since the Primefaces 13 release, if you define a menu with a menuitem with an `oncomplete` script and you don't define a bean `action` method, the `oncomplete` script is not called. ### Reproducer ``` <p:menu> <p:menuitem value="Without action" oncomplete="console.log('Oncomplete not called')" /> <p:menuitem value="With action" action="#{testView.init()}" oncomplete="console.log('Oncomplete called')" /> </p:menu> ``` ### Expected behavior The oncomplete script should be called independently of the action method. ### PrimeFaces edition Elite ### PrimeFaces version 13.0.0 and 14.0.0-SNAPSHOT ### Theme _No response_ ### JSF implementation All ### JSF version 4.0 ### Java version 11 ### Browser(s) All
1.0
Menu : MenuItem oncomplete script is not called if no action is specified - ### Describe the bug Hi ! Since the Primefaces 13 release, if you define a menu with a menuitem with an `oncomplete` script and you don't define a bean `action` method, the `oncomplete` script is not called. ### Reproducer ``` <p:menu> <p:menuitem value="Without action" oncomplete="console.log('Oncomplete not called')" /> <p:menuitem value="With action" action="#{testView.init()}" oncomplete="console.log('Oncomplete called')" /> </p:menu> ``` ### Expected behavior The oncomplete script should be called independently of the action method. ### PrimeFaces edition Elite ### PrimeFaces version 13.0.0 and 14.0.0-SNAPSHOT ### Theme _No response_ ### JSF implementation All ### JSF version 4.0 ### Java version 11 ### Browser(s) All
non_priority
menu menuitem oncomplete script is not called if no action is specified describe the bug hi since the primefaces release if you define a menu with a menuitem with an oncomplete script and you don t define a bean action method the oncomplete script is not called reproducer expected behavior the oncomplete script should be called independently of the action method primefaces edition elite primefaces version and snapshot theme no response jsf implementation all jsf version java version browser s all
0
29,684
5,661,069,115
IssuesEvent
2017-04-10 16:28:23
spring-cloud/spring-cloud-dataflow
https://api.github.com/repos/spring-cloud/spring-cloud-dataflow
opened
Document MVP composed task features with samples
documentation ready
As a developer, I'd like to document composed task feature capabilities with samples. **Acceptance:** - a new section "Composed Task" to be added in the left nav in the reference guide - port "Composed Task Runner" [samples](https://github.com/cppwfs/composed-task-runner/blob/SCTAS-20/spring-cloud-starter-task-composedtaskrunner/README.adoc) to the core reference guide and describe in the context of SCDF - add a `note` on unsupported and upcoming features
1.0
Document MVP composed task features with samples - As a developer, I'd like to document composed task feature capabilities with samples. **Acceptance:** - a new section "Composed Task" to be added in the left nav in the reference guide - port "Composed Task Runner" [samples](https://github.com/cppwfs/composed-task-runner/blob/SCTAS-20/spring-cloud-starter-task-composedtaskrunner/README.adoc) to the core reference guide and describe in the context of SCDF - add a `note` on unsupported and upcoming features
non_priority
document mvp composed task features with samples as a developer i d like to document composed task feature capabilities with samples acceptance a new section composed task to be added in the left nav in the reference guide port composed task runner to the core reference guide and describe in the context of scdf add a note on unsupported and upcoming features
0
1,057
2,711,098,219
IssuesEvent
2015-04-09 01:53:02
hydranox/foo-pub
https://api.github.com/repos/hydranox/foo-pub
opened
FAQ Page | About
enhancement language nice to have usability visual
Wie im moodle, nur für nicht-moodler. Sollten !GDI2ler Probleme, Wünsche, Fragen haben, liegen dort alle Informationen vor (multilingual), die man benötigt
True
FAQ Page | About - Wie im moodle, nur für nicht-moodler. Sollten !GDI2ler Probleme, Wünsche, Fragen haben, liegen dort alle Informationen vor (multilingual), die man benötigt
non_priority
faq page about wie im moodle nur für nicht moodler sollten probleme wünsche fragen haben liegen dort alle informationen vor multilingual die man benötigt
0
211,382
16,442,050,472
IssuesEvent
2021-05-20 15:19:49
gravitational/teleport
https://api.github.com/repos/gravitational/teleport
closed
Update GSuite SSO docs to match Google workspace
documentation sso
## Summary Update documentation to match current GCP and Google Workspac eflow. GSuite has become google workspace. Some of the flows have changed. There are also different flows in GCP vs what's in the SSO documentation. ### Audience Enterprise customers configuring Google Workspace OIDC. ### Location Update GSuite docs
1.0
Update GSuite SSO docs to match Google workspace - ## Summary Update documentation to match current GCP and Google Workspac eflow. GSuite has become google workspace. Some of the flows have changed. There are also different flows in GCP vs what's in the SSO documentation. ### Audience Enterprise customers configuring Google Workspace OIDC. ### Location Update GSuite docs
non_priority
update gsuite sso docs to match google workspace summary update documentation to match current gcp and google workspac eflow gsuite has become google workspace some of the flows have changed there are also different flows in gcp vs what s in the sso documentation audience enterprise customers configuring google workspace oidc location update gsuite docs
0
85,037
10,426,076,704
IssuesEvent
2019-09-16 16:44:33
google/blockly
https://api.github.com/repos/google/blockly
closed
Link in `ReadME` points to an invalid URL
triage type: documentation
<!-- - Thanks for helping us improve our developer site documentation! - Use this template to describe issues with the content at - developers.google.com/blockly/guides --> **Where** In `blockly/readME.md` <!-- A link to the page with the documentation you want us to update. - More specific is better. If no page exists, describe what the page - should be, and where. --> **What** <!-- What kind of content is it? - Check a box with an 'x' between the brackets: [x] --> - [x] Text - [ ] Image or Gif - [ ] Other **Old content** Currently, `Blockly Docs` link is mentioned wrong in the `readME.md` <!-- What the documentation currently says --> **Suggested content** Correct the link for `Blockly` <!-- Your suggestion for improved documentation -->
1.0
Link in `ReadME` points to an invalid URL - <!-- - Thanks for helping us improve our developer site documentation! - Use this template to describe issues with the content at - developers.google.com/blockly/guides --> **Where** In `blockly/readME.md` <!-- A link to the page with the documentation you want us to update. - More specific is better. If no page exists, describe what the page - should be, and where. --> **What** <!-- What kind of content is it? - Check a box with an 'x' between the brackets: [x] --> - [x] Text - [ ] Image or Gif - [ ] Other **Old content** Currently, `Blockly Docs` link is mentioned wrong in the `readME.md` <!-- What the documentation currently says --> **Suggested content** Correct the link for `Blockly` <!-- Your suggestion for improved documentation -->
non_priority
link in readme points to an invalid url thanks for helping us improve our developer site documentation use this template to describe issues with the content at developers google com blockly guides where in blockly readme md a link to the page with the documentation you want us to update more specific is better if no page exists describe what the page should be and where what what kind of content is it check a box with an x between the brackets text image or gif other old content currently blockly docs link is mentioned wrong in the readme md suggested content correct the link for blockly
0
225,864
24,907,271,077
IssuesEvent
2022-10-29 12:17:21
stavros-k/docs
https://api.github.com/repos/stavros-k/docs
closed
core-2.1.0.tgz: 5 vulnerabilities (highest severity is: 7.5) - autoclosed
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>core-2.1.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/loader-utils/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (core version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-25858](https://www.mend.io/vulnerability-database/CVE-2022-25858) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | terser-5.14.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-3517](https://www.mend.io/vulnerability-database/CVE-2022-3517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-3.0.4.tgz | Transitive | N/A* | &#10060; | | [CVE-2020-7753](https://www.mend.io/vulnerability-database/CVE-2020-7753) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | trim-0.0.1.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-37599](https://www.mend.io/vulnerability-database/CVE-2022-37599) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | loader-utils-2.0.2.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-33987](https://www.mend.io/vulnerability-database/CVE-2022-33987) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | got-9.6.0.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25858</summary> ### Vulnerable Library - <b>terser-5.14.0.tgz</b></p> <p>JavaScript parser, mangler/compressor and beautifier toolkit for ES6+</p> <p>Library home page: <a href="https://registry.npmjs.org/terser/-/terser-5.14.0.tgz">https://registry.npmjs.org/terser/-/terser-5.14.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/terser/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - html-minifier-terser-6.1.0.tgz - :x: **terser-5.14.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions. <p>Publish Date: Jul 15, 2022 8:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25858>CVE-2022-25858</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858</a></p> <p>Release Date: Jul 15, 2022 8:15:00 PM</p> <p>Fix Resolution: terser - 4.8.1,5.14.2</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3517</summary> ### Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-handler/node_modules/minimatch/package.json,/node_modules/recursive-readdir/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - react-dev-utils-12.0.1.tgz - recursive-readdir-2.2.2.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: Oct 17, 2022 8:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3517>CVE-2022-3517</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: Oct 17, 2022 8:15:00 PM</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7753</summary> ### Vulnerable Library - <b>trim-0.0.1.tgz</b></p> <p>Trim string whitespace</p> <p>Library home page: <a href="https://registry.npmjs.org/trim/-/trim-0.0.1.tgz">https://registry.npmjs.org/trim/-/trim-0.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/trim/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - mdx-loader-2.1.0.tgz - mdx-1.6.22.tgz - remark-parse-8.0.3.tgz - :x: **trim-0.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim(). <p>Publish Date: Oct 27, 2020 9:15:00 AM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7753>CVE-2020-7753</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: Oct 27, 2020 9:15:00 AM</p> <p>Fix Resolution: trim - 0.0.3</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-37599</summary> ### Vulnerable Library - <b>loader-utils-2.0.2.tgz</b></p> <p>utils for webpack loaders</p> <p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.2.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/loader-utils/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - file-loader-6.2.0.tgz - :x: **loader-utils-2.0.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js. <p>Publish Date: Oct 11, 2022 7:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-37599>CVE-2022-37599</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-33987</summary> ### Vulnerable Library - <b>got-9.6.0.tgz</b></p> <p>Simplified HTTP requests</p> <p>Library home page: <a href="https://registry.npmjs.org/got/-/got-9.6.0.tgz">https://registry.npmjs.org/got/-/got-9.6.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/got/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - update-notifier-5.1.0.tgz - latest-version-5.1.0.tgz - package-json-6.5.0.tgz - :x: **got-9.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket. <p>Publish Date: Jun 18, 2022 9:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-33987>CVE-2022-33987</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987</a></p> <p>Release Date: Jun 18, 2022 9:15:00 PM</p> <p>Fix Resolution: got - 11.8.5,12.1.0</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
True
core-2.1.0.tgz: 5 vulnerabilities (highest severity is: 7.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>core-2.1.0.tgz</b></p></summary> <p></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/loader-utils/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (core version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2022-25858](https://www.mend.io/vulnerability-database/CVE-2022-25858) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | terser-5.14.0.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-3517](https://www.mend.io/vulnerability-database/CVE-2022-3517) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | minimatch-3.0.4.tgz | Transitive | N/A* | &#10060; | | [CVE-2020-7753](https://www.mend.io/vulnerability-database/CVE-2020-7753) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | trim-0.0.1.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-37599](https://www.mend.io/vulnerability-database/CVE-2022-37599) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | loader-utils-2.0.2.tgz | Transitive | N/A* | &#10060; | | [CVE-2022-33987](https://www.mend.io/vulnerability-database/CVE-2022-33987) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 5.3 | got-9.6.0.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the section "Details" below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-25858</summary> ### Vulnerable Library - <b>terser-5.14.0.tgz</b></p> <p>JavaScript parser, mangler/compressor and beautifier toolkit for ES6+</p> <p>Library home page: <a href="https://registry.npmjs.org/terser/-/terser-5.14.0.tgz">https://registry.npmjs.org/terser/-/terser-5.14.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/terser/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - html-minifier-terser-6.1.0.tgz - :x: **terser-5.14.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions. <p>Publish Date: Jul 15, 2022 8:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-25858>CVE-2022-25858</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25858</a></p> <p>Release Date: Jul 15, 2022 8:15:00 PM</p> <p>Fix Resolution: terser - 4.8.1,5.14.2</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-3517</summary> ### Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p> <p>a glob matcher in javascript</p> <p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/serve-handler/node_modules/minimatch/package.json,/node_modules/recursive-readdir/node_modules/minimatch/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - react-dev-utils-12.0.1.tgz - recursive-readdir-2.2.2.tgz - :x: **minimatch-3.0.4.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service. <p>Publish Date: Oct 17, 2022 8:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-3517>CVE-2022-3517</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: Oct 17, 2022 8:15:00 PM</p> <p>Fix Resolution: minimatch - 3.0.5</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-7753</summary> ### Vulnerable Library - <b>trim-0.0.1.tgz</b></p> <p>Trim string whitespace</p> <p>Library home page: <a href="https://registry.npmjs.org/trim/-/trim-0.0.1.tgz">https://registry.npmjs.org/trim/-/trim-0.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/trim/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - mdx-loader-2.1.0.tgz - mdx-1.6.22.tgz - remark-parse-8.0.3.tgz - :x: **trim-0.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> All versions of package trim are vulnerable to Regular Expression Denial of Service (ReDoS) via trim(). <p>Publish Date: Oct 27, 2020 9:15:00 AM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7753>CVE-2020-7753</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: Oct 27, 2020 9:15:00 AM</p> <p>Fix Resolution: trim - 0.0.3</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2022-37599</summary> ### Vulnerable Library - <b>loader-utils-2.0.2.tgz</b></p> <p>utils for webpack loaders</p> <p>Library home page: <a href="https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.2.tgz">https://registry.npmjs.org/loader-utils/-/loader-utils-2.0.2.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/loader-utils/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - file-loader-6.2.0.tgz - :x: **loader-utils-2.0.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> A Regular expression denial of service (ReDoS) flaw was found in Function interpolateName in interpolateName.js in webpack loader-utils 2.0.0 via the resourcePath variable in interpolateName.js. <p>Publish Date: Oct 11, 2022 7:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-37599>CVE-2022-37599</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>7.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-33987</summary> ### Vulnerable Library - <b>got-9.6.0.tgz</b></p> <p>Simplified HTTP requests</p> <p>Library home page: <a href="https://registry.npmjs.org/got/-/got-9.6.0.tgz">https://registry.npmjs.org/got/-/got-9.6.0.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/got/package.json</p> <p> Dependency Hierarchy: - core-2.1.0.tgz (Root Library) - update-notifier-5.1.0.tgz - latest-version-5.1.0.tgz - package-json-6.5.0.tgz - :x: **got-9.6.0.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/stavros-k/docs/commit/26747832187d17842cc24c9d0b8006d23e454605">26747832187d17842cc24c9d0b8006d23e454605</a></p> <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> The got package before 12.1.0 (also fixed in 11.8.5) for Node.js allows a redirect to a UNIX socket. <p>Publish Date: Jun 18, 2022 9:15:00 PM <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-33987>CVE-2022-33987</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.3</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-33987</a></p> <p>Release Date: Jun 18, 2022 9:15:00 PM</p> <p>Fix Resolution: got - 11.8.5,12.1.0</p> </p> <p></p> Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) </details>
non_priority
core tgz vulnerabilities highest severity is autoclosed vulnerable library core tgz path to dependency file package json path to vulnerable library node modules loader utils package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in core version remediation available high terser tgz transitive n a high minimatch tgz transitive n a high trim tgz transitive n a high loader utils tgz transitive n a medium got tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the section details below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library terser tgz javascript parser mangler compressor and beautifier toolkit for library home page a href path to dependency file package json path to vulnerable library node modules terser package json dependency hierarchy core tgz root library html minifier terser tgz x terser tgz vulnerable library found in head commit a href found in base branch master vulnerability details the package terser before from and before are vulnerable to regular expression denial of service redos due to insecure usage of regular expressions publish date jul pm url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date jul pm fix resolution terser step up your open source security game with mend cve vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file package json path to vulnerable library node modules serve handler node modules minimatch package json node modules recursive readdir node modules minimatch package json dependency hierarchy core tgz root library react dev utils tgz recursive readdir tgz x minimatch tgz vulnerable library found in head commit a href found in base branch master vulnerability details a vulnerability was found in the minimatch package this flaw allows a regular expression denial of service redos when calling the braceexpand function with specific arguments resulting in a denial of service publish date oct pm url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date oct pm fix resolution minimatch step up your open source security game with mend cve vulnerable library trim tgz trim string whitespace library home page a href path to dependency file package json path to vulnerable library node modules trim package json dependency hierarchy core tgz root library mdx loader tgz mdx tgz remark parse tgz x trim tgz vulnerable library found in head commit a href found in base branch master vulnerability details all versions of package trim are vulnerable to regular expression denial of service redos via trim publish date oct am url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date oct am fix resolution trim step up your open source security game with mend cve vulnerable library loader utils tgz utils for webpack loaders library home page a href path to dependency file package json path to vulnerable library node modules loader utils package json dependency hierarchy core tgz root library file loader tgz x loader utils tgz vulnerable library found in head commit a href found in base branch master vulnerability details a regular expression denial of service redos flaw was found in function interpolatename in interpolatename js in webpack loader utils via the resourcepath variable in interpolatename js publish date oct pm url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with mend cve vulnerable library got tgz simplified http requests library home page a href path to dependency file package json path to vulnerable library node modules got package json dependency hierarchy core tgz root library update notifier tgz latest version tgz package json tgz x got tgz vulnerable library found in head commit a href found in base branch master vulnerability details the got package before also fixed in for node js allows a redirect to a unix socket publish date jun pm url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date jun pm fix resolution got step up your open source security game with mend
0
391,519
26,896,189,008
IssuesEvent
2023-02-06 12:36:19
keptn/lifecycle-toolkit
https://api.github.com/repos/keptn/lifecycle-toolkit
closed
Fix x-refs on docs page
documentation
get the "edit this page" and "view source" links working that are under a specific version
1.0
Fix x-refs on docs page - get the "edit this page" and "view source" links working that are under a specific version
non_priority
fix x refs on docs page get the edit this page and view source links working that are under a specific version
0
70,631
8,562,835,911
IssuesEvent
2018-11-09 12:01:04
Altinn/altinn-studio
https://api.github.com/repos/Altinn/altinn-studio
opened
Element/component: Multiple choice
designer needs-spesification team-tamagotchi ui-editor
**Functional architect/designer:** @-mention **Technical architect:** @-mention **Description** As a service developer I want to add an element to my service which as alternatives where the end user can select multiple boxes. **Sketch (if relevant)** (Screenshot and link to Figma, make sure your sketch is public!) **Navigation from/to (if relevant)** This functionality is reached from... **Technical considerations** Input (beyond tasks) on how the user story should be solved can be put here. **Acceptance criterea** - What is allowed/not allowed - Validations - Error messages and warnings - ... **Tasks** - [ ] Example task
1.0
Element/component: Multiple choice - **Functional architect/designer:** @-mention **Technical architect:** @-mention **Description** As a service developer I want to add an element to my service which as alternatives where the end user can select multiple boxes. **Sketch (if relevant)** (Screenshot and link to Figma, make sure your sketch is public!) **Navigation from/to (if relevant)** This functionality is reached from... **Technical considerations** Input (beyond tasks) on how the user story should be solved can be put here. **Acceptance criterea** - What is allowed/not allowed - Validations - Error messages and warnings - ... **Tasks** - [ ] Example task
non_priority
element component multiple choice functional architect designer mention technical architect mention description as a service developer i want to add an element to my service which as alternatives where the end user can select multiple boxes sketch if relevant screenshot and link to figma make sure your sketch is public navigation from to if relevant this functionality is reached from technical considerations input beyond tasks on how the user story should be solved can be put here acceptance criterea what is allowed not allowed validations error messages and warnings tasks example task
0
9,666
6,412,301,115
IssuesEvent
2017-08-08 02:35:58
FReBOmusic/FReBO
https://api.github.com/repos/FReBOmusic/FReBO
opened
Posts Tab
Usability
In the event that the user navigates to the Items Tab Bar, on the Inventory Screen. **Expected Response**: The Posts Tab should be displayed on the Items Tab Bar.
True
Posts Tab - In the event that the user navigates to the Items Tab Bar, on the Inventory Screen. **Expected Response**: The Posts Tab should be displayed on the Items Tab Bar.
non_priority
posts tab in the event that the user navigates to the items tab bar on the inventory screen expected response the posts tab should be displayed on the items tab bar
0
97,785
20,387,629,533
IssuesEvent
2022-02-22 08:49:33
loyio/blog
https://api.github.com/repos/loyio/blog
closed
Problems 22 : Generate Parentheses
Leetcode
Given n pairs of parentheses, write a function to generate all combinations of well-formed parentheses. Example 1: ``` Input: n = 3 Output: ["((()))","(()())","(())()","()(())","()()()"] ``` Example 2: ``` Input: n = 1 Output: ["()"] ``` Constraints: - 1 <= n <= 8
1.0
Problems 22 : Generate Parentheses - Given n pairs of parentheses, write a function to generate all combinations of well-formed parentheses. Example 1: ``` Input: n = 3 Output: ["((()))","(()())","(())()","()(())","()()()"] ``` Example 2: ``` Input: n = 1 Output: ["()"] ``` Constraints: - 1 <= n <= 8
non_priority
problems generate parentheses given n pairs of parentheses write a function to generate all combinations of well formed parentheses example input n output example input n output constraints n
0
18,683
13,066,199,468
IssuesEvent
2020-07-30 21:11:52
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
closed
put software.icecube.wisc.edu in svn (Trac #1132)
Migrated from Trac infrastructure task
Allow normal users to edit the main software.icecube.wisc.edu page by putting it in svn. Of course, nega would still have to manually update the server. But this is better than sending patches. Migrated from https://code.icecube.wisc.edu/ticket/1132 ```json { "status": "closed", "changetime": "2015-08-17T19:23:13", "description": "Allow normal users to edit the main software.icecube.wisc.edu page by putting it in svn. Of course, nega would still have to manually update the server. But this is better than sending patches.", "reporter": "david.schultz", "cc": "", "resolution": "fixed", "_ts": "1439839393805609", "component": "infrastructure", "summary": "put software.icecube.wisc.edu in svn", "priority": "major", "keywords": "", "time": "2015-08-17T19:11:10", "milestone": "", "owner": "nega", "type": "task" } ```
1.0
put software.icecube.wisc.edu in svn (Trac #1132) - Allow normal users to edit the main software.icecube.wisc.edu page by putting it in svn. Of course, nega would still have to manually update the server. But this is better than sending patches. Migrated from https://code.icecube.wisc.edu/ticket/1132 ```json { "status": "closed", "changetime": "2015-08-17T19:23:13", "description": "Allow normal users to edit the main software.icecube.wisc.edu page by putting it in svn. Of course, nega would still have to manually update the server. But this is better than sending patches.", "reporter": "david.schultz", "cc": "", "resolution": "fixed", "_ts": "1439839393805609", "component": "infrastructure", "summary": "put software.icecube.wisc.edu in svn", "priority": "major", "keywords": "", "time": "2015-08-17T19:11:10", "milestone": "", "owner": "nega", "type": "task" } ```
non_priority
put software icecube wisc edu in svn trac allow normal users to edit the main software icecube wisc edu page by putting it in svn of course nega would still have to manually update the server but this is better than sending patches migrated from json status closed changetime description allow normal users to edit the main software icecube wisc edu page by putting it in svn of course nega would still have to manually update the server but this is better than sending patches reporter david schultz cc resolution fixed ts component infrastructure summary put software icecube wisc edu in svn priority major keywords time milestone owner nega type task
0
75,015
15,388,288,364
IssuesEvent
2021-03-03 10:34:52
AlexRogalskiy/typescript-tools
https://api.github.com/repos/AlexRogalskiy/typescript-tools
opened
CVE-2020-11023 (Medium) detected in jquery-1.8.1.min.js
security vulnerability
## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.8.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js</a></p> <p>Path to dependency file: typescript-tools/node_modules/redeyed/examples/browser/index.html</p> <p>Path to vulnerable library: typescript-tools/node_modules/redeyed/examples/browser/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/typescript-tools/commit/8be7b1dfb090e54979c7e97d9d02b7400c2b325d">8be7b1dfb090e54979c7e97d9d02b7400c2b325d</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-11023 (Medium) detected in jquery-1.8.1.min.js - ## CVE-2020-11023 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jquery-1.8.1.min.js</b></p></summary> <p>JavaScript library for DOM operations</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js">https://cdnjs.cloudflare.com/ajax/libs/jquery/1.8.1/jquery.min.js</a></p> <p>Path to dependency file: typescript-tools/node_modules/redeyed/examples/browser/index.html</p> <p>Path to vulnerable library: typescript-tools/node_modules/redeyed/examples/browser/index.html</p> <p> Dependency Hierarchy: - :x: **jquery-1.8.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/typescript-tools/commit/8be7b1dfb090e54979c7e97d9d02b7400c2b325d">8be7b1dfb090e54979c7e97d9d02b7400c2b325d</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In jQuery versions greater than or equal to 1.0.3 and before 3.5.0, passing HTML containing <option> elements from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0. <p>Publish Date: 2020-04-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-11023>CVE-2020-11023</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Changed - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11023</a></p> <p>Release Date: 2020-04-29</p> <p>Fix Resolution: jquery - 3.5.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in jquery min js cve medium severity vulnerability vulnerable library jquery min js javascript library for dom operations library home page a href path to dependency file typescript tools node modules redeyed examples browser index html path to vulnerable library typescript tools node modules redeyed examples browser index html dependency hierarchy x jquery min js vulnerable library found in head commit a href vulnerability details in jquery versions greater than or equal to and before passing html containing elements from untrusted sources even after sanitizing it to one of jquery s dom manipulation methods i e html append and others may execute untrusted code this problem is patched in jquery publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jquery step up your open source security game with whitesource
0
40,929
10,228,947,793
IssuesEvent
2019-08-17 07:58:23
netty/netty
https://api.github.com/repos/netty/netty
closed
DefaultDnsRecordDecoder failed
defect
Cannot found a good way to reproduct it ```java 22:52:28.047 [vert.x-eventloop-thread-0] WARN [Test] [io.netty.resolver.dns.DnsNameResolver$DnsResponseHandler:1311,exceptionCaught()] [id: 0xcbd9e081, L:/0:0:0:0:0:0:0:0:56705] Unexpected exception: io.netty.handler.codec.DecoderException: java.lang.IndexOutOfBoundsException: readerIndex(511) + length(2) exceeds writerIndex(512): PooledUnsafeDirectByteBuf(ridx: 511, widx: 512, cap: 4096) at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:98) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:374) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:360) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:352) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1408) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:374) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:360) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:930) at io.netty.channel.nio.AbstractNioMessageChannel$NioMessageUnsafe.read(AbstractNioMessageChannel.java:93) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:697) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:632) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:549) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:511) at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:918) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.lang.Thread.run(Thread.java:748) Caused by: java.lang.IndexOutOfBoundsException: readerIndex(511) + length(2) exceeds writerIndex(512): PooledUnsafeDirectByteBuf(ridx: 511, widx: 512, cap: 4096) at io.netty.buffer.AbstractByteBuf.checkReadableBytes0(AbstractByteBuf.java:1451) at io.netty.buffer.AbstractByteBuf.readShort(AbstractByteBuf.java:757) at io.netty.buffer.AbstractByteBuf.readUnsignedShort(AbstractByteBuf.java:773) at io.netty.handler.codec.dns.DefaultDnsRecordDecoder.decodeRecord(DefaultDnsRecordDecoder.java:61) at io.netty.handler.codec.dns.DnsResponseDecoder.decodeRecords(DnsResponseDecoder.java:88) at io.netty.handler.codec.dns.DnsResponseDecoder.decode(DnsResponseDecoder.java:66) at io.netty.handler.codec.dns.DatagramDnsResponseDecoder.decode(DatagramDnsResponseDecoder.java:58) at io.netty.handler.codec.dns.DatagramDnsResponseDecoder.decode(DatagramDnsResponseDecoder.java:30) at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:88) ... 16 common frames omitted ``` ### Netty version 4.1.37.Final ### JVM version (e.g. `java -version`) Java SE 8 [1.8.0_212] ### OS version (e.g. `uname -a`) Mac OS 10.13.6
1.0
DefaultDnsRecordDecoder failed - Cannot found a good way to reproduct it ```java 22:52:28.047 [vert.x-eventloop-thread-0] WARN [Test] [io.netty.resolver.dns.DnsNameResolver$DnsResponseHandler:1311,exceptionCaught()] [id: 0xcbd9e081, L:/0:0:0:0:0:0:0:0:56705] Unexpected exception: io.netty.handler.codec.DecoderException: java.lang.IndexOutOfBoundsException: readerIndex(511) + length(2) exceeds writerIndex(512): PooledUnsafeDirectByteBuf(ridx: 511, widx: 512, cap: 4096) at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:98) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:374) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:360) at io.netty.channel.AbstractChannelHandlerContext.fireChannelRead(AbstractChannelHandlerContext.java:352) at io.netty.channel.DefaultChannelPipeline$HeadContext.channelRead(DefaultChannelPipeline.java:1408) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:374) at io.netty.channel.AbstractChannelHandlerContext.invokeChannelRead(AbstractChannelHandlerContext.java:360) at io.netty.channel.DefaultChannelPipeline.fireChannelRead(DefaultChannelPipeline.java:930) at io.netty.channel.nio.AbstractNioMessageChannel$NioMessageUnsafe.read(AbstractNioMessageChannel.java:93) at io.netty.channel.nio.NioEventLoop.processSelectedKey(NioEventLoop.java:697) at io.netty.channel.nio.NioEventLoop.processSelectedKeysOptimized(NioEventLoop.java:632) at io.netty.channel.nio.NioEventLoop.processSelectedKeys(NioEventLoop.java:549) at io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:511) at io.netty.util.concurrent.SingleThreadEventExecutor$5.run(SingleThreadEventExecutor.java:918) at io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) at io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) at java.lang.Thread.run(Thread.java:748) Caused by: java.lang.IndexOutOfBoundsException: readerIndex(511) + length(2) exceeds writerIndex(512): PooledUnsafeDirectByteBuf(ridx: 511, widx: 512, cap: 4096) at io.netty.buffer.AbstractByteBuf.checkReadableBytes0(AbstractByteBuf.java:1451) at io.netty.buffer.AbstractByteBuf.readShort(AbstractByteBuf.java:757) at io.netty.buffer.AbstractByteBuf.readUnsignedShort(AbstractByteBuf.java:773) at io.netty.handler.codec.dns.DefaultDnsRecordDecoder.decodeRecord(DefaultDnsRecordDecoder.java:61) at io.netty.handler.codec.dns.DnsResponseDecoder.decodeRecords(DnsResponseDecoder.java:88) at io.netty.handler.codec.dns.DnsResponseDecoder.decode(DnsResponseDecoder.java:66) at io.netty.handler.codec.dns.DatagramDnsResponseDecoder.decode(DatagramDnsResponseDecoder.java:58) at io.netty.handler.codec.dns.DatagramDnsResponseDecoder.decode(DatagramDnsResponseDecoder.java:30) at io.netty.handler.codec.MessageToMessageDecoder.channelRead(MessageToMessageDecoder.java:88) ... 16 common frames omitted ``` ### Netty version 4.1.37.Final ### JVM version (e.g. `java -version`) Java SE 8 [1.8.0_212] ### OS version (e.g. `uname -a`) Mac OS 10.13.6
non_priority
defaultdnsrecorddecoder failed cannot found a good way to reproduct it java warn unexpected exception io netty handler codec decoderexception java lang indexoutofboundsexception readerindex length exceeds writerindex pooledunsafedirectbytebuf ridx widx cap at io netty handler codec messagetomessagedecoder channelread messagetomessagedecoder java at io netty channel abstractchannelhandlercontext invokechannelread abstractchannelhandlercontext java at io netty channel abstractchannelhandlercontext invokechannelread abstractchannelhandlercontext java at io netty channel abstractchannelhandlercontext firechannelread abstractchannelhandlercontext java at io netty channel defaultchannelpipeline headcontext channelread defaultchannelpipeline java at io netty channel abstractchannelhandlercontext invokechannelread abstractchannelhandlercontext java at io netty channel abstractchannelhandlercontext invokechannelread abstractchannelhandlercontext java at io netty channel defaultchannelpipeline firechannelread defaultchannelpipeline java at io netty channel nio abstractniomessagechannel niomessageunsafe read abstractniomessagechannel java at io netty channel nio nioeventloop processselectedkey nioeventloop java at io netty channel nio nioeventloop processselectedkeysoptimized nioeventloop java at io netty channel nio nioeventloop processselectedkeys nioeventloop java at io netty channel nio nioeventloop run nioeventloop java at io netty util concurrent singlethreadeventexecutor run singlethreadeventexecutor java at io netty util internal threadexecutormap run threadexecutormap java at io netty util concurrent fastthreadlocalrunnable run fastthreadlocalrunnable java at java lang thread run thread java caused by java lang indexoutofboundsexception readerindex length exceeds writerindex pooledunsafedirectbytebuf ridx widx cap at io netty buffer abstractbytebuf abstractbytebuf java at io netty buffer abstractbytebuf readshort abstractbytebuf java at io netty buffer abstractbytebuf readunsignedshort abstractbytebuf java at io netty handler codec dns defaultdnsrecorddecoder decoderecord defaultdnsrecorddecoder java at io netty handler codec dns dnsresponsedecoder decoderecords dnsresponsedecoder java at io netty handler codec dns dnsresponsedecoder decode dnsresponsedecoder java at io netty handler codec dns datagramdnsresponsedecoder decode datagramdnsresponsedecoder java at io netty handler codec dns datagramdnsresponsedecoder decode datagramdnsresponsedecoder java at io netty handler codec messagetomessagedecoder channelread messagetomessagedecoder java common frames omitted netty version final jvm version e g java version java se os version e g uname a mac os
0
173,298
14,407,384,842
IssuesEvent
2020-12-03 21:45:42
HumanCellAtlas/metadata-schema
https://api.github.com/repos/HumanCellAtlas/metadata-schema
closed
Add some dev facing docs for using ontologies
documentation task
Add documentation to address the following use cases: 1. As a developer against the HCA metadata, I would like to be able to convert an ontology curie to a url so I can provide a link to my users to the ontology entry. 1. As a contributor of HCA metadata, I would like to know what the acceptable terms are for a specific curie so that I can select the best term. 1. As a consumer of the HCA metadata, I would like to know why there is no prod deployment of the HCAO. 1. How you might automate the `rdfs:subClassOf` -> `descendants` mapping? Discussion in slack gave the following explanation from Tony: e.g. for "HANCESTRO:0004" use API link `http://ontology.staging.data.humancellatlas.org/api/ontologies/hancestro/terms?short_form=HANCESTRO_0004` The set of allowed values is informed by this attribute: "relations": ["rdfs:subClassOf"] Given that, you can follow the `_links.descendants.href` URL from the above API endpoint to get the allowed values, i.e. http://ontology.staging.data.humancellatlas.org/api/ontologies/hancestro/terms/http%253A%252F%252Fpurl.obolibrary.org%252Fobo%252FHANCESTRO_0004/descendants
1.0
Add some dev facing docs for using ontologies - Add documentation to address the following use cases: 1. As a developer against the HCA metadata, I would like to be able to convert an ontology curie to a url so I can provide a link to my users to the ontology entry. 1. As a contributor of HCA metadata, I would like to know what the acceptable terms are for a specific curie so that I can select the best term. 1. As a consumer of the HCA metadata, I would like to know why there is no prod deployment of the HCAO. 1. How you might automate the `rdfs:subClassOf` -> `descendants` mapping? Discussion in slack gave the following explanation from Tony: e.g. for "HANCESTRO:0004" use API link `http://ontology.staging.data.humancellatlas.org/api/ontologies/hancestro/terms?short_form=HANCESTRO_0004` The set of allowed values is informed by this attribute: "relations": ["rdfs:subClassOf"] Given that, you can follow the `_links.descendants.href` URL from the above API endpoint to get the allowed values, i.e. http://ontology.staging.data.humancellatlas.org/api/ontologies/hancestro/terms/http%253A%252F%252Fpurl.obolibrary.org%252Fobo%252FHANCESTRO_0004/descendants
non_priority
add some dev facing docs for using ontologies add documentation to address the following use cases as a developer against the hca metadata i would like to be able to convert an ontology curie to a url so i can provide a link to my users to the ontology entry as a contributor of hca metadata i would like to know what the acceptable terms are for a specific curie so that i can select the best term as a consumer of the hca metadata i would like to know why there is no prod deployment of the hcao how you might automate the rdfs subclassof descendants mapping discussion in slack gave the following explanation from tony e g for hancestro use api link the set of allowed values is informed by this attribute relations given that you can follow the links descendants href url from the above api endpoint to get the allowed values i e
0
31,877
26,221,879,313
IssuesEvent
2023-01-04 15:26:21
grafana/agent
https://api.github.com/repos/grafana/agent
closed
Flow: Add ebpf exporter
type/infrastructure
Create `prometheus.integration.ebpf` component, this is a complex exporter and may require additional considerations.
1.0
Flow: Add ebpf exporter - Create `prometheus.integration.ebpf` component, this is a complex exporter and may require additional considerations.
non_priority
flow add ebpf exporter create prometheus integration ebpf component this is a complex exporter and may require additional considerations
0
150,030
23,589,707,904
IssuesEvent
2022-08-23 14:19:41
carbon-design-system/carbon-platform
https://api.github.com/repos/carbon-design-system/carbon-platform
closed
Review landing page for v1
role: design 🎨
Current design: https://www.figma.com/file/uQXFGSKSJRr0l8CDd3cRGw/v1-prototype?node-id=0%3A1 - [x] Update imagery for the v1 release (light theme hero image and image design for breakpoints) - [x] Add .com web components to featured libraries - will need image - [x] Include more basic information about Carbon and clearer information about the ecosystem - [x] Add crosslinks on the homepage to help users get started from there (Potentially—How Carbon Works, Get started designing, Developing) - [ ] Populate the dev issue #905 with changes then remove the blocked label
1.0
Review landing page for v1 - Current design: https://www.figma.com/file/uQXFGSKSJRr0l8CDd3cRGw/v1-prototype?node-id=0%3A1 - [x] Update imagery for the v1 release (light theme hero image and image design for breakpoints) - [x] Add .com web components to featured libraries - will need image - [x] Include more basic information about Carbon and clearer information about the ecosystem - [x] Add crosslinks on the homepage to help users get started from there (Potentially—How Carbon Works, Get started designing, Developing) - [ ] Populate the dev issue #905 with changes then remove the blocked label
non_priority
review landing page for current design update imagery for the release light theme hero image and image design for breakpoints add com web components to featured libraries will need image include more basic information about carbon and clearer information about the ecosystem add crosslinks on the homepage to help users get started from there potentially—how carbon works get started designing developing populate the dev issue with changes then remove the blocked label
0
28,790
8,211,594,812
IssuesEvent
2018-09-04 14:12:47
quicklisp/quicklisp-projects
https://api.github.com/repos/quicklisp/quicklisp-projects
closed
Please Add Studio-Client
canbuild
This is a client library for the [Studio](https://github.com/Shirakumo/studio) image gallery hosting software. Author: Nicolas Hafner Source: https://github.com/Shinmera/studio-client Documentation: https://shinmera.github.io/studio-client
1.0
Please Add Studio-Client - This is a client library for the [Studio](https://github.com/Shirakumo/studio) image gallery hosting software. Author: Nicolas Hafner Source: https://github.com/Shinmera/studio-client Documentation: https://shinmera.github.io/studio-client
non_priority
please add studio client this is a client library for the image gallery hosting software author nicolas hafner source documentation
0
23,365
6,419,937,462
IssuesEvent
2017-08-08 22:29:56
xhqiao89/HydroDesktop_test
https://api.github.com/repos/xhqiao89/HydroDesktop_test
closed
Add Upload Functionality to HydroShare Ribbon
CodePlex
<b>cuylerfris[CodePlex]</b> <br />Write code for the quotuploadquot button on the HydroShare ribbon
1.0
Add Upload Functionality to HydroShare Ribbon - <b>cuylerfris[CodePlex]</b> <br />Write code for the quotuploadquot button on the HydroShare ribbon
non_priority
add upload functionality to hydroshare ribbon cuylerfris write code for the quotuploadquot button on the hydroshare ribbon
0
316,702
27,177,556,782
IssuesEvent
2023-02-18 07:14:32
namhyung/uftrace
https://api.github.com/repos/namhyung/uftrace
closed
incorrect floating point argument/return values
bug args tests
The `t083_arg_float.py` fails as follows. ```diff $ ./runtest.py -vdp -c gcc -O0 083 ... t083_arg_float: diff result of gcc -pg -O0 --- expect 2023-02-16 19:28:09.750616419 +0900 +++ result 2023-02-16 19:28:09.750616419 +0900 @@ -4,3 +4,3 @@ float_mul(300.000000, 400.000000) = 120000.000000; - float_div(40000000000.000000, -0.020000) = -2000000000000.000000; + float_div(40000000000.000000, -0.020000) = 40000000000.000000; } /* main */ 083 arg_float : NG ``` This can simply be reproduced as follows. ``` $ gcc -pg -g tests/s-exp-float.c $ uftrace -a -F float_div t-exp-float # DURATION TID FUNCTION 0.851 us [1775190] | float_div(40000000000.000000, -0.020000) = 40000000000.000000; ```
1.0
incorrect floating point argument/return values - The `t083_arg_float.py` fails as follows. ```diff $ ./runtest.py -vdp -c gcc -O0 083 ... t083_arg_float: diff result of gcc -pg -O0 --- expect 2023-02-16 19:28:09.750616419 +0900 +++ result 2023-02-16 19:28:09.750616419 +0900 @@ -4,3 +4,3 @@ float_mul(300.000000, 400.000000) = 120000.000000; - float_div(40000000000.000000, -0.020000) = -2000000000000.000000; + float_div(40000000000.000000, -0.020000) = 40000000000.000000; } /* main */ 083 arg_float : NG ``` This can simply be reproduced as follows. ``` $ gcc -pg -g tests/s-exp-float.c $ uftrace -a -F float_div t-exp-float # DURATION TID FUNCTION 0.851 us [1775190] | float_div(40000000000.000000, -0.020000) = 40000000000.000000; ```
non_priority
incorrect floating point argument return values the arg float py fails as follows diff runtest py vdp c gcc arg float diff result of gcc pg expect result float mul float div float div main arg float ng this can simply be reproduced as follows gcc pg g tests s exp float c uftrace a f float div t exp float duration tid function us float div
0
350,060
31,849,482,548
IssuesEvent
2023-09-14 23:29:30
FlashOWare/FlashOWare.Tool
https://api.github.com/repos/FlashOWare/FlashOWare.Tool
opened
Integration tests should not be dependent on file order
type:test scope:tool changelog:none
"Get Files" functions return the files in a different sort order on _Unix_ and _Windows_: - Disallow expecting a document with an already existing name - Normalize file order of expected and actual files on disk -or- make assertion/verify logic independent of the order
1.0
Integration tests should not be dependent on file order - "Get Files" functions return the files in a different sort order on _Unix_ and _Windows_: - Disallow expecting a document with an already existing name - Normalize file order of expected and actual files on disk -or- make assertion/verify logic independent of the order
non_priority
integration tests should not be dependent on file order get files functions return the files in a different sort order on unix and windows disallow expecting a document with an already existing name normalize file order of expected and actual files on disk or make assertion verify logic independent of the order
0
396,128
27,103,342,418
IssuesEvent
2023-02-15 10:16:04
vanderschaarlab/synthcity
https://api.github.com/repos/vanderschaarlab/synthcity
closed
Input format for time series data
documentation
## Question Which input format is required for time series data? ## Further Information Dear SynthCity developers, I really like your work and wanted to test out the package on my own time series dataset. I have a dataset with phone data consisting of passive sensing, sampled daily with some days missing for some individuals. Number of days of collected data varies between individuals. To familiarize me with the required input format I went through the PBC dataset. ``` loader = TimeSeriesDataLoader(temporal_data=temporal, observation_times=temporal_horizons, outcome=outcome_surv, static_data=static_surv) ``` As far as I understand, `temporal_data` is a list of dataframes of variable length containing variables of interest and time as an index column. The `observation_times` is a list of lists with the timestamps for each observation in a list. `outcome` is a tuple with two series of outcomes, and `static_data` is just a dataframe. If I understand correctly I'd have to split temporal features into multiple dataframes, make timestamps the index and put these in a list. Then I'd generate lists of the timestamps for each dataframe add them to the list of observation times and select a list of outcome and static features with the same ordering as the two lists. Before I mess up the analysis, is there anything I'm missing here? If this works out I'd be willing to write a short tutorial on this - could help other labs import their own data.
1.0
Input format for time series data - ## Question Which input format is required for time series data? ## Further Information Dear SynthCity developers, I really like your work and wanted to test out the package on my own time series dataset. I have a dataset with phone data consisting of passive sensing, sampled daily with some days missing for some individuals. Number of days of collected data varies between individuals. To familiarize me with the required input format I went through the PBC dataset. ``` loader = TimeSeriesDataLoader(temporal_data=temporal, observation_times=temporal_horizons, outcome=outcome_surv, static_data=static_surv) ``` As far as I understand, `temporal_data` is a list of dataframes of variable length containing variables of interest and time as an index column. The `observation_times` is a list of lists with the timestamps for each observation in a list. `outcome` is a tuple with two series of outcomes, and `static_data` is just a dataframe. If I understand correctly I'd have to split temporal features into multiple dataframes, make timestamps the index and put these in a list. Then I'd generate lists of the timestamps for each dataframe add them to the list of observation times and select a list of outcome and static features with the same ordering as the two lists. Before I mess up the analysis, is there anything I'm missing here? If this works out I'd be willing to write a short tutorial on this - could help other labs import their own data.
non_priority
input format for time series data question which input format is required for time series data further information dear synthcity developers i really like your work and wanted to test out the package on my own time series dataset i have a dataset with phone data consisting of passive sensing sampled daily with some days missing for some individuals number of days of collected data varies between individuals to familiarize me with the required input format i went through the pbc dataset loader timeseriesdataloader temporal data temporal observation times temporal horizons outcome outcome surv static data static surv as far as i understand temporal data is a list of dataframes of variable length containing variables of interest and time as an index column the observation times is a list of lists with the timestamps for each observation in a list outcome is a tuple with two series of outcomes and static data is just a dataframe if i understand correctly i d have to split temporal features into multiple dataframes make timestamps the index and put these in a list then i d generate lists of the timestamps for each dataframe add them to the list of observation times and select a list of outcome and static features with the same ordering as the two lists before i mess up the analysis is there anything i m missing here if this works out i d be willing to write a short tutorial on this could help other labs import their own data
0
366,554
25,591,320,996
IssuesEvent
2022-12-01 13:12:42
pharmaverse/admiraldev
https://api.github.com/repos/pharmaverse/admiraldev
closed
Documentation: Add keyword/family `metadata`
documentation release Q4-2022
### Please select a category the issue is focused on? Developer Guides ### Let us know where something needs a refresh or put your idea here! https://github.com/pharmaverse/admiral/issues/1527
1.0
Documentation: Add keyword/family `metadata` - ### Please select a category the issue is focused on? Developer Guides ### Let us know where something needs a refresh or put your idea here! https://github.com/pharmaverse/admiral/issues/1527
non_priority
documentation add keyword family metadata please select a category the issue is focused on developer guides let us know where something needs a refresh or put your idea here
0
96,570
16,137,288,404
IssuesEvent
2021-04-29 13:24:50
jgeraigery/creative-assets
https://api.github.com/repos/jgeraigery/creative-assets
opened
WS-2020-0042 (High) detected in acorn-5.7.1.tgz
security vulnerability
## WS-2020-0042 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>acorn-5.7.1.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-5.7.1.tgz">https://registry.npmjs.org/acorn/-/acorn-5.7.1.tgz</a></p> <p>Path to dependency file: creative-assets/package.json</p> <p>Path to vulnerable library: creative-assets/node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - eslint-4.19.1.tgz (Root Library) - espree-3.5.4.tgz - :x: **acorn-5.7.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/creative-assets/commit/4e1f39edcdc762290e5970db636924edc553703b">4e1f39edcdc762290e5970db636924edc553703b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser. <p>Publish Date: 2020-03-01 <p>URL: <a href=https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51>WS-2020-0042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1488">https://www.npmjs.com/advisories/1488</a></p> <p>Release Date: 2020-03-08</p> <p>Fix Resolution: 7.1.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"acorn","packageVersion":"5.7.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint:4.19.1;espree:3.5.4;acorn:5.7.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"7.1.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0042","vulnerabilityDetails":"acorn is vulnerable to REGEX DoS. A regex of the form /[x-\\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser.","vulnerabilityUrl":"https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2020-0042 (High) detected in acorn-5.7.1.tgz - ## WS-2020-0042 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>acorn-5.7.1.tgz</b></p></summary> <p>ECMAScript parser</p> <p>Library home page: <a href="https://registry.npmjs.org/acorn/-/acorn-5.7.1.tgz">https://registry.npmjs.org/acorn/-/acorn-5.7.1.tgz</a></p> <p>Path to dependency file: creative-assets/package.json</p> <p>Path to vulnerable library: creative-assets/node_modules/acorn/package.json</p> <p> Dependency Hierarchy: - eslint-4.19.1.tgz (Root Library) - espree-3.5.4.tgz - :x: **acorn-5.7.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/creative-assets/commit/4e1f39edcdc762290e5970db636924edc553703b">4e1f39edcdc762290e5970db636924edc553703b</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> acorn is vulnerable to REGEX DoS. A regex of the form /[x-\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser. <p>Publish Date: 2020-03-01 <p>URL: <a href=https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51>WS-2020-0042</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.npmjs.com/advisories/1488">https://www.npmjs.com/advisories/1488</a></p> <p>Release Date: 2020-03-08</p> <p>Fix Resolution: 7.1.1</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"acorn","packageVersion":"5.7.1","packageFilePaths":["/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint:4.19.1;espree:3.5.4;acorn:5.7.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"7.1.1"}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2020-0042","vulnerabilityDetails":"acorn is vulnerable to REGEX DoS. A regex of the form /[x-\\ud800]/u causes the parser to enter an infinite loop. attackers may leverage the vulnerability leading to a Denial of Service since the string is not valid UTF16 and it results in it being sanitized before reaching the parser.","vulnerabilityUrl":"https://github.com/acornjs/acorn/commit/b5c17877ac0511e31579ea31e7650ba1a5871e51","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
ws high detected in acorn tgz ws high severity vulnerability vulnerable library acorn tgz ecmascript parser library home page a href path to dependency file creative assets package json path to vulnerable library creative assets node modules acorn package json dependency hierarchy eslint tgz root library espree tgz x acorn tgz vulnerable library found in head commit a href found in base branch master vulnerability details acorn is vulnerable to regex dos a regex of the form u causes the parser to enter an infinite loop attackers may leverage the vulnerability leading to a denial of service since the string is not valid and it results in it being sanitized before reaching the parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree eslint espree acorn isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier ws vulnerabilitydetails acorn is vulnerable to regex dos a regex of the form u causes the parser to enter an infinite loop attackers may leverage the vulnerability leading to a denial of service since the string is not valid and it results in it being sanitized before reaching the parser vulnerabilityurl
0
115,737
24,807,351,683
IssuesEvent
2022-10-25 06:27:45
sast-automation-dev/DVIA-v2-45
https://api.github.com/repos/sast-automation-dev/DVIA-v2-45
opened
Code Security Report: 124 high severity findings, 624 total findings
code security findings
# Code Security Report **Latest Scan:** 2022-10-25 06:13am **Total Findings:** 624 **Tested Project Files:** 1286 **Detected Programming Languages:** 3 <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: C/C++ (Beta) | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-416](https://cwe.mitre.org/data/definitions/416.html)|Use After Free|11| ### Details > The below list presents the 11 high vulnerability findings that need your attention. To view information on these findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/23f8048f-4d97-4d64-a925-6aaa8013308d/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Use After Free (CWE-416) : 11</summary> #### Findings <details> <summary>Parse/PFObject+Synchronous.h:486</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L481-L486 </details> <details> <summary>Parse/PFObject+Synchronous.h:461</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L456-L461 </details> <details> <summary>Parse/PFObject+Synchronous.h:434</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L429-L434 </details> <details> <summary>Parse/PFObject+Synchronous.h:415</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L410-L415 </details> <details> <summary>Parse/PFObject+Synchronous.h:389</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L384-L389 </details> <details> <summary>Parse/PFObject+Synchronous.h:366</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L361-L366 </details> <details> <summary>Parse/PFObject+Synchronous.h:338</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L333-L338 </details> <details> <summary>Parse/PFObject+Synchronous.h:303</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L298-L303 </details> <details> <summary>Parse/PFObject+Synchronous.h:262</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L257-L262 </details> <details> <summary>Parse/PFObject+Synchronous.h:229</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L224-L229 </details> <details> <summary>Parse/PFObject+Synchronous.h:191</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L186-L191 </details> </details> ## Language: Swift | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-319](https://cwe.mitre.org/data/definitions/319.html)|Insufficient Transport Layer Protection|20| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-749](https://cwe.mitre.org/data/definitions/749.html)|WebView Implementation|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-676](https://cwe.mitre.org/data/definitions/676.html)|Miscellaneous Dangerous Functions|23| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-200](https://cwe.mitre.org/data/definitions/200.html)|Insecure Data Storage|26| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Log Messages|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-326](https://cwe.mitre.org/data/definitions/326.html)|Weak Encryption Strength|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[]()|External URL Access|6| ### Details > No high vulnerability findings detected. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/23f8048f-4d97-4d64-a925-6aaa8013308d/details). ## Language: iOS Objective-C | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Functions|78| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-73](https://cwe.mitre.org/data/definitions/73.html)|File Manipulation|35| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-319](https://cwe.mitre.org/data/definitions/319.html)|Insufficient Transport Layer Protection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-676](https://cwe.mitre.org/data/definitions/676.html)|Miscellaneous Dangerous Functions|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-200](https://cwe.mitre.org/data/definitions/200.html)|Location Information|50| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-200](https://cwe.mitre.org/data/definitions/200.html)|Insecure Data Storage|344| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Log Messages|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-326](https://cwe.mitre.org/data/definitions/326.html)|Weak Encryption Strength|7| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-242](https://cwe.mitre.org/data/definitions/242.html)|Use of Inherently Dangerous Function|4| ### Details > The below list presents the 20 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/23f8048f-4d97-4d64-a925-6aaa8013308d/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Functions (CWE-89) : 20</summary> #### Findings <details> <summary>YapDatabase/YapDatabaseConnection.m:1152</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1147-L1152 </details> <details> <summary>CloudKit/YapDatabaseCloudKitTransaction.m:1960</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/Extensions/CloudKit/YapDatabaseCloudKitTransaction.m#L1955-L1960 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1260</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1255-L1260 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1242</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1237-L1242 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1206</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1201-L1206 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1188</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1183-L1188 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1170</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1165-L1170 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1296</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1291-L1296 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1134</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1129-L1134 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1314</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1309-L1314 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1097</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1092-L1097 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1079</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1074-L1079 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1061</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1056-L1061 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1043</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1038-L1043 </details> <details> <summary>YapDatabase/YapDatabase.m:869</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabase.m#L864-L869 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1025</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1020-L1025 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1007</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1002-L1007 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:989</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L984-L989 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:971</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L966-L971 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:953</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L948-L953 </details> </details>
1.0
Code Security Report: 124 high severity findings, 624 total findings - # Code Security Report **Latest Scan:** 2022-10-25 06:13am **Total Findings:** 624 **Tested Project Files:** 1286 **Detected Programming Languages:** 3 <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: C/C++ (Beta) | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-416](https://cwe.mitre.org/data/definitions/416.html)|Use After Free|11| ### Details > The below list presents the 11 high vulnerability findings that need your attention. To view information on these findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/23f8048f-4d97-4d64-a925-6aaa8013308d/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Use After Free (CWE-416) : 11</summary> #### Findings <details> <summary>Parse/PFObject+Synchronous.h:486</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L481-L486 </details> <details> <summary>Parse/PFObject+Synchronous.h:461</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L456-L461 </details> <details> <summary>Parse/PFObject+Synchronous.h:434</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L429-L434 </details> <details> <summary>Parse/PFObject+Synchronous.h:415</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L410-L415 </details> <details> <summary>Parse/PFObject+Synchronous.h:389</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L384-L389 </details> <details> <summary>Parse/PFObject+Synchronous.h:366</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L361-L366 </details> <details> <summary>Parse/PFObject+Synchronous.h:338</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L333-L338 </details> <details> <summary>Parse/PFObject+Synchronous.h:303</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L298-L303 </details> <details> <summary>Parse/PFObject+Synchronous.h:262</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L257-L262 </details> <details> <summary>Parse/PFObject+Synchronous.h:229</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L224-L229 </details> <details> <summary>Parse/PFObject+Synchronous.h:191</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/Pods/Parse/Parse/Parse/PFObject+Synchronous.h#L186-L191 </details> </details> ## Language: Swift | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-319](https://cwe.mitre.org/data/definitions/319.html)|Insufficient Transport Layer Protection|20| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-749](https://cwe.mitre.org/data/definitions/749.html)|WebView Implementation|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-676](https://cwe.mitre.org/data/definitions/676.html)|Miscellaneous Dangerous Functions|23| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-200](https://cwe.mitre.org/data/definitions/200.html)|Insecure Data Storage|26| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Log Messages|2| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-326](https://cwe.mitre.org/data/definitions/326.html)|Weak Encryption Strength|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[]()|External URL Access|6| ### Details > No high vulnerability findings detected. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/23f8048f-4d97-4d64-a925-6aaa8013308d/details). ## Language: iOS Objective-C | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Functions|78| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-73](https://cwe.mitre.org/data/definitions/73.html)|File Manipulation|35| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-319](https://cwe.mitre.org/data/definitions/319.html)|Insufficient Transport Layer Protection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-676](https://cwe.mitre.org/data/definitions/676.html)|Miscellaneous Dangerous Functions|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-200](https://cwe.mitre.org/data/definitions/200.html)|Location Information|50| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-200](https://cwe.mitre.org/data/definitions/200.html)|Insecure Data Storage|344| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Log Messages|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-326](https://cwe.mitre.org/data/definitions/326.html)|Weak Encryption Strength|7| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-242](https://cwe.mitre.org/data/definitions/242.html)|Use of Inherently Dangerous Function|4| ### Details > The below list presents the 20 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/23f8048f-4d97-4d64-a925-6aaa8013308d/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Functions (CWE-89) : 20</summary> #### Findings <details> <summary>YapDatabase/YapDatabaseConnection.m:1152</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1147-L1152 </details> <details> <summary>CloudKit/YapDatabaseCloudKitTransaction.m:1960</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/Extensions/CloudKit/YapDatabaseCloudKitTransaction.m#L1955-L1960 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1260</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1255-L1260 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1242</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1237-L1242 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1206</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1201-L1206 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1188</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1183-L1188 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1170</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1165-L1170 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1296</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1291-L1296 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1134</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1129-L1134 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1314</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1309-L1314 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1097</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1092-L1097 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1079</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1074-L1079 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1061</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1056-L1061 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1043</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1038-L1043 </details> <details> <summary>YapDatabase/YapDatabase.m:869</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabase.m#L864-L869 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1025</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1020-L1025 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:1007</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L1002-L1007 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:989</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L984-L989 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:971</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L966-L971 </details> <details> <summary>YapDatabase/YapDatabaseConnection.m:953</summary> https://github.com/sast-automation-dev/DVIA-v2-45/blob/acf999d0309c20b4bf9979302ea199132f226ad2/DVIA-v2-45/DVIA-v2/DVIA-v2/Vendor/YapDatabase/YapDatabaseConnection.m#L948-L953 </details> </details>
non_priority
code security report high severity findings total findings code security report latest scan total findings tested project files detected programming languages check this box to manually trigger a scan language c c beta severity cwe vulnerability type count high after free details the below list presents the high vulnerability findings that need your attention to view information on these findings navigate to the use after free cwe findings parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h parse pfobject synchronous h language swift severity cwe vulnerability type count medium transport layer protection medium implementation medium dangerous functions medium data storage medium messages low encryption strength low external url access details no high vulnerability findings detected to view information on the remaining findings navigate to the language ios objective c severity cwe vulnerability type count high functions high manipulation medium transport layer protection medium dangerous functions medium information medium data storage medium messages low encryption strength low of inherently dangerous function details the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the sql functions cwe findings yapdatabase yapdatabaseconnection m cloudkit yapdatabasecloudkittransaction m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabase m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m yapdatabase yapdatabaseconnection m
0
155,153
12,240,400,000
IssuesEvent
2020-05-05 00:10:35
QuantConnect/Lean
https://api.github.com/repos/QuantConnect/Lean
closed
Reduce unit test execution time
refactor testing up for grabs
<!--- This template provides sections for bugs and features. Please delete any irrelevant sections before submitting --> #### Expected Behavior <!--- Required. Describe the behavior you expect to see for your case. --> - Unit test execute as fast as possible #### Actual Behavior <!--- Required. Describe the actual behavior for your case. --> - Unit tests currently take ~12 min to execute, without taken into account regression tests #### Potential Solution <!--- Optional. Describe any potential solutions and/or thoughts as to what may be causing the difference between expected and actual behavior. --> - Refactor unit tests that consume a lot of execution time, without reducing test coverage (PR1) - Next step could be enabling, for some cases, parallel unit test execution (PR3). This requires first updating unit test package (PR2). #### Reproducing the Problem <!--- Required for Bugs. Describe how to reproduce the problem. This can be via a failing unit test or a simplified algorithm that reliably demonstrates this issue. --> Run unit tests #### System Information <!--- Required for Bugs. Include any system specific information, such as OS. --> N/A #### Checklist <!--- Confirm that you've provided all the required information. --> <!--- Required fields ---> - [x] I have completely filled out this template - [x] I have confirmed that this issue exists on the current `master` branch - [x] I have confirmed that this is not a duplicate issue by searching [issues](https://github.com/QuantConnect/Lean/issues) <!--- Required for Bugs, feature request can delete the line below. --> - [x] I have provided detailed steps to reproduce the issue <!--- Template inspired by https://github.com/stevemao/github-issue-templates -->
1.0
Reduce unit test execution time - <!--- This template provides sections for bugs and features. Please delete any irrelevant sections before submitting --> #### Expected Behavior <!--- Required. Describe the behavior you expect to see for your case. --> - Unit test execute as fast as possible #### Actual Behavior <!--- Required. Describe the actual behavior for your case. --> - Unit tests currently take ~12 min to execute, without taken into account regression tests #### Potential Solution <!--- Optional. Describe any potential solutions and/or thoughts as to what may be causing the difference between expected and actual behavior. --> - Refactor unit tests that consume a lot of execution time, without reducing test coverage (PR1) - Next step could be enabling, for some cases, parallel unit test execution (PR3). This requires first updating unit test package (PR2). #### Reproducing the Problem <!--- Required for Bugs. Describe how to reproduce the problem. This can be via a failing unit test or a simplified algorithm that reliably demonstrates this issue. --> Run unit tests #### System Information <!--- Required for Bugs. Include any system specific information, such as OS. --> N/A #### Checklist <!--- Confirm that you've provided all the required information. --> <!--- Required fields ---> - [x] I have completely filled out this template - [x] I have confirmed that this issue exists on the current `master` branch - [x] I have confirmed that this is not a duplicate issue by searching [issues](https://github.com/QuantConnect/Lean/issues) <!--- Required for Bugs, feature request can delete the line below. --> - [x] I have provided detailed steps to reproduce the issue <!--- Template inspired by https://github.com/stevemao/github-issue-templates -->
non_priority
reduce unit test execution time expected behavior unit test execute as fast as possible actual behavior unit tests currently take min to execute without taken into account regression tests potential solution refactor unit tests that consume a lot of execution time without reducing test coverage next step could be enabling for some cases parallel unit test execution this requires first updating unit test package reproducing the problem run unit tests system information n a checklist i have completely filled out this template i have confirmed that this issue exists on the current master branch i have confirmed that this is not a duplicate issue by searching i have provided detailed steps to reproduce the issue
0
46,705
13,055,962,084
IssuesEvent
2020-07-30 03:14:49
icecube-trac/tix2
https://api.github.com/repos/icecube-trac/tix2
opened
[DOMLauncher] add_static_property confuses sphinx (Trac #1740)
Incomplete Migration Migrated from Trac combo simulation defect
Migrated from https://code.icecube.wisc.edu/ticket/1740 ```json { "status": "closed", "changetime": "2019-02-13T14:12:38", "description": "The pybindings of `icecube.DOMLauncher` use `.add_static_property()` for three properties: `I3DOM.merge_pulses`, `I3DOM.use_drooped_template`, and `I3DOM.use_tabulation`. Unfortunately, this confuses sphinx documentation because`merge_pulses`is in `I3DOM`'s attribute list but `I3DOM.merge_pulses.__doc__` is unavailable. \n\nThe following error is spit out by sphinx:\n\n{{{\nattribute u'I3DOM.merge_pulses' from module u'icecube.DOMLauncher'; the following exception was raised:\nTraceback (most recent call last):\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 392, in import_object\n obj = self.get_attr(obj, part)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 288, in get_attr\n return safe_getattr(obj, name, *defargs)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/util/inspect.py\", line 115, in safe_getattr\n raise AttributeError(name)\nAttributeError: merge_pulses\n/build/buildslave/kipple_cvmfs/docs/build/sphinx_src/source/python/icecube.DOMLauncher.rst:4: WARNING: autodoc: failed to import attribute u'I3DOM.use_drooped_template' from module u'icecube.DOMLauncher'; the following exception was raised:\nTraceback (most recent call last):\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 392, in import_object\n obj = self.get_attr(obj, part)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 288, in get_attr\n return safe_getattr(obj, name, *defargs)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/util/inspect.py\", line 115, in safe_getattr\n raise AttributeError(name)\nAttributeError: use_drooped_template\n/build/buildslave/kipple_cvmfs/docs/build/sphinx_src/source/python/icecube.DOMLauncher.rst:4: WARNING: autodoc: failed to import attribute u'I3DOM.use_tabulation' from module u'icecube.DOMLauncher'; the following exception was raised:\nTraceback (most recent call last):\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 392, in import_object\n obj = self.get_attr(obj, part)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 288, in get_attr\n return safe_getattr(obj, name, *defargs)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/util/inspect.py\", line 115, in safe_getattr\n raise AttributeError(name)\nAttributeError: use_tabulation\n}}}", "reporter": "kjmeagher", "cc": "", "resolution": "fixed", "_ts": "1550067158057333", "component": "combo simulation", "summary": "[DOMLauncher] add_static_property confuses sphinx", "priority": "normal", "keywords": "documentation", "time": "2016-06-10T09:57:06", "milestone": "", "owner": "sflis", "type": "defect" } ```
1.0
[DOMLauncher] add_static_property confuses sphinx (Trac #1740) - Migrated from https://code.icecube.wisc.edu/ticket/1740 ```json { "status": "closed", "changetime": "2019-02-13T14:12:38", "description": "The pybindings of `icecube.DOMLauncher` use `.add_static_property()` for three properties: `I3DOM.merge_pulses`, `I3DOM.use_drooped_template`, and `I3DOM.use_tabulation`. Unfortunately, this confuses sphinx documentation because`merge_pulses`is in `I3DOM`'s attribute list but `I3DOM.merge_pulses.__doc__` is unavailable. \n\nThe following error is spit out by sphinx:\n\n{{{\nattribute u'I3DOM.merge_pulses' from module u'icecube.DOMLauncher'; the following exception was raised:\nTraceback (most recent call last):\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 392, in import_object\n obj = self.get_attr(obj, part)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 288, in get_attr\n return safe_getattr(obj, name, *defargs)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/util/inspect.py\", line 115, in safe_getattr\n raise AttributeError(name)\nAttributeError: merge_pulses\n/build/buildslave/kipple_cvmfs/docs/build/sphinx_src/source/python/icecube.DOMLauncher.rst:4: WARNING: autodoc: failed to import attribute u'I3DOM.use_drooped_template' from module u'icecube.DOMLauncher'; the following exception was raised:\nTraceback (most recent call last):\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 392, in import_object\n obj = self.get_attr(obj, part)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 288, in get_attr\n return safe_getattr(obj, name, *defargs)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/util/inspect.py\", line 115, in safe_getattr\n raise AttributeError(name)\nAttributeError: use_drooped_template\n/build/buildslave/kipple_cvmfs/docs/build/sphinx_src/source/python/icecube.DOMLauncher.rst:4: WARNING: autodoc: failed to import attribute u'I3DOM.use_tabulation' from module u'icecube.DOMLauncher'; the following exception was raised:\nTraceback (most recent call last):\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 392, in import_object\n obj = self.get_attr(obj, part)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/ext/autodoc.py\", line 288, in get_attr\n return safe_getattr(obj, name, *defargs)\n File \"/cvmfs/icecube.opensciencegrid.org/py2-v1/RHEL_6_x86_64/lib/python2.7/site-packages/sphinx/util/inspect.py\", line 115, in safe_getattr\n raise AttributeError(name)\nAttributeError: use_tabulation\n}}}", "reporter": "kjmeagher", "cc": "", "resolution": "fixed", "_ts": "1550067158057333", "component": "combo simulation", "summary": "[DOMLauncher] add_static_property confuses sphinx", "priority": "normal", "keywords": "documentation", "time": "2016-06-10T09:57:06", "milestone": "", "owner": "sflis", "type": "defect" } ```
non_priority
add static property confuses sphinx trac migrated from json status closed changetime description the pybindings of icecube domlauncher use add static property for three properties merge pulses use drooped template and use tabulation unfortunately this confuses sphinx documentation because merge pulses is in s attribute list but merge pulses doc is unavailable n nthe following error is spit out by sphinx n n nattribute u merge pulses from module u icecube domlauncher the following exception was raised ntraceback most recent call last n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx ext autodoc py line in import object n obj self get attr obj part n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx ext autodoc py line in get attr n return safe getattr obj name defargs n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx util inspect py line in safe getattr n raise attributeerror name nattributeerror merge pulses n build buildslave kipple cvmfs docs build sphinx src source python icecube domlauncher rst warning autodoc failed to import attribute u use drooped template from module u icecube domlauncher the following exception was raised ntraceback most recent call last n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx ext autodoc py line in import object n obj self get attr obj part n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx ext autodoc py line in get attr n return safe getattr obj name defargs n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx util inspect py line in safe getattr n raise attributeerror name nattributeerror use drooped template n build buildslave kipple cvmfs docs build sphinx src source python icecube domlauncher rst warning autodoc failed to import attribute u use tabulation from module u icecube domlauncher the following exception was raised ntraceback most recent call last n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx ext autodoc py line in import object n obj self get attr obj part n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx ext autodoc py line in get attr n return safe getattr obj name defargs n file cvmfs icecube opensciencegrid org rhel lib site packages sphinx util inspect py line in safe getattr n raise attributeerror name nattributeerror use tabulation n reporter kjmeagher cc resolution fixed ts component combo simulation summary add static property confuses sphinx priority normal keywords documentation time milestone owner sflis type defect
0
118,828
10,012,726,858
IssuesEvent
2019-07-15 13:49:07
SPW-DIG/metawal-core-geonetwork
https://api.github.com/repos/SPW-DIG/metawal-core-geonetwork
closed
Moissonnage - non prise en compte d'une transformation xsl
Env test - NOK bug criticité.majeur
Lors de la sauvegarde des paramètres de moissonnage d'un protocole CSW, la transformation xsl n'est pas conservée.
1.0
Moissonnage - non prise en compte d'une transformation xsl - Lors de la sauvegarde des paramètres de moissonnage d'un protocole CSW, la transformation xsl n'est pas conservée.
non_priority
moissonnage non prise en compte d une transformation xsl lors de la sauvegarde des paramètres de moissonnage d un protocole csw la transformation xsl n est pas conservée
0
144,905
19,318,819,908
IssuesEvent
2021-12-14 01:28:17
Dima2022/kaltura-sample-code
https://api.github.com/repos/Dima2022/kaltura-sample-code
closed
CVE-2021-44228 (High) detected in log4j-1.2.15.jar - autoclosed
security vulnerability
## CVE-2021-44228 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.15.jar</b></p></summary> <p>Apache Log4j 1.2</p> <p>Library home page: <a href="http://logging.apache.org:80/log4j/1.2/">http://logging.apache.org:80/log4j/1.2/</a></p> <p>Path to dependency file: kaltura-sample-code/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.15/log4j-1.2.15.jar</p> <p> Dependency Hierarchy: - kalturaClient-3.2.1.jar (Root Library) - :x: **log4j-1.2.15.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. <p>Publish Date: 2021-11-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228>CVE-2021-44228</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jfh8-c2jp-5v3q">https://github.com/advisories/GHSA-jfh8-c2jp-5v3q</a></p> <p>Release Date: 2021-12-10</p> <p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.15.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"log4j","packageName":"log4j","packageVersion":"1.2.15","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.kaltura:kalturaClient:3.2.1;log4j:log4j:1.2.15","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.logging.log4j:log4j-core:2.15.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-44228","vulnerabilityDetails":"Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228","cvss3Severity":"high","cvss3Score":"10.0","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-44228 (High) detected in log4j-1.2.15.jar - autoclosed - ## CVE-2021-44228 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>log4j-1.2.15.jar</b></p></summary> <p>Apache Log4j 1.2</p> <p>Library home page: <a href="http://logging.apache.org:80/log4j/1.2/">http://logging.apache.org:80/log4j/1.2/</a></p> <p>Path to dependency file: kaltura-sample-code/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/log4j/log4j/1.2.15/log4j-1.2.15.jar</p> <p> Dependency Hierarchy: - kalturaClient-3.2.1.jar (Root Library) - :x: **log4j-1.2.15.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser. <p>Publish Date: 2021-11-27 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228>CVE-2021-44228</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-jfh8-c2jp-5v3q">https://github.com/advisories/GHSA-jfh8-c2jp-5v3q</a></p> <p>Release Date: 2021-12-10</p> <p>Fix Resolution: org.apache.logging.log4j:log4j-core:2.15.0</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"log4j","packageName":"log4j","packageVersion":"1.2.15","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.kaltura:kalturaClient:3.2.1;log4j:log4j:1.2.15","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.apache.logging.log4j:log4j-core:2.15.0","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-44228","vulnerabilityDetails":"Log4j versions prior to 2.15.0 are subject to a remote code execution vulnerability via the ldap JNDI parser.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-44228","cvss3Severity":"high","cvss3Score":"10.0","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Changed","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in jar autoclosed cve high severity vulnerability vulnerable library jar apache library home page a href path to dependency file kaltura sample code pom xml path to vulnerable library home wss scanner repository jar dependency hierarchy kalturaclient jar root library x jar vulnerable library found in base branch master vulnerability details versions prior to are subject to a remote code execution vulnerability via the ldap jndi parser publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache logging core isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com kaltura kalturaclient isminimumfixversionavailable true minimumfixversion org apache logging core isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails versions prior to are subject to a remote code execution vulnerability via the ldap jndi parser vulnerabilityurl
0
307,009
26,511,746,817
IssuesEvent
2023-01-18 17:37:39
getsentry/sentry-javascript
https://api.github.com/repos/getsentry/sentry-javascript
closed
[Flaky CI]: Browser Integration Tests (Replay)
Status: Backlog Type: Tests Package: replay
### Flakiness Type Assertion failure ### Name of Job Playwright (esm) tracing only Tests ### Name of Test [chromium] › suites/replay/captureReplay/test.ts:8:11 › captureReplay ### Link to Test Run https://github.com/getsentry/sentry-javascript/actions/runs/3931449203/jobs/6723032712#step:11:106 ### Details _No response_
1.0
[Flaky CI]: Browser Integration Tests (Replay) - ### Flakiness Type Assertion failure ### Name of Job Playwright (esm) tracing only Tests ### Name of Test [chromium] › suites/replay/captureReplay/test.ts:8:11 › captureReplay ### Link to Test Run https://github.com/getsentry/sentry-javascript/actions/runs/3931449203/jobs/6723032712#step:11:106 ### Details _No response_
non_priority
browser integration tests replay flakiness type assertion failure name of job playwright esm tracing only tests name of test › suites replay capturereplay test ts › capturereplay link to test run details no response
0
37,955
6,653,139,105
IssuesEvent
2017-09-29 06:57:29
muma7490/PyDIAMONDS
https://api.github.com/repos/muma7490/PyDIAMONDS
opened
Implement documentation
Documentation enhancement
The documentation at the moment is non existent. This should be changed. A possibility is to create some automated documentation from the already documented C++ code.
1.0
Implement documentation - The documentation at the moment is non existent. This should be changed. A possibility is to create some automated documentation from the already documented C++ code.
non_priority
implement documentation the documentation at the moment is non existent this should be changed a possibility is to create some automated documentation from the already documented c code
0
97,662
20,371,942,619
IssuesEvent
2022-02-21 12:06:59
reduckted/GitWebLinks
https://api.github.com/repos/reduckted/GitWebLinks
closed
Fails to copy link from non-root directory
vscode stale
It successfully copies a link to `/.../project/file.md` but fails to work with `/.../project/subdir/file.md` with error `The repository /.../project/subdir does not have any remotes` What could be the reason?
1.0
Fails to copy link from non-root directory - It successfully copies a link to `/.../project/file.md` but fails to work with `/.../project/subdir/file.md` with error `The repository /.../project/subdir does not have any remotes` What could be the reason?
non_priority
fails to copy link from non root directory it successfully copies a link to project file md but fails to work with project subdir file md with error the repository project subdir does not have any remotes what could be the reason
0
48,641
7,446,491,677
IssuesEvent
2018-03-28 09:17:44
arangodb/arangodb
https://api.github.com/repos/arangodb/arangodb
closed
batch endpoint fails when chunked encoding is used
1 Question 2 Won't Fix 3 Documentation workaround available
It's common for many http clients to fall back to chunked encoding. Indeed, the HTTP spec requires that servers be able to handle it. Arango seems not to. Wireshark reports that the data parses fine. Arango complains. This works fine if the `--header 'Transfer-Encoding: chunked'` is not passed to curl: ``` % cat test.sh #!/bin/bash curl -v --basic --user "root:" -X POST --header 'Transfer-Encoding: chunked' --header 'Content-Type: multipart/form-data; boundary=SomeBoundaryValue' --data-binary @test.data --dump - http://localhost:8529/_api/batch ``` Be sure to use CRLF line endings: ``` % cat test.data (master●●●) --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: myId1 GET /_api/version HTTP/1.1 --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: myId2 DELETE /_api/collection/products HTTP/1.1 --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: someId POST /_api/collection/products HTTP/1.1 {"name": "products" } --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: nextId GET /_api/collection/products/figures HTTP/1.1 --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: otherId DELETE /_api/collection/products HTTP/1.1 --SomeBoundaryValue-- ``` ``` % ./test.sh (master●●●) * Trying ::1... * Connected to localhost (::1) port 8529 (#0) * Server auth using Basic with user 'root' > POST /_api/batch HTTP/1.1 > Host: localhost:8529 > Authorization: Basic cm9vdDo= > User-Agent: curl/7.43.0 > Accept: */* > Transfer-Encoding: chunked > Content-Type: multipart/form-data; boundary=SomeBoundaryValue > > 2bd * upload completely sent off: 708 out of 701 bytes < HTTP/1.1 400 Bad Request HTTP/1.1 400 Bad Request < X-Content-Type-Options: nosniff X-Content-Type-Options: nosniff < Server: ArangoDB Server: ArangoDB < Connection: Keep-Alive Connection: Keep-Alive < Content-Type: application/json; charset=utf-8 Content-Type: application/json; charset=utf-8 < Content-Length: 92 Content-Length: 92 ``` ## my environment running ArangoDB I'm using the latest ArangoDB of the respective release series: - [ ] 2.8 - [ ] 3.0 - [x] 3.1 - [ ] 3.2 - [ ] 3.3 - [ ] self-compiled devel branch Mode: - [ ] Cluster - [x] Single-Server Storage-Engine: - [x] mmfiles - [ ] rocksdb On this operating system: - [ ] DCOS on - [ ] AWS - [ ] Azure - [ ] own infrastructure - [ ] Linux - [ ] Debian .deb - [ ] Ubuntu .deb - [ ] SUSE .rpm - [ ] RedHat .rpm - [ ] Fedora .rpm - [ ] Gentoo - [ ] docker - official docker library - [ ] other: - [ ] Windows, version: - [x] MacOS, version: 10.11
1.0
batch endpoint fails when chunked encoding is used - It's common for many http clients to fall back to chunked encoding. Indeed, the HTTP spec requires that servers be able to handle it. Arango seems not to. Wireshark reports that the data parses fine. Arango complains. This works fine if the `--header 'Transfer-Encoding: chunked'` is not passed to curl: ``` % cat test.sh #!/bin/bash curl -v --basic --user "root:" -X POST --header 'Transfer-Encoding: chunked' --header 'Content-Type: multipart/form-data; boundary=SomeBoundaryValue' --data-binary @test.data --dump - http://localhost:8529/_api/batch ``` Be sure to use CRLF line endings: ``` % cat test.data (master●●●) --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: myId1 GET /_api/version HTTP/1.1 --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: myId2 DELETE /_api/collection/products HTTP/1.1 --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: someId POST /_api/collection/products HTTP/1.1 {"name": "products" } --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: nextId GET /_api/collection/products/figures HTTP/1.1 --SomeBoundaryValue Content-Type: application/x-arango-batchpart Content-Id: otherId DELETE /_api/collection/products HTTP/1.1 --SomeBoundaryValue-- ``` ``` % ./test.sh (master●●●) * Trying ::1... * Connected to localhost (::1) port 8529 (#0) * Server auth using Basic with user 'root' > POST /_api/batch HTTP/1.1 > Host: localhost:8529 > Authorization: Basic cm9vdDo= > User-Agent: curl/7.43.0 > Accept: */* > Transfer-Encoding: chunked > Content-Type: multipart/form-data; boundary=SomeBoundaryValue > > 2bd * upload completely sent off: 708 out of 701 bytes < HTTP/1.1 400 Bad Request HTTP/1.1 400 Bad Request < X-Content-Type-Options: nosniff X-Content-Type-Options: nosniff < Server: ArangoDB Server: ArangoDB < Connection: Keep-Alive Connection: Keep-Alive < Content-Type: application/json; charset=utf-8 Content-Type: application/json; charset=utf-8 < Content-Length: 92 Content-Length: 92 ``` ## my environment running ArangoDB I'm using the latest ArangoDB of the respective release series: - [ ] 2.8 - [ ] 3.0 - [x] 3.1 - [ ] 3.2 - [ ] 3.3 - [ ] self-compiled devel branch Mode: - [ ] Cluster - [x] Single-Server Storage-Engine: - [x] mmfiles - [ ] rocksdb On this operating system: - [ ] DCOS on - [ ] AWS - [ ] Azure - [ ] own infrastructure - [ ] Linux - [ ] Debian .deb - [ ] Ubuntu .deb - [ ] SUSE .rpm - [ ] RedHat .rpm - [ ] Fedora .rpm - [ ] Gentoo - [ ] docker - official docker library - [ ] other: - [ ] Windows, version: - [x] MacOS, version: 10.11
non_priority
batch endpoint fails when chunked encoding is used it s common for many http clients to fall back to chunked encoding indeed the http spec requires that servers be able to handle it arango seems not to wireshark reports that the data parses fine arango complains this works fine if the header transfer encoding chunked is not passed to curl cat test sh bin bash curl v basic user root x post header transfer encoding chunked header content type multipart form data boundary someboundaryvalue data binary test data dump be sure to use crlf line endings cat test data master●●● someboundaryvalue content type application x arango batchpart content id get api version http someboundaryvalue content type application x arango batchpart content id delete api collection products http someboundaryvalue content type application x arango batchpart content id someid post api collection products http name products someboundaryvalue content type application x arango batchpart content id nextid get api collection products figures http someboundaryvalue content type application x arango batchpart content id otherid delete api collection products http someboundaryvalue test sh master●●● trying connected to localhost port server auth using basic with user root post api batch http host localhost authorization basic user agent curl accept transfer encoding chunked content type multipart form data boundary someboundaryvalue upload completely sent off out of bytes http bad request http bad request x content type options nosniff x content type options nosniff server arangodb server arangodb connection keep alive connection keep alive content type application json charset utf content type application json charset utf content length content length my environment running arangodb i m using the latest arangodb of the respective release series self compiled devel branch mode cluster single server storage engine mmfiles rocksdb on this operating system dcos on aws azure own infrastructure linux debian deb ubuntu deb suse rpm redhat rpm fedora rpm gentoo docker official docker library other windows version macos version
0
273,887
23,791,896,011
IssuesEvent
2022-09-02 15:15:58
nromanen/pratical_testing_2022
https://api.github.com/repos/nromanen/pratical_testing_2022
opened
Password recovery - Negative (Passwords in "New password" and "Confirm password" fields don't match)
test case
# [TC-4.7] : Password recovery - Negative (Passwords in "New password" and "Confirm password" fields don't match) ## Description Verify that system doesn't allow user to create new password with mismatching "New password" and "Confirm password" fields. ### Precondition There is stable internet connection. User should have access to Chrome, Firefox, Microsoft Edge or Safari. User should be registered before, but not authorized. ### Priority High ### Input data Email: nekit.com37@gmail.com New password: qwerty1234 Confirm password: qwerty12 ## Test Steps | Step No. | Step description | Expected result | | ------------- |:-------------| :-----| | 1. | Navigate to https://ttrackster.herokuapp.com/login | Site should open | | 2. | Click on the link "Forgot password?" | Site should open the "Password recovery" page | | 3. | Enter email | Credential can be entered | | 4. | Click the "SEND LINK" button | System sends mail to user and shows "Mail is sent" message | | 5. | Click on the link in mail | Site should open "New password" page | | 6. | Enter new password | Credential can be entered | | 7. | Enter confirm password | Credential can be entered | | 8. | Click the "Submit" button | System doesn't change password and shows ""New password" and "Confirm password" fields don't match" message | ## Expected Result System doesn't allow user to create new password and shows user a tip-message. ## Requirement [Password recovery#4](https://github.com/nromanen/pratical_testing_2022/issues/4)
1.0
Password recovery - Negative (Passwords in "New password" and "Confirm password" fields don't match) - # [TC-4.7] : Password recovery - Negative (Passwords in "New password" and "Confirm password" fields don't match) ## Description Verify that system doesn't allow user to create new password with mismatching "New password" and "Confirm password" fields. ### Precondition There is stable internet connection. User should have access to Chrome, Firefox, Microsoft Edge or Safari. User should be registered before, but not authorized. ### Priority High ### Input data Email: nekit.com37@gmail.com New password: qwerty1234 Confirm password: qwerty12 ## Test Steps | Step No. | Step description | Expected result | | ------------- |:-------------| :-----| | 1. | Navigate to https://ttrackster.herokuapp.com/login | Site should open | | 2. | Click on the link "Forgot password?" | Site should open the "Password recovery" page | | 3. | Enter email | Credential can be entered | | 4. | Click the "SEND LINK" button | System sends mail to user and shows "Mail is sent" message | | 5. | Click on the link in mail | Site should open "New password" page | | 6. | Enter new password | Credential can be entered | | 7. | Enter confirm password | Credential can be entered | | 8. | Click the "Submit" button | System doesn't change password and shows ""New password" and "Confirm password" fields don't match" message | ## Expected Result System doesn't allow user to create new password and shows user a tip-message. ## Requirement [Password recovery#4](https://github.com/nromanen/pratical_testing_2022/issues/4)
non_priority
password recovery negative passwords in new password and confirm password fields don t match password recovery negative passwords in new password and confirm password fields don t match description verify that system doesn t allow user to create new password with mismatching new password and confirm password fields precondition there is stable internet connection user should have access to chrome firefox microsoft edge or safari user should be registered before but not authorized priority high input data email nekit gmail com new password confirm password test steps step no step description expected result navigate to site should open click on the link forgot password site should open the password recovery page enter email credential can be entered click the send link button system sends mail to user and shows mail is sent message click on the link in mail site should open new password page enter new password credential can be entered enter confirm password credential can be entered click the submit button system doesn t change password and shows new password and confirm password fields don t match message expected result system doesn t allow user to create new password and shows user a tip message requirement
0
965
3,422,103,198
IssuesEvent
2015-12-08 21:34:43
darnir/wget
https://api.github.com/repos/darnir/wget
closed
warc.c:612:5: 'HAVE_UUID_CREATE' is not defined, evaluates to 0
Lexical or Preprocessor Issue Wundef
warc.c:612:5: warning: 'HAVE_UUID_CREATE' is not defined, evaluates to 0 [-Wundef,Lexical or Preprocessor Issue]
1.0
warc.c:612:5: 'HAVE_UUID_CREATE' is not defined, evaluates to 0 - warc.c:612:5: warning: 'HAVE_UUID_CREATE' is not defined, evaluates to 0 [-Wundef,Lexical or Preprocessor Issue]
non_priority
warc c have uuid create is not defined evaluates to warc c warning have uuid create is not defined evaluates to
0
140,351
31,925,941,628
IssuesEvent
2023-09-19 01:46:57
Significant-Gravitas/Auto-GPT
https://api.github.com/repos/Significant-Gravitas/Auto-GPT
closed
SSHing into remote server hangs Auto-GPT
potential plugin function: run code Stale
### ⚠️ Search for existing issues first ⚠️ - [X] I have searched the existing issues, and there is no existing issue for my problem ### Which Operating System are you using? Linux ### Which version of Auto-GPT are you using? Stable (branch) ### GPT-3 or GPT-4? GPT-4 ### Steps to reproduce 🕹 * Does it work on stable branch? **No** * Does it work on master branch? **No** * Search for existing issues. **Could not find issues related to SSH.** * Ask on our Discord **Asked several times without receiving any response.** * Provide relevant info * master git hash 6b4ad1f933dee86dfc272ee6b7d1e43826c6cffb * stable git hash 91537b049625b6516f2b5f7361ae993d4e878a2e * Operating System **Arch `6.2.11-arch1-1`** # Steps to reproduce Give the following prompts: > Goal 1: SSH into server 1.1.1.1 > Goal 2: Update packages Auto-GPT responds with: ```sh Using memory of type: LocalCache Using Browser: firefox THOUGHTS: I will SSH into the server 1.1.1.1 and update the packages. REASONING: I need to access the server to update the packages. SSH is the best way to do this. I will then use the package manager to update the packages. PLAN: - SSH into the server - Use the package manager to update the packages CRITICISM: I need to ensure that I am using the correct package manager for the Arch distro. NEXT ACTION: COMMAND = execute_shell ARGUMENTS = {'command_line': 'ssh 1.1.1.1'} Enter 'y' to authorise command, 'y -N' to run N continuous commands, 'n' to exit program, or enter feedback for ... Input:y -=-=-=-=-=-=-= COMMAND AUTHORISED BY USER -=-=-=-=-=-=-= Executing command 'ssh 1.1.1.1' in working directory '/home/ben/.local/src/Auto-GPT/auto_gpt_workspace' ``` (ip address changed for description) ### Current behavior 😯 I see that the Auto-GPT agent successfully SSHs into the server: ![](https://cdn.discordapp.com/attachments/1092275629602394184/1099748068351553656/image.png) However, the agent hangs and will not continue. The last line of the prompt above is where it gets stuck. Ctrl+c does not affect the session, I have to force close the terminal. ### Expected behavior 🤔 Successfully recognizes it has SSH'd into the server, and continues with the next goal. ### Your prompt 📝 _No response_ ### Your Logs 📒 ```log 2023-04-27 11:52:33,828 INFO Welcome back! Would you like me to return to being Web server configurer? 2023-04-27 11:53:07,387 INFO Using memory of type: LocalCache 2023-04-27 11:53:07,508 INFO Using Browser: firefox 2023-04-27 11:53:22,554 INFO THOUGHTS: I need to ssh into the server aliased as `bscore02` to begin configuring the web server. 2023-04-27 11:53:22,944 INFO REASONING: I will use the `ssh` command to connect to the server. 2023-04-27 11:53:23,246 INFO PLAN: 2023-04-27 11:53:23,295 INFO - Use `ssh` command to connect to the server. 2023-04-27 11:53:23,557 INFO CRITICISM: I need to ensure that I have the correct credentials to connect to the server. 2023-04-27 11:53:23,901 INFO NEXT ACTION: COMMAND = execute_shell ARGUMENTS = {'command_line': 'ssh bscore02'} 2023-04-27 11:53:27,618 INFO -=-=-=-=-=-=-= COMMAND AUTHORISED BY USER -=-=-=-=-=-=-= ```
1.0
SSHing into remote server hangs Auto-GPT - ### ⚠️ Search for existing issues first ⚠️ - [X] I have searched the existing issues, and there is no existing issue for my problem ### Which Operating System are you using? Linux ### Which version of Auto-GPT are you using? Stable (branch) ### GPT-3 or GPT-4? GPT-4 ### Steps to reproduce 🕹 * Does it work on stable branch? **No** * Does it work on master branch? **No** * Search for existing issues. **Could not find issues related to SSH.** * Ask on our Discord **Asked several times without receiving any response.** * Provide relevant info * master git hash 6b4ad1f933dee86dfc272ee6b7d1e43826c6cffb * stable git hash 91537b049625b6516f2b5f7361ae993d4e878a2e * Operating System **Arch `6.2.11-arch1-1`** # Steps to reproduce Give the following prompts: > Goal 1: SSH into server 1.1.1.1 > Goal 2: Update packages Auto-GPT responds with: ```sh Using memory of type: LocalCache Using Browser: firefox THOUGHTS: I will SSH into the server 1.1.1.1 and update the packages. REASONING: I need to access the server to update the packages. SSH is the best way to do this. I will then use the package manager to update the packages. PLAN: - SSH into the server - Use the package manager to update the packages CRITICISM: I need to ensure that I am using the correct package manager for the Arch distro. NEXT ACTION: COMMAND = execute_shell ARGUMENTS = {'command_line': 'ssh 1.1.1.1'} Enter 'y' to authorise command, 'y -N' to run N continuous commands, 'n' to exit program, or enter feedback for ... Input:y -=-=-=-=-=-=-= COMMAND AUTHORISED BY USER -=-=-=-=-=-=-= Executing command 'ssh 1.1.1.1' in working directory '/home/ben/.local/src/Auto-GPT/auto_gpt_workspace' ``` (ip address changed for description) ### Current behavior 😯 I see that the Auto-GPT agent successfully SSHs into the server: ![](https://cdn.discordapp.com/attachments/1092275629602394184/1099748068351553656/image.png) However, the agent hangs and will not continue. The last line of the prompt above is where it gets stuck. Ctrl+c does not affect the session, I have to force close the terminal. ### Expected behavior 🤔 Successfully recognizes it has SSH'd into the server, and continues with the next goal. ### Your prompt 📝 _No response_ ### Your Logs 📒 ```log 2023-04-27 11:52:33,828 INFO Welcome back! Would you like me to return to being Web server configurer? 2023-04-27 11:53:07,387 INFO Using memory of type: LocalCache 2023-04-27 11:53:07,508 INFO Using Browser: firefox 2023-04-27 11:53:22,554 INFO THOUGHTS: I need to ssh into the server aliased as `bscore02` to begin configuring the web server. 2023-04-27 11:53:22,944 INFO REASONING: I will use the `ssh` command to connect to the server. 2023-04-27 11:53:23,246 INFO PLAN: 2023-04-27 11:53:23,295 INFO - Use `ssh` command to connect to the server. 2023-04-27 11:53:23,557 INFO CRITICISM: I need to ensure that I have the correct credentials to connect to the server. 2023-04-27 11:53:23,901 INFO NEXT ACTION: COMMAND = execute_shell ARGUMENTS = {'command_line': 'ssh bscore02'} 2023-04-27 11:53:27,618 INFO -=-=-=-=-=-=-= COMMAND AUTHORISED BY USER -=-=-=-=-=-=-= ```
non_priority
sshing into remote server hangs auto gpt ⚠️ search for existing issues first ⚠️ i have searched the existing issues and there is no existing issue for my problem which operating system are you using linux which version of auto gpt are you using stable branch gpt or gpt gpt steps to reproduce 🕹 does it work on stable branch no does it work on master branch no search for existing issues could not find issues related to ssh ask on our discord asked several times without receiving any response provide relevant info master git hash stable git hash operating system arch steps to reproduce give the following prompts goal ssh into server goal update packages auto gpt responds with sh using memory of type localcache using browser firefox thoughts i will ssh into the server and update the packages reasoning i need to access the server to update the packages ssh is the best way to do this i will then use the package manager to update the packages plan ssh into the server use the package manager to update the packages criticism i need to ensure that i am using the correct package manager for the arch distro next action command execute shell arguments command line ssh enter y to authorise command y n to run n continuous commands n to exit program or enter feedback for input y command authorised by user executing command ssh in working directory home ben local src auto gpt auto gpt workspace ip address changed for description current behavior 😯 i see that the auto gpt agent successfully sshs into the server however the agent hangs and will not continue the last line of the prompt above is where it gets stuck ctrl c does not affect the session i have to force close the terminal expected behavior 🤔 successfully recognizes it has ssh d into the server and continues with the next goal your prompt 📝 no response your logs 📒 log info welcome back would you like me to return to being web server configurer info using memory of type localcache info using browser firefox info thoughts i need to ssh into the server aliased as to begin configuring the web server info reasoning i will use the ssh command to connect to the server info plan info use ssh command to connect to the server info criticism i need to ensure that i have the correct credentials to connect to the server info next action command execute shell arguments command line ssh info command authorised by user
0
227,693
25,107,721,226
IssuesEvent
2022-11-08 17:52:51
bitbar/android-gradle-plugin
https://api.github.com/repos/bitbar/android-gradle-plugin
closed
CVE-2022-42004 (High) detected in jackson-databind-2.13.3.jar - autoclosed
security vulnerability
## CVE-2022-42004 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> Dependency Hierarchy: - testdroid-api-3.1.jar (Root Library) - :x: **jackson-databind-2.13.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. <p>Publish Date: 2022-10-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-42004>CVE-2022-42004</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.13.4</p> <p>Direct dependency fix Resolution (com.testdroid:testdroid-api): 3.6</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
True
CVE-2022-42004 (High) detected in jackson-databind-2.13.3.jar - autoclosed - ## CVE-2022-42004 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.13.3.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.13.3/56deb9ea2c93a7a556b3afbedd616d342963464e/jackson-databind-2.13.3.jar</p> <p> Dependency Hierarchy: - testdroid-api-3.1.jar (Root Library) - :x: **jackson-databind-2.13.3.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In FasterXML jackson-databind before 2.13.4, resource exhaustion can occur because of a lack of a check in BeanDeserializer._deserializeFromArray to prevent use of deeply nested arrays. An application is vulnerable only with certain customized choices for deserialization. <p>Publish Date: 2022-10-02 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-42004>CVE-2022-42004</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-10-02</p> <p>Fix Resolution (com.fasterxml.jackson.core:jackson-databind): 2.13.4</p> <p>Direct dependency fix Resolution (com.testdroid:testdroid-api): 3.6</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue
non_priority
cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy testdroid api jar root library x jackson databind jar vulnerable library found in base branch master vulnerability details in fasterxml jackson databind before resource exhaustion can occur because of a lack of a check in beandeserializer deserializefromarray to prevent use of deeply nested arrays an application is vulnerable only with certain customized choices for deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution com fasterxml jackson core jackson databind direct dependency fix resolution com testdroid testdroid api rescue worker helmet automatic remediation is available for this issue
0
30,597
6,190,249,868
IssuesEvent
2017-07-04 14:54:38
contao/core-bundle
https://api.github.com/repos/contao/core-bundle
closed
No back button in file picker popup
defect unconfirmed
When a file is uploaded in the file picker menu, there is no back button to go back to the tree view. ![bildschirmfoto 2017-06-28 um 14 37 00](https://user-images.githubusercontent.com/1073273/27637227-4e1b3242-5c0f-11e7-962f-fcad85a25b9e.png)
1.0
No back button in file picker popup - When a file is uploaded in the file picker menu, there is no back button to go back to the tree view. ![bildschirmfoto 2017-06-28 um 14 37 00](https://user-images.githubusercontent.com/1073273/27637227-4e1b3242-5c0f-11e7-962f-fcad85a25b9e.png)
non_priority
no back button in file picker popup when a file is uploaded in the file picker menu there is no back button to go back to the tree view
0
349,298
31,791,223,056
IssuesEvent
2023-09-13 03:36:52
second-hand-team-04/second-hand-max-be-a
https://api.github.com/repos/second-hand-team-04/second-hand-max-be-a
closed
feat: 관심 목록 관련 API 구현
feat test week4
## To Do - [x] Item을 관심 목록에 추가하는 API 구현 (**POST** api/users/wishlist/{itemId}) - [x] Item을 관심 목록 제거하는 API 구현 (**DELETE** api/users/wishlist/{itemId}) - [x] 사용자의 관심 목록을 응답하는 API 구현 (**GET** api/users/wishlist) ## Considerations 1. 테스트 코드를 함께 작성합니다. 2. 상품이 삭제되면 함께 삭제됩니다. 3. 자신의 상품도 관심 목록에 추가할 수 있습니다.
1.0
feat: 관심 목록 관련 API 구현 - ## To Do - [x] Item을 관심 목록에 추가하는 API 구현 (**POST** api/users/wishlist/{itemId}) - [x] Item을 관심 목록 제거하는 API 구현 (**DELETE** api/users/wishlist/{itemId}) - [x] 사용자의 관심 목록을 응답하는 API 구현 (**GET** api/users/wishlist) ## Considerations 1. 테스트 코드를 함께 작성합니다. 2. 상품이 삭제되면 함께 삭제됩니다. 3. 자신의 상품도 관심 목록에 추가할 수 있습니다.
non_priority
feat 관심 목록 관련 api 구현 to do item을 관심 목록에 추가하는 api 구현 post api users wishlist itemid item을 관심 목록 제거하는 api 구현 delete api users wishlist itemid 사용자의 관심 목록을 응답하는 api 구현 get api users wishlist considerations 테스트 코드를 함께 작성합니다 상품이 삭제되면 함께 삭제됩니다 자신의 상품도 관심 목록에 추가할 수 있습니다
0
107,145
9,203,153,373
IssuesEvent
2019-03-08 01:11:03
USAID-OHA-SI/TeamTracking
https://api.github.com/repos/USAID-OHA-SI/TeamTracking
opened
KP positivity vs "other" modalities
Analysis - COP Requester - Front Office Requester - Technical Team Tech Area - KP Tech Area - Testing
Per KP data discussions in Joburg created workbook to show how KP positivity compares with modalities. Use for FO discussions (likely Sunday 3/10) re KP programming Note there is no way to disentangle KP from modalities as KP are counted both in the KP disagg and in the modality in which they received services (without further KP tagging). However for the purposes of this exercise, simple visuals showing various positivities. link here: https://drive.google.com/file/d/1mkw7qj6DTGdfCzcLnQDoCmNkiJ7qDiLH/view?usp=sharing
1.0
KP positivity vs "other" modalities - Per KP data discussions in Joburg created workbook to show how KP positivity compares with modalities. Use for FO discussions (likely Sunday 3/10) re KP programming Note there is no way to disentangle KP from modalities as KP are counted both in the KP disagg and in the modality in which they received services (without further KP tagging). However for the purposes of this exercise, simple visuals showing various positivities. link here: https://drive.google.com/file/d/1mkw7qj6DTGdfCzcLnQDoCmNkiJ7qDiLH/view?usp=sharing
non_priority
kp positivity vs other modalities per kp data discussions in joburg created workbook to show how kp positivity compares with modalities use for fo discussions likely sunday re kp programming note there is no way to disentangle kp from modalities as kp are counted both in the kp disagg and in the modality in which they received services without further kp tagging however for the purposes of this exercise simple visuals showing various positivities link here
0
411,821
27,832,509,494
IssuesEvent
2023-03-20 06:44:12
hstreamdb/hstream
https://api.github.com/repos/hstreamdb/hstream
closed
hstreamdb-java cannot connect to remote hstream server,the ip is converted to the Hstream Server intranet address
documentation
**Describe the bug** A clear and concise description of what the bug is. hstreamdb-java cannot connect to remote hstream server,the ip is converted to the Hstream Server intranet address **To Reproduce** Steps to reproduce the behavior: quick-start.yaml: ``` version: "3.5" services: hserver: image: hstreamdb/hstream:latest depends_on: - zookeeper - hstore ports: - "6570:6570" expose: - 6570 networks: - hstream-quickstart volumes: - /var/run/docker.sock:/var/run/docker.sock - /tmp:/tmp - data_store:/data/store command: - bash - "-c" - | set -e /usr/local/script/wait-for-storage.sh hstore 6440 zookeeper 2181 600 \ /usr/local/bin/hstream-server \ --bind-address 0.0.0.0 --port 6570 \ --internal-port 6571 \ --server-id 100 \ --seed-nodes "$$(hostname -I | awk '{print $$1}'):6571" \ --advertised-address $$(hostname -I | awk '{print $$1}') \ --metastore-uri zk://zookeeper:2181 \ --store-config /data/store/logdevice.conf \ --store-admin-host hstore --store-admin-port 6440 \ --store-log-level warning \ --io-tasks-path /tmp/io/tasks \ --io-tasks-network hstream-quickstart hstore: image: hstreamdb/hstream:latest networks: - hstream-quickstart volumes: - data_store:/data/store command: - bash - "-c" - | set -ex # N.B. "enable-dscp-reflection=false" is required for linux kernel which # doesn't support dscp reflection, e.g. centos7. /usr/local/bin/ld-dev-cluster --root /data/store \ --use-tcp --tcp-host $$(hostname -I | awk '{print $$1}') \ --user-admin-port 6440 \ --param enable-dscp-reflection=false \ --no-interactive \ zookeeper: image: zookeeper expose: - 2181 networks: - hstream-quickstart volumes: - data_zk_data:/data - data_zk_datalog:/datalog networks: hstream-quickstart: name: hstream-quickstart volumes: data_store: name: quickstart_data_store data_zk_data: name: quickstart_data_zk_data data_zk_datalog: name: quickstart_data_zk_datalog ``` ``` 17:04:36.949 [main] INFO io.hstream.impl.HStreamClientKtImpl - client init with bootstrapServerUrls [[******:6570]] 17:04:38.193 [main] INFO io.hstream.impl.HStreamClientKtImpl - update clusterServerUrls to [[172.18.0.4:6570]] 17:04:43.210 [grpc-nio-worker-ELG-1-6] ERROR io.hstream.impl.Utils - unary rpc error with url [172.18.0.4:6570] io.grpc.StatusException: DEADLINE_EXCEEDED: deadline exceeded after 4.990276100s. [buffered_nanos=4992547700, waiting_for_connection] at io.grpc.Status.asException(Status.java:554) ~[grpc-api-1.50.2.jar:1.50.2] at io.grpc.kotlin.ClientCalls$rpcImpl$1$1$1.onClose(ClientCalls.kt:296) ~[grpc-kotlin-stub-1.3.0.jar:?] at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:471) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:435) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:468) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:563) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:744) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:723) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.SerializeReentrantCallsDirectExecutor.execute(SerializeReentrantCallsDirectExecutor.java:49) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl.closedInternal(ClientCallImpl.java:752) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl.closed(ClientCallImpl.java:688) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream$DelayedStreamListener$4.run(DelayedStream.java:510) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream$DelayedStreamListener.delayOrExecute(DelayedStream.java:462) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream$DelayedStreamListener.closed(DelayedStream.java:507) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream.cancel(DelayedStream.java:329) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedClientTransport$PendingStream.cancel(DelayedClientTransport.java:377) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$DeadlineTimer.run(ClientCallImpl.java:406) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.LogExceptionRunnable.run(LogExceptionRunnable.java:43) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.PromiseTask.runTask(PromiseTask.java:98) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.ScheduledFutureTask.run(ScheduledFutureTask.java:153) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:174) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:167) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:470) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:503) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:997) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at java.lang.Thread.run(Thread.java:833) ~[?:?] ``` **Expected behavior** A clear and concise description of what you expected to happen. hstreamdb-java should connect to remote hstream server **Additional context** Add any other context about the problem here.
1.0
hstreamdb-java cannot connect to remote hstream server,the ip is converted to the Hstream Server intranet address - **Describe the bug** A clear and concise description of what the bug is. hstreamdb-java cannot connect to remote hstream server,the ip is converted to the Hstream Server intranet address **To Reproduce** Steps to reproduce the behavior: quick-start.yaml: ``` version: "3.5" services: hserver: image: hstreamdb/hstream:latest depends_on: - zookeeper - hstore ports: - "6570:6570" expose: - 6570 networks: - hstream-quickstart volumes: - /var/run/docker.sock:/var/run/docker.sock - /tmp:/tmp - data_store:/data/store command: - bash - "-c" - | set -e /usr/local/script/wait-for-storage.sh hstore 6440 zookeeper 2181 600 \ /usr/local/bin/hstream-server \ --bind-address 0.0.0.0 --port 6570 \ --internal-port 6571 \ --server-id 100 \ --seed-nodes "$$(hostname -I | awk '{print $$1}'):6571" \ --advertised-address $$(hostname -I | awk '{print $$1}') \ --metastore-uri zk://zookeeper:2181 \ --store-config /data/store/logdevice.conf \ --store-admin-host hstore --store-admin-port 6440 \ --store-log-level warning \ --io-tasks-path /tmp/io/tasks \ --io-tasks-network hstream-quickstart hstore: image: hstreamdb/hstream:latest networks: - hstream-quickstart volumes: - data_store:/data/store command: - bash - "-c" - | set -ex # N.B. "enable-dscp-reflection=false" is required for linux kernel which # doesn't support dscp reflection, e.g. centos7. /usr/local/bin/ld-dev-cluster --root /data/store \ --use-tcp --tcp-host $$(hostname -I | awk '{print $$1}') \ --user-admin-port 6440 \ --param enable-dscp-reflection=false \ --no-interactive \ zookeeper: image: zookeeper expose: - 2181 networks: - hstream-quickstart volumes: - data_zk_data:/data - data_zk_datalog:/datalog networks: hstream-quickstart: name: hstream-quickstart volumes: data_store: name: quickstart_data_store data_zk_data: name: quickstart_data_zk_data data_zk_datalog: name: quickstart_data_zk_datalog ``` ``` 17:04:36.949 [main] INFO io.hstream.impl.HStreamClientKtImpl - client init with bootstrapServerUrls [[******:6570]] 17:04:38.193 [main] INFO io.hstream.impl.HStreamClientKtImpl - update clusterServerUrls to [[172.18.0.4:6570]] 17:04:43.210 [grpc-nio-worker-ELG-1-6] ERROR io.hstream.impl.Utils - unary rpc error with url [172.18.0.4:6570] io.grpc.StatusException: DEADLINE_EXCEEDED: deadline exceeded after 4.990276100s. [buffered_nanos=4992547700, waiting_for_connection] at io.grpc.Status.asException(Status.java:554) ~[grpc-api-1.50.2.jar:1.50.2] at io.grpc.kotlin.ClientCalls$rpcImpl$1$1$1.onClose(ClientCalls.kt:296) ~[grpc-kotlin-stub-1.3.0.jar:?] at io.grpc.internal.DelayedClientCall$DelayedListener$3.run(DelayedClientCall.java:471) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedClientCall$DelayedListener.delayOrExecute(DelayedClientCall.java:435) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedClientCall$DelayedListener.onClose(DelayedClientCall.java:468) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl.closeObserver(ClientCallImpl.java:563) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl.access$300(ClientCallImpl.java:70) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInternal(ClientCallImpl.java:744) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl$1StreamClosed.runInContext(ClientCallImpl.java:723) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ContextRunnable.run(ContextRunnable.java:37) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.SerializeReentrantCallsDirectExecutor.execute(SerializeReentrantCallsDirectExecutor.java:49) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl.closedInternal(ClientCallImpl.java:752) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$ClientStreamListenerImpl.closed(ClientCallImpl.java:688) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream$DelayedStreamListener$4.run(DelayedStream.java:510) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream$DelayedStreamListener.delayOrExecute(DelayedStream.java:462) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream$DelayedStreamListener.closed(DelayedStream.java:507) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedStream.cancel(DelayedStream.java:329) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.DelayedClientTransport$PendingStream.cancel(DelayedClientTransport.java:377) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.ClientCallImpl$DeadlineTimer.run(ClientCallImpl.java:406) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.internal.LogExceptionRunnable.run(LogExceptionRunnable.java:43) ~[grpc-core-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.PromiseTask.runTask(PromiseTask.java:98) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.ScheduledFutureTask.run(ScheduledFutureTask.java:153) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.AbstractEventExecutor.runTask(AbstractEventExecutor.java:174) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.AbstractEventExecutor.safeExecute(AbstractEventExecutor.java:167) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.SingleThreadEventExecutor.runAllTasks(SingleThreadEventExecutor.java:470) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.channel.nio.NioEventLoop.run(NioEventLoop.java:503) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.SingleThreadEventExecutor$4.run(SingleThreadEventExecutor.java:997) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.internal.ThreadExecutorMap$2.run(ThreadExecutorMap.java:74) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at io.grpc.netty.shaded.io.netty.util.concurrent.FastThreadLocalRunnable.run(FastThreadLocalRunnable.java:30) ~[grpc-netty-shaded-1.50.2.jar:1.50.2] at java.lang.Thread.run(Thread.java:833) ~[?:?] ``` **Expected behavior** A clear and concise description of what you expected to happen. hstreamdb-java should connect to remote hstream server **Additional context** Add any other context about the problem here.
non_priority
hstreamdb java cannot connect to remote hstream server the ip is converted to the hstream server intranet address describe the bug a clear and concise description of what the bug is hstreamdb java cannot connect to remote hstream server the ip is converted to the hstream server intranet address to reproduce steps to reproduce the behavior quick start yaml version services hserver image hstreamdb hstream latest depends on zookeeper hstore ports expose networks hstream quickstart volumes var run docker sock var run docker sock tmp tmp data store data store command bash c set e usr local script wait for storage sh hstore zookeeper usr local bin hstream server bind address port internal port server id seed nodes hostname i awk print advertised address hostname i awk print metastore uri zk zookeeper store config data store logdevice conf store admin host hstore store admin port store log level warning io tasks path tmp io tasks io tasks network hstream quickstart hstore image hstreamdb hstream latest networks hstream quickstart volumes data store data store command bash c set ex n b enable dscp reflection false is required for linux kernel which doesn t support dscp reflection e g usr local bin ld dev cluster root data store use tcp tcp host hostname i awk print user admin port param enable dscp reflection false no interactive zookeeper image zookeeper expose networks hstream quickstart volumes data zk data data data zk datalog datalog networks hstream quickstart name hstream quickstart volumes data store name quickstart data store data zk data name quickstart data zk data data zk datalog name quickstart data zk datalog info io hstream impl hstreamclientktimpl client init with bootstrapserverurls info io hstream impl hstreamclientktimpl update clusterserverurls to error io hstream impl utils unary rpc error with url io grpc statusexception deadline exceeded deadline exceeded after at io grpc status asexception status java at io grpc kotlin clientcalls rpcimpl onclose clientcalls kt at io grpc internal delayedclientcall delayedlistener run delayedclientcall java at io grpc internal delayedclientcall delayedlistener delayorexecute delayedclientcall java at io grpc internal delayedclientcall delayedlistener onclose delayedclientcall java at io grpc internal clientcallimpl closeobserver clientcallimpl java at io grpc internal clientcallimpl access clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runinternal clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl runincontext clientcallimpl java at io grpc internal contextrunnable run contextrunnable java at io grpc internal serializereentrantcallsdirectexecutor execute serializereentrantcallsdirectexecutor java at io grpc internal clientcallimpl clientstreamlistenerimpl closedinternal clientcallimpl java at io grpc internal clientcallimpl clientstreamlistenerimpl closed clientcallimpl java at io grpc internal delayedstream delayedstreamlistener run delayedstream java at io grpc internal delayedstream delayedstreamlistener delayorexecute delayedstream java at io grpc internal delayedstream delayedstreamlistener closed delayedstream java at io grpc internal delayedstream cancel delayedstream java at io grpc internal delayedclienttransport pendingstream cancel delayedclienttransport java at io grpc internal clientcallimpl deadlinetimer run clientcallimpl java at io grpc internal logexceptionrunnable run logexceptionrunnable java at io grpc netty shaded io netty util concurrent promisetask runtask promisetask java at io grpc netty shaded io netty util concurrent scheduledfuturetask run scheduledfuturetask java at io grpc netty shaded io netty util concurrent abstracteventexecutor runtask abstracteventexecutor java at io grpc netty shaded io netty util concurrent abstracteventexecutor safeexecute abstracteventexecutor java at io grpc netty shaded io netty util concurrent singlethreadeventexecutor runalltasks singlethreadeventexecutor java at io grpc netty shaded io netty channel nio nioeventloop run nioeventloop java at io grpc netty shaded io netty util concurrent singlethreadeventexecutor run singlethreadeventexecutor java at io grpc netty shaded io netty util internal threadexecutormap run threadexecutormap java at io grpc netty shaded io netty util concurrent fastthreadlocalrunnable run fastthreadlocalrunnable java at java lang thread run thread java expected behavior a clear and concise description of what you expected to happen hstreamdb java should connect to remote hstream server additional context add any other context about the problem here
0
44,013
5,580,915,318
IssuesEvent
2017-03-28 17:41:58
JuliaGraphs/LightGraphs.jl
https://api.github.com/repos/JuliaGraphs/LightGraphs.jl
closed
Transient CI failures in spectral.jl
bug CI / tests
@jpfairbanks any idea how to stop these? They're happening ~50% of the time on Travis: ``` running /home/travis/.julia/v0.5/LightGraphs/test/linalg/spectral.jl ... ERROR: LoadError: LoadError: mismatch of non-finite elements: norm((eigs(B₁))[1] - (eigs(B))[1]) = NaN 0.0 = 0.0 in error(::String, ::String, ::Vararg{Any,N}) at ./error.jl:22 in test_approx_eq(::Float64, ::Float64, ::Float64, ::String, ::String) at ./test.jl:857 in include_from_node1(::String) at ./loading.jl:488 in macro expansion; at /home/travis/.julia/v0.5/LightGraphs/test/runtests.jl:103 [inlined] in anonymous at ./<missing>:? in include_from_node1(::String) at ./loading.jl:488 in process_options(::Base.JLOptions) at ./client.jl:265 in _start() at ./client.jl:321 while loading /home/travis/.julia/v0.5/LightGraphs/test/linalg/spectral.jl, in expression starting on line 126 while loading /home/travis/.julia/v0.5/LightGraphs/test/runtests.jl, in expression starting on line 100 ```
1.0
Transient CI failures in spectral.jl - @jpfairbanks any idea how to stop these? They're happening ~50% of the time on Travis: ``` running /home/travis/.julia/v0.5/LightGraphs/test/linalg/spectral.jl ... ERROR: LoadError: LoadError: mismatch of non-finite elements: norm((eigs(B₁))[1] - (eigs(B))[1]) = NaN 0.0 = 0.0 in error(::String, ::String, ::Vararg{Any,N}) at ./error.jl:22 in test_approx_eq(::Float64, ::Float64, ::Float64, ::String, ::String) at ./test.jl:857 in include_from_node1(::String) at ./loading.jl:488 in macro expansion; at /home/travis/.julia/v0.5/LightGraphs/test/runtests.jl:103 [inlined] in anonymous at ./<missing>:? in include_from_node1(::String) at ./loading.jl:488 in process_options(::Base.JLOptions) at ./client.jl:265 in _start() at ./client.jl:321 while loading /home/travis/.julia/v0.5/LightGraphs/test/linalg/spectral.jl, in expression starting on line 126 while loading /home/travis/.julia/v0.5/LightGraphs/test/runtests.jl, in expression starting on line 100 ```
non_priority
transient ci failures in spectral jl jpfairbanks any idea how to stop these they re happening of the time on travis running home travis julia lightgraphs test linalg spectral jl error loaderror loaderror mismatch of non finite elements norm eigs b₁ eigs b nan in error string string vararg any n at error jl in test approx eq string string at test jl in include from string at loading jl in macro expansion at home travis julia lightgraphs test runtests jl in anonymous at in include from string at loading jl in process options base jloptions at client jl in start at client jl while loading home travis julia lightgraphs test linalg spectral jl in expression starting on line while loading home travis julia lightgraphs test runtests jl in expression starting on line
0
89,330
10,595,690,618
IssuesEvent
2019-10-09 19:33:21
carlsonsantana/criptoarbitragem
https://api.github.com/repos/carlsonsantana/criptoarbitragem
closed
Definir a isenção de responsabilidade no software
documentation
Definir como será informado ao usuário que os desenvolvedores não são responsáveis sobre os ganhos e perdas devido ao uso do software.
1.0
Definir a isenção de responsabilidade no software - Definir como será informado ao usuário que os desenvolvedores não são responsáveis sobre os ganhos e perdas devido ao uso do software.
non_priority
definir a isenção de responsabilidade no software definir como será informado ao usuário que os desenvolvedores não são responsáveis sobre os ganhos e perdas devido ao uso do software
0