Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
36,168
17,495,882,858
IssuesEvent
2021-08-10 00:03:18
cosmos/cosmos-sdk
https://api.github.com/repos/cosmos/cosmos-sdk
closed
benchmarking: please be patient with noisy benchmarks until we’ve stabilized machines and turned off CPU scaling
Type: Performance stale
<!-- < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < ☺ v ✰ Thanks for opening an issue! ✰ v Before smashing the submit button please review the template. v Please also ensure that this is not a duplicate issue :) ☺ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > --> <!-- IMPORTANT: Prior to opening a bug report, check if it affects one of the core modules and if its elegible for a bug bounty on `SECURITY.md`. Bugs that are not submitted through the appropriate channels won't receive any bounty. --> ## Summary of Bug My team is implementing a benchmarking bot @orijbot that’ll check out a commit from a PR’s head and run benchmarks then post the results. We are currently seeing lots of noise from the machines, mos definitely due to CPU frequency scaling on cloud VMs. Please don’t worry right now about the results, and we’ll mute the bot for now until we’ve sorted this out. @cuonglm, let’s for now mute the replies to PRs. Sorry about that @robert-zaremba @alessio @aaronc @amaurym @marbar3778 @alexanderbez, the stabilization coming up soon and then we’ll announce it officially. Thank you.
True
benchmarking: please be patient with noisy benchmarks until we’ve stabilized machines and turned off CPU scaling - <!-- < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < < ☺ v ✰ Thanks for opening an issue! ✰ v Before smashing the submit button please review the template. v Please also ensure that this is not a duplicate issue :) ☺ > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > --> <!-- IMPORTANT: Prior to opening a bug report, check if it affects one of the core modules and if its elegible for a bug bounty on `SECURITY.md`. Bugs that are not submitted through the appropriate channels won't receive any bounty. --> ## Summary of Bug My team is implementing a benchmarking bot @orijbot that’ll check out a commit from a PR’s head and run benchmarks then post the results. We are currently seeing lots of noise from the machines, mos definitely due to CPU frequency scaling on cloud VMs. Please don’t worry right now about the results, and we’ll mute the bot for now until we’ve sorted this out. @cuonglm, let’s for now mute the replies to PRs. Sorry about that @robert-zaremba @alessio @aaronc @amaurym @marbar3778 @alexanderbez, the stabilization coming up soon and then we’ll announce it officially. Thank you.
non_priority
benchmarking please be patient with noisy benchmarks until we’ve stabilized machines and turned off cpu scaling ☺ v ✰ thanks for opening an issue ✰ v before smashing the submit button please review the template v please also ensure that this is not a duplicate issue ☺ important prior to opening a bug report check if it affects one of the core modules and if its elegible for a bug bounty on security md bugs that are not submitted through the appropriate channels won t receive any bounty summary of bug my team is implementing a benchmarking bot orijbot that’ll check out a commit from a pr’s head and run benchmarks then post the results we are currently seeing lots of noise from the machines mos definitely due to cpu frequency scaling on cloud vms please don’t worry right now about the results and we’ll mute the bot for now until we’ve sorted this out cuonglm let’s for now mute the replies to prs sorry about that robert zaremba alessio aaronc amaurym alexanderbez the stabilization coming up soon and then we’ll announce it officially thank you
0
5,781
8,445,138,307
IssuesEvent
2018-10-18 20:33:34
robertrenecker/boulderTrimble
https://api.github.com/repos/robertrenecker/boulderTrimble
closed
Create two user stories for UI
requirements research review
This is so we can have requirements for the UI while Galen researches stuff
1.0
Create two user stories for UI - This is so we can have requirements for the UI while Galen researches stuff
non_priority
create two user stories for ui this is so we can have requirements for the ui while galen researches stuff
0
10,868
6,966,170,883
IssuesEvent
2017-12-09 15:42:26
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
New project / first use UX
discussion enhancement topic:editor usability
* A new scene should have a Node added by default * Dragging files from the FileSystem into the Scene hierarchy should have the same effect as dragging them into the Scene viewport. Currently, you can drag a PNG into the viewport, for example, but not into the Scene hierarchy, even after creating a root node. The aim is to reduce the learning curve (and friction) when first getting used to Godot. Currently, to add your first texture into the viewport and play around with it, you have to: 1. Open Godot 2. Import your files 3. Create a new root node 4. Drag and drop your first texture into the scene view (but not the hierarchy, that does not work!) However, chances are that you get stuck at the `No parent to instance a child at` when you didn't know to add a root node or - even worse - you try to drag your file into the scene hierarchy and... it just displays the warning icon and doesn't work, without any message. With these changes, it becomes: 1. Open Godot 2. Import your files 3. Drag and drop your first texture into the scene viewport or hierarchy, whichever you want, it works.
True
New project / first use UX - * A new scene should have a Node added by default * Dragging files from the FileSystem into the Scene hierarchy should have the same effect as dragging them into the Scene viewport. Currently, you can drag a PNG into the viewport, for example, but not into the Scene hierarchy, even after creating a root node. The aim is to reduce the learning curve (and friction) when first getting used to Godot. Currently, to add your first texture into the viewport and play around with it, you have to: 1. Open Godot 2. Import your files 3. Create a new root node 4. Drag and drop your first texture into the scene view (but not the hierarchy, that does not work!) However, chances are that you get stuck at the `No parent to instance a child at` when you didn't know to add a root node or - even worse - you try to drag your file into the scene hierarchy and... it just displays the warning icon and doesn't work, without any message. With these changes, it becomes: 1. Open Godot 2. Import your files 3. Drag and drop your first texture into the scene viewport or hierarchy, whichever you want, it works.
non_priority
new project first use ux a new scene should have a node added by default dragging files from the filesystem into the scene hierarchy should have the same effect as dragging them into the scene viewport currently you can drag a png into the viewport for example but not into the scene hierarchy even after creating a root node the aim is to reduce the learning curve and friction when first getting used to godot currently to add your first texture into the viewport and play around with it you have to open godot import your files create a new root node drag and drop your first texture into the scene view but not the hierarchy that does not work however chances are that you get stuck at the no parent to instance a child at when you didn t know to add a root node or even worse you try to drag your file into the scene hierarchy and it just displays the warning icon and doesn t work without any message with these changes it becomes open godot import your files drag and drop your first texture into the scene viewport or hierarchy whichever you want it works
0
430,329
30,176,747,533
IssuesEvent
2023-07-04 05:39:31
CivicDataLab/IDS-DRR-Data-Pipeline
https://api.github.com/repos/CivicDataLab/IDS-DRR-Data-Pipeline
opened
Update README
documentation
The current README is written for IDEA-FRM. We need to add details about IDS-DRR and what is the objective of this repo. @d-saikrishna - Please keep this repo updated.
1.0
Update README - The current README is written for IDEA-FRM. We need to add details about IDS-DRR and what is the objective of this repo. @d-saikrishna - Please keep this repo updated.
non_priority
update readme the current readme is written for idea frm we need to add details about ids drr and what is the objective of this repo d saikrishna please keep this repo updated
0
180,016
14,731,066,115
IssuesEvent
2021-01-06 14:10:52
abbaye/WpfHexEditorControl
https://api.github.com/repos/abbaye/WpfHexEditorControl
closed
Question: where I can find some documentation?
Documentation
I looked at the samples but I spent one hour just to understand that `Stream` was the property that I needed to set to show something. The control is awesome, but without some documentation I bet most of the people is not using at its best. Thanks for the great project.
1.0
Question: where I can find some documentation? - I looked at the samples but I spent one hour just to understand that `Stream` was the property that I needed to set to show something. The control is awesome, but without some documentation I bet most of the people is not using at its best. Thanks for the great project.
non_priority
question where i can find some documentation i looked at the samples but i spent one hour just to understand that stream was the property that i needed to set to show something the control is awesome but without some documentation i bet most of the people is not using at its best thanks for the great project
0
19,471
6,727,071,205
IssuesEvent
2017-10-17 12:21:34
Tirocupidus/TheExiledRPOverhaul
https://api.github.com/repos/Tirocupidus/TheExiledRPOverhaul
closed
'Seductive Lay' Noises
Ready For Build
The animation is neat. But those noises become annoying after a minute or so. Is there any way to remove the audio portion of the emote?
1.0
'Seductive Lay' Noises - The animation is neat. But those noises become annoying after a minute or so. Is there any way to remove the audio portion of the emote?
non_priority
seductive lay noises the animation is neat but those noises become annoying after a minute or so is there any way to remove the audio portion of the emote
0
87,925
10,560,448,311
IssuesEvent
2019-10-04 13:55:08
TechAndCheck/tech-and-check-alerts
https://api.github.com/repos/TechAndCheck/tech-and-check-alerts
closed
Populate TESTING.md
documentation testing
We should quickly document how to add new tests to a docs/TESTING.md -- this is linked to from our [CONTRIBUTING.md](https://github.com/TechAndCheck/tech-and-check-alerts/blob/master/CONTRIBUTING.md) already but 404s. It should provide really simple instructions on the way to properly introduce a new test to a new component.
1.0
Populate TESTING.md - We should quickly document how to add new tests to a docs/TESTING.md -- this is linked to from our [CONTRIBUTING.md](https://github.com/TechAndCheck/tech-and-check-alerts/blob/master/CONTRIBUTING.md) already but 404s. It should provide really simple instructions on the way to properly introduce a new test to a new component.
non_priority
populate testing md we should quickly document how to add new tests to a docs testing md this is linked to from our already but it should provide really simple instructions on the way to properly introduce a new test to a new component
0
350,259
24,975,407,654
IssuesEvent
2022-11-02 07:16:29
kevinren1108/Apollo-Capstone-Project
https://api.github.com/repos/kevinren1108/Apollo-Capstone-Project
opened
Parking lot vehicle detection
documentation
As a system administrator, he would like to monitor the number of vehicles in the parking lot at any time - [ ] Come across a way to detect vehicle entry and exit the parking lot. - [ ] Provide deliverables for each alternative. - [ ] Identify risks for each alternative.
1.0
Parking lot vehicle detection - As a system administrator, he would like to monitor the number of vehicles in the parking lot at any time - [ ] Come across a way to detect vehicle entry and exit the parking lot. - [ ] Provide deliverables for each alternative. - [ ] Identify risks for each alternative.
non_priority
parking lot vehicle detection as a system administrator he would like to monitor the number of vehicles in the parking lot at any time come across a way to detect vehicle entry and exit the parking lot provide deliverables for each alternative identify risks for each alternative
0
49,596
12,390,257,513
IssuesEvent
2020-05-20 10:21:11
moby/moby
https://api.github.com/repos/moby/moby
closed
buildkit: can not convert active xx to layer
area/builder kind/bug
<!-- If you are reporting a new issue, make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead. If you suspect your issue is a bug, please edit your issue description to include the BUG REPORT INFORMATION shown below. If you fail to provide this information within 7 days, we cannot debug your issue and will close it. We will, however, reopen it if you later provide the information. For more information about reporting issues, see https://github.com/moby/moby/blob/master/CONTRIBUTING.md#reporting-other-issues --------------------------------------------------- GENERAL SUPPORT INFORMATION --------------------------------------------------- The GitHub issue tracker is for bug reports and feature requests. General support for **docker** can be found at the following locations: - Docker Support Forums - https://forums.docker.com - Slack - community.docker.com #general channel - Post a question on StackOverflow, using the Docker tag General support for **moby** can be found at the following locations: - Moby Project Forums - https://forums.mobyproject.org - Slack - community.docker.com #moby-project channel - Post a question on StackOverflow, using the Moby tag --------------------------------------------------- BUG REPORT INFORMATION --------------------------------------------------- Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST --> **Description** <!-- Briefly describe the problem you are having in a few paragraphs. --> After I executed `docker system prune -a --volumes`, I encountered an error when using buildkit build image **Steps to reproduce the issue:** 1. `docker system prune -a --volumes` 2. build docker image using buildkit. ``` (MoeLove) ➜ test-build docker build --no-cache -t local/test . [+] Building 14.1s (5/5) FINISHED => [internal] load build definition from Dockerfile 0.0s => => transferring dockerfile: 113B 0.0s => [internal] load .dockerignore 0.0s => => transferring context: 2B 0.0s => [internal] load metadata for docker.io/library/alpine:latest 7.1s => [1/1] FROM docker.io/library/alpine@sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 6.9s => => resolve docker.io/library/alpine@sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 0.0s => => extracting sha256:cbdbe7a5bc2a134ca8ec91be58565ec07d037386d1f1d8385412d224deafca08 0.1s => => sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 1.64kB / 1.64kB 0.0s => => sha256:39eda93d15866957feaee28f8fc5adb545276a64147445c64992ef69804dbf01 528B / 528B 0.0s => => sha256:f70734b6a266dcb5f44c383274821207885b549b75c8e119404917a61335981a 1.51kB / 1.51kB 0.0s => => sha256:cbdbe7a5bc2a134ca8ec91be58565ec07d037386d1f1d8385412d224deafca08 2.81MB / 2.81MB 0.0s => ERROR exporting to image 0.0s => => exporting layers 0.0s ------ > exporting to image: ------ can not convert active uyehw145omml8y9yajo11nm2r to layer (MoeLove) ➜ test-build cat Dockerfile FROM alpine ``` **Describe the results you received:** ``` can not convert active uyehw145omml8y9yajo11nm2r to layer ``` **Describe the results you expected:** build success. **Additional information you deem important (e.g. issue happens only occasionally):** before I executed `docker system prune -a --voluems` , the `docker system df` output: ``` (MoeLove) ➜ infra git:(master) ✗ docker system df TYPE TOTAL ACTIVE SIZE RECLAIMABLE Images 126 2 29.68GB 29.66GB (99%) Containers 2 0 638.6MB 638.6MB (100%) Local Volumes 11 10 2.454GB 32.76MB (1%) Build Cache 174 0 570.3MB 570.3MB ``` The docker daemon's log here: ``` -- Logs begin at Wed 2020-01-08 07:20:55 CST, end at Sun 2020-04-26 01:02:36 CST. -- 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.694947430+08:00" level=debug msg="Calling HEAD /_ping" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696260414+08:00" level=debug msg="Calling POST /v1.41/build?buildargs=%7B%7D&buildid=efd6c49f711f0d39d1db6e232c9d8714746618de97739fc4cc651d9ce41ae695&cachefrom=%5B%5D&cgroupparent=&cpuperiod=0&cpuquota=0&cpusetcpus=&cpusetmems=&cpushares=0&dockerfile=&labels=%7B%7D&memory=0&memswap=0&networkmode=default&nocache=1&remote=client-session&rm=1&session=mvorl2qfiurej9npbplj9zvpk&shmsize=0&t=local%2Ftest&target=&ulimits=null&version=2" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696311169+08:00" level=debug msg="Calling POST /session" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696434584+08:00" level=info msg="parsed scheme: \"\"" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696485478+08:00" level=info msg="scheme \"\" not registered, fallback to default scheme" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696509478+08:00" level=info msg="ccResolverWrapper: sending update to cc: {[{ <nil> 0 <nil>}] <nil> <nil>}" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696524005+08:00" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.715814904+08:00" level=debug msg="reusing ref for local: uipo0ngzebmltllre2fuca6hk" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.717552971+08:00" level=debug msg="reusing ref for local: ke4oxtlz4afipbbdc8x2q89go" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.718569398+08:00" level=debug msg="diffcopy took: 2.55404ms" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.718838756+08:00" level=debug msg="diffcopy took: 1.158315ms" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.722039301+08:00" level=debug msg="saved uipo0ngzebmltllre2fuca6hk as local.sharedKey:dockerfile:dockerfile:d9182bf2bf9d695526bcfa3cd58d50347c1df6db22513d1ae9179f082fb3d481" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.725234432+08:00" level=debug msg="saved ke4oxtlz4afipbbdc8x2q89go as local.sharedKey:context:context-.dockerignore:d9182bf2bf9d695526bcfa3cd58d50347c1df6db22513d1ae9179f082fb3d481" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.762946297+08:00" level=debug msg=resolving host=registry-1.docker.io 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.762990663+08:00" level=debug msg="do request" host=registry-1.docker.io request.header.accept="application/vnd.docker.distribution.manifest.v2+json, application/vnd.docker.distribution.manifest.list.v2+json, application/vnd.oci.image.manifest.v1+json, application/vnd.oci.image.index.v1+json, */*" request.header.user-agent=containerd/1.3.0+unknown request.method=HEAD url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:25 bogon dockerd[5438]: time="2020-04-26T01:01:25.029225199+08:00" level=debug msg="fetch response received" host=registry-1.docker.io response.header.content-length=157 response.header.content-type=application/json response.header.date="Sat, 25 Apr 2020 17:01:24 GMT" response.header.docker-distribution-api-version=registry/2.0 response.header.strict-transport-security="max-age=31536000" response.header.www-authenticate="Bearer realm=\"https://auth.docker.io/token\",service=\"registry.docker.io\",scope=\"repository:library/alpine:pull\"" response.status="401 Unauthorized" url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:25 bogon dockerd[5438]: time="2020-04-26T01:01:25.029504751+08:00" level=debug msg=Unauthorized header="Bearer realm=\"https://auth.docker.io/token\",service=\"registry.docker.io\",scope=\"repository:library/alpine:pull\"" host=registry-1.docker.io 4月 26 01:01:25 bogon dockerd[5438]: time="2020-04-26T01:01:25.240188818+08:00" level=debug msg="do request" host=registry-1.docker.io request.header.accept="application/vnd.docker.distribution.manifest.v2+json, application/vnd.docker.distribution.manifest.list.v2+json, application/vnd.oci.image.manifest.v1+json, application/vnd.oci.image.index.v1+json, */*" request.header.user-agent=containerd/1.3.0+unknown request.method=HEAD url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.173306868+08:00" level=debug msg="fetch response received" host=registry-1.docker.io response.header.content-length=1638 response.header.content-type=application/vnd.docker.distribution.manifest.list.v2+json response.header.date="Sat, 25 Apr 2020 17:01:31 GMT" response.header.docker-content-digest="sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54" response.header.docker-distribution-api-version=registry/2.0 response.header.etag="\"sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54\"" response.header.strict-transport-security="max-age=31536000" response.status="200 OK" url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.173718342+08:00" level=debug msg=resolved desc.digest="sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54" host=registry-1.docker.io 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.174123087+08:00" level=debug msg=fetch digest="sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54" mediatype=application/vnd.docker.distribution.manifest.list.v2+json size=1638 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.181218688+08:00" level=debug msg=fetch digest="sha256:39eda93d15866957feaee28f8fc5adb545276a64147445c64992ef69804dbf01" mediatype=application/vnd.docker.distribution.manifest.v2+json size=528 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.184170880+08:00" level=debug msg=fetch digest="sha256:f70734b6a266dcb5f44c383274821207885b549b75c8e119404917a61335981a" mediatype=application/vnd.docker.container.image.v1+json size=1507 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.190957583+08:00" level=debug msg="load cache for [1/1] FROM docker.io/library/alpine@sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 with moby::uyehw145omml8y9yajo11nm2r" 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.193516005+08:00" level=warning msg="grpc: addrConn.createTransport failed to connect to { <nil> 0 <nil>}. Err :connection error: desc = \"transport: Error while dialing only one connection allowed\". Reconnecting..." module=grpc ``` **Output of `docker version`:** ``` (MoeLove) ➜ ~ docker version Client: Docker Engine - Community Version: 0.0.0-20200421170140-7f2f916fba API version: 1.41 Go version: go1.13.10 Git commit: 7f2f916fba Built: Tue Apr 21 20:13:01 2020 OS/Arch: linux/amd64 Experimental: true Server: Docker Engine - Community Engine: Version: 0.0.0-20200421170140-7f2f916fba API version: 1.41 (minimum version 1.12) Go version: go1.13.10 Git commit: 7f2f916fba Built: Tue Apr 21 20:10:23 2020 OS/Arch: linux/amd64 Experimental: true containerd: Version: v1.3.3 GitCommit: d76c121f76a5fc8a462dc64594aea72fe18e1178 runc: Version: 1.0.0-rc10 GitCommit: dc9208a3303feef5b3839f4323d9beb36df0a9dd docker-init: Version: 0.18.0 GitCommit: fec3683 ``` **Output of `docker info`:** ``` (MoeLove) ➜ ~ docker info Client: Debug Mode: false Plugins: app: Docker App (Docker Inc., v0.9.0-zeta1-96-g44932b629b) buildx: Build with BuildKit (Docker Inc., v0.3.1-42-g7b297eb-tp-docker) year: A docker plugin, Happy New Year! (Jintao Zhang, v1.0.0) Server: Containers: 0 Running: 0 Paused: 0 Stopped: 0 Images: 0 Server Version: 0.0.0-20200421170140-7f2f916fba Storage Driver: overlay2 Backing Filesystem: extfs Supports d_type: true Native Overlay Diff: true Logging Driver: json-file Cgroup Driver: systemd Plugins: Volume: local Network: bridge host ipvlan macvlan null overlay Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog Swarm: inactive Runtimes: runc Default Runtime: runc Init Binary: docker-init containerd version: d76c121f76a5fc8a462dc64594aea72fe18e1178 runc version: dc9208a3303feef5b3839f4323d9beb36df0a9dd init version: fec3683 Security Options: seccomp Profile: default Kernel Version: 5.5.16-100.fc30.x86_64 Operating System: Fedora 30 (Workstation Edition) OSType: linux Architecture: x86_64 CPUs: 4 Total Memory: 15.53GiB Name: bogon ID: XXXXXXXX Docker Root Dir: /var/lib/docker Debug Mode: true File Descriptors: 24 Goroutines: 38 System Time: 2020-04-26T01:05:45.758762687+08:00 EventsListeners: 0 HTTP Proxy: socks5://127.0.0.1:1080 HTTPS Proxy: socks5://127.0.0.1:1080 No Proxy: localhost,127.0.0.1 Registry: https://index.docker.io/v1/ Labels: Experimental: true Insecure Registries: 127.0.0.1:5000 127.0.0.0/8 Live Restore Enabled: true ``` **Additional environment details (AWS, VirtualBox, physical, etc.):** physical
1.0
buildkit: can not convert active xx to layer - <!-- If you are reporting a new issue, make sure that we do not have any duplicates already open. You can ensure this by searching the issue list for this repository. If there is a duplicate, please close your issue and add a comment to the existing issue instead. If you suspect your issue is a bug, please edit your issue description to include the BUG REPORT INFORMATION shown below. If you fail to provide this information within 7 days, we cannot debug your issue and will close it. We will, however, reopen it if you later provide the information. For more information about reporting issues, see https://github.com/moby/moby/blob/master/CONTRIBUTING.md#reporting-other-issues --------------------------------------------------- GENERAL SUPPORT INFORMATION --------------------------------------------------- The GitHub issue tracker is for bug reports and feature requests. General support for **docker** can be found at the following locations: - Docker Support Forums - https://forums.docker.com - Slack - community.docker.com #general channel - Post a question on StackOverflow, using the Docker tag General support for **moby** can be found at the following locations: - Moby Project Forums - https://forums.mobyproject.org - Slack - community.docker.com #moby-project channel - Post a question on StackOverflow, using the Moby tag --------------------------------------------------- BUG REPORT INFORMATION --------------------------------------------------- Use the commands below to provide key information from your environment: You do NOT have to include this information if this is a FEATURE REQUEST --> **Description** <!-- Briefly describe the problem you are having in a few paragraphs. --> After I executed `docker system prune -a --volumes`, I encountered an error when using buildkit build image **Steps to reproduce the issue:** 1. `docker system prune -a --volumes` 2. build docker image using buildkit. ``` (MoeLove) ➜ test-build docker build --no-cache -t local/test . [+] Building 14.1s (5/5) FINISHED => [internal] load build definition from Dockerfile 0.0s => => transferring dockerfile: 113B 0.0s => [internal] load .dockerignore 0.0s => => transferring context: 2B 0.0s => [internal] load metadata for docker.io/library/alpine:latest 7.1s => [1/1] FROM docker.io/library/alpine@sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 6.9s => => resolve docker.io/library/alpine@sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 0.0s => => extracting sha256:cbdbe7a5bc2a134ca8ec91be58565ec07d037386d1f1d8385412d224deafca08 0.1s => => sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 1.64kB / 1.64kB 0.0s => => sha256:39eda93d15866957feaee28f8fc5adb545276a64147445c64992ef69804dbf01 528B / 528B 0.0s => => sha256:f70734b6a266dcb5f44c383274821207885b549b75c8e119404917a61335981a 1.51kB / 1.51kB 0.0s => => sha256:cbdbe7a5bc2a134ca8ec91be58565ec07d037386d1f1d8385412d224deafca08 2.81MB / 2.81MB 0.0s => ERROR exporting to image 0.0s => => exporting layers 0.0s ------ > exporting to image: ------ can not convert active uyehw145omml8y9yajo11nm2r to layer (MoeLove) ➜ test-build cat Dockerfile FROM alpine ``` **Describe the results you received:** ``` can not convert active uyehw145omml8y9yajo11nm2r to layer ``` **Describe the results you expected:** build success. **Additional information you deem important (e.g. issue happens only occasionally):** before I executed `docker system prune -a --voluems` , the `docker system df` output: ``` (MoeLove) ➜ infra git:(master) ✗ docker system df TYPE TOTAL ACTIVE SIZE RECLAIMABLE Images 126 2 29.68GB 29.66GB (99%) Containers 2 0 638.6MB 638.6MB (100%) Local Volumes 11 10 2.454GB 32.76MB (1%) Build Cache 174 0 570.3MB 570.3MB ``` The docker daemon's log here: ``` -- Logs begin at Wed 2020-01-08 07:20:55 CST, end at Sun 2020-04-26 01:02:36 CST. -- 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.694947430+08:00" level=debug msg="Calling HEAD /_ping" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696260414+08:00" level=debug msg="Calling POST /v1.41/build?buildargs=%7B%7D&buildid=efd6c49f711f0d39d1db6e232c9d8714746618de97739fc4cc651d9ce41ae695&cachefrom=%5B%5D&cgroupparent=&cpuperiod=0&cpuquota=0&cpusetcpus=&cpusetmems=&cpushares=0&dockerfile=&labels=%7B%7D&memory=0&memswap=0&networkmode=default&nocache=1&remote=client-session&rm=1&session=mvorl2qfiurej9npbplj9zvpk&shmsize=0&t=local%2Ftest&target=&ulimits=null&version=2" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696311169+08:00" level=debug msg="Calling POST /session" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696434584+08:00" level=info msg="parsed scheme: \"\"" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696485478+08:00" level=info msg="scheme \"\" not registered, fallback to default scheme" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696509478+08:00" level=info msg="ccResolverWrapper: sending update to cc: {[{ <nil> 0 <nil>}] <nil> <nil>}" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.696524005+08:00" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.715814904+08:00" level=debug msg="reusing ref for local: uipo0ngzebmltllre2fuca6hk" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.717552971+08:00" level=debug msg="reusing ref for local: ke4oxtlz4afipbbdc8x2q89go" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.718569398+08:00" level=debug msg="diffcopy took: 2.55404ms" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.718838756+08:00" level=debug msg="diffcopy took: 1.158315ms" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.722039301+08:00" level=debug msg="saved uipo0ngzebmltllre2fuca6hk as local.sharedKey:dockerfile:dockerfile:d9182bf2bf9d695526bcfa3cd58d50347c1df6db22513d1ae9179f082fb3d481" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.725234432+08:00" level=debug msg="saved ke4oxtlz4afipbbdc8x2q89go as local.sharedKey:context:context-.dockerignore:d9182bf2bf9d695526bcfa3cd58d50347c1df6db22513d1ae9179f082fb3d481" 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.762946297+08:00" level=debug msg=resolving host=registry-1.docker.io 4月 26 01:01:23 bogon dockerd[5438]: time="2020-04-26T01:01:23.762990663+08:00" level=debug msg="do request" host=registry-1.docker.io request.header.accept="application/vnd.docker.distribution.manifest.v2+json, application/vnd.docker.distribution.manifest.list.v2+json, application/vnd.oci.image.manifest.v1+json, application/vnd.oci.image.index.v1+json, */*" request.header.user-agent=containerd/1.3.0+unknown request.method=HEAD url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:25 bogon dockerd[5438]: time="2020-04-26T01:01:25.029225199+08:00" level=debug msg="fetch response received" host=registry-1.docker.io response.header.content-length=157 response.header.content-type=application/json response.header.date="Sat, 25 Apr 2020 17:01:24 GMT" response.header.docker-distribution-api-version=registry/2.0 response.header.strict-transport-security="max-age=31536000" response.header.www-authenticate="Bearer realm=\"https://auth.docker.io/token\",service=\"registry.docker.io\",scope=\"repository:library/alpine:pull\"" response.status="401 Unauthorized" url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:25 bogon dockerd[5438]: time="2020-04-26T01:01:25.029504751+08:00" level=debug msg=Unauthorized header="Bearer realm=\"https://auth.docker.io/token\",service=\"registry.docker.io\",scope=\"repository:library/alpine:pull\"" host=registry-1.docker.io 4月 26 01:01:25 bogon dockerd[5438]: time="2020-04-26T01:01:25.240188818+08:00" level=debug msg="do request" host=registry-1.docker.io request.header.accept="application/vnd.docker.distribution.manifest.v2+json, application/vnd.docker.distribution.manifest.list.v2+json, application/vnd.oci.image.manifest.v1+json, application/vnd.oci.image.index.v1+json, */*" request.header.user-agent=containerd/1.3.0+unknown request.method=HEAD url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.173306868+08:00" level=debug msg="fetch response received" host=registry-1.docker.io response.header.content-length=1638 response.header.content-type=application/vnd.docker.distribution.manifest.list.v2+json response.header.date="Sat, 25 Apr 2020 17:01:31 GMT" response.header.docker-content-digest="sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54" response.header.docker-distribution-api-version=registry/2.0 response.header.etag="\"sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54\"" response.header.strict-transport-security="max-age=31536000" response.status="200 OK" url="https://registry-1.docker.io/v2/library/alpine/manifests/latest" 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.173718342+08:00" level=debug msg=resolved desc.digest="sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54" host=registry-1.docker.io 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.174123087+08:00" level=debug msg=fetch digest="sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54" mediatype=application/vnd.docker.distribution.manifest.list.v2+json size=1638 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.181218688+08:00" level=debug msg=fetch digest="sha256:39eda93d15866957feaee28f8fc5adb545276a64147445c64992ef69804dbf01" mediatype=application/vnd.docker.distribution.manifest.v2+json size=528 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.184170880+08:00" level=debug msg=fetch digest="sha256:f70734b6a266dcb5f44c383274821207885b549b75c8e119404917a61335981a" mediatype=application/vnd.docker.container.image.v1+json size=1507 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.190957583+08:00" level=debug msg="load cache for [1/1] FROM docker.io/library/alpine@sha256:9a839e63dad54c3a6d1834e29692c8492d93f90c59c978c1ed79109ea4fb9a54 with moby::uyehw145omml8y9yajo11nm2r" 4月 26 01:01:31 bogon dockerd[5438]: time="2020-04-26T01:01:31.193516005+08:00" level=warning msg="grpc: addrConn.createTransport failed to connect to { <nil> 0 <nil>}. Err :connection error: desc = \"transport: Error while dialing only one connection allowed\". Reconnecting..." module=grpc ``` **Output of `docker version`:** ``` (MoeLove) ➜ ~ docker version Client: Docker Engine - Community Version: 0.0.0-20200421170140-7f2f916fba API version: 1.41 Go version: go1.13.10 Git commit: 7f2f916fba Built: Tue Apr 21 20:13:01 2020 OS/Arch: linux/amd64 Experimental: true Server: Docker Engine - Community Engine: Version: 0.0.0-20200421170140-7f2f916fba API version: 1.41 (minimum version 1.12) Go version: go1.13.10 Git commit: 7f2f916fba Built: Tue Apr 21 20:10:23 2020 OS/Arch: linux/amd64 Experimental: true containerd: Version: v1.3.3 GitCommit: d76c121f76a5fc8a462dc64594aea72fe18e1178 runc: Version: 1.0.0-rc10 GitCommit: dc9208a3303feef5b3839f4323d9beb36df0a9dd docker-init: Version: 0.18.0 GitCommit: fec3683 ``` **Output of `docker info`:** ``` (MoeLove) ➜ ~ docker info Client: Debug Mode: false Plugins: app: Docker App (Docker Inc., v0.9.0-zeta1-96-g44932b629b) buildx: Build with BuildKit (Docker Inc., v0.3.1-42-g7b297eb-tp-docker) year: A docker plugin, Happy New Year! (Jintao Zhang, v1.0.0) Server: Containers: 0 Running: 0 Paused: 0 Stopped: 0 Images: 0 Server Version: 0.0.0-20200421170140-7f2f916fba Storage Driver: overlay2 Backing Filesystem: extfs Supports d_type: true Native Overlay Diff: true Logging Driver: json-file Cgroup Driver: systemd Plugins: Volume: local Network: bridge host ipvlan macvlan null overlay Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog Swarm: inactive Runtimes: runc Default Runtime: runc Init Binary: docker-init containerd version: d76c121f76a5fc8a462dc64594aea72fe18e1178 runc version: dc9208a3303feef5b3839f4323d9beb36df0a9dd init version: fec3683 Security Options: seccomp Profile: default Kernel Version: 5.5.16-100.fc30.x86_64 Operating System: Fedora 30 (Workstation Edition) OSType: linux Architecture: x86_64 CPUs: 4 Total Memory: 15.53GiB Name: bogon ID: XXXXXXXX Docker Root Dir: /var/lib/docker Debug Mode: true File Descriptors: 24 Goroutines: 38 System Time: 2020-04-26T01:05:45.758762687+08:00 EventsListeners: 0 HTTP Proxy: socks5://127.0.0.1:1080 HTTPS Proxy: socks5://127.0.0.1:1080 No Proxy: localhost,127.0.0.1 Registry: https://index.docker.io/v1/ Labels: Experimental: true Insecure Registries: 127.0.0.1:5000 127.0.0.0/8 Live Restore Enabled: true ``` **Additional environment details (AWS, VirtualBox, physical, etc.):** physical
non_priority
buildkit can not convert active xx to layer if you are reporting a new issue make sure that we do not have any duplicates already open you can ensure this by searching the issue list for this repository if there is a duplicate please close your issue and add a comment to the existing issue instead if you suspect your issue is a bug please edit your issue description to include the bug report information shown below if you fail to provide this information within days we cannot debug your issue and will close it we will however reopen it if you later provide the information for more information about reporting issues see general support information the github issue tracker is for bug reports and feature requests general support for docker can be found at the following locations docker support forums slack community docker com general channel post a question on stackoverflow using the docker tag general support for moby can be found at the following locations moby project forums slack community docker com moby project channel post a question on stackoverflow using the moby tag bug report information use the commands below to provide key information from your environment you do not have to include this information if this is a feature request description briefly describe the problem you are having in a few paragraphs after i executed docker system prune a volumes i encountered an error when using buildkit build image steps to reproduce the issue docker system prune a volumes build docker image using buildkit moelove ➜ test build docker build no cache t local test building finished load build definition from dockerfile transferring dockerfile load dockerignore transferring context load metadata for docker io library alpine latest from docker io library alpine resolve docker io library alpine extracting error exporting to image exporting layers exporting to image can not convert active to layer moelove ➜ test build cat dockerfile from alpine describe the results you received can not convert active to layer describe the results you expected build success additional information you deem important e g issue happens only occasionally before i executed docker system prune a voluems the docker system df output moelove ➜ infra git master ✗ docker system df type total active size reclaimable images containers local volumes build cache the docker daemon s log here logs begin at wed cst end at sun cst bogon dockerd time level debug msg calling head ping bogon dockerd time level debug msg calling post build buildargs buildid cachefrom cgroupparent cpuperiod cpuquota cpusetcpus cpusetmems cpushares dockerfile labels memory memswap networkmode default nocache remote client session rm session shmsize t local target ulimits null version bogon dockerd time level debug msg calling post session bogon dockerd time level info msg parsed scheme module grpc bogon dockerd time level info msg scheme not registered fallback to default scheme module grpc bogon dockerd time level info msg ccresolverwrapper sending update to cc module grpc bogon dockerd time level info msg clientconn switching balancer to pick first module grpc bogon dockerd time level debug msg reusing ref for local bogon dockerd time level debug msg reusing ref for local bogon dockerd time level debug msg diffcopy took bogon dockerd time level debug msg diffcopy took bogon dockerd time level debug msg saved as local sharedkey dockerfile dockerfile bogon dockerd time level debug msg saved as local sharedkey context context dockerignore bogon dockerd time level debug msg resolving host registry docker io bogon dockerd time level debug msg do request host registry docker io request header accept application vnd docker distribution manifest json application vnd docker distribution manifest list json application vnd oci image manifest json application vnd oci image index json request header user agent containerd unknown request method head url bogon dockerd time level debug msg fetch response received host registry docker io response header content length response header content type application json response header date sat apr gmt response header docker distribution api version registry response header strict transport security max age response header www authenticate bearer realm response status unauthorized url bogon dockerd time level debug msg unauthorized header bearer realm host registry docker io bogon dockerd time level debug msg do request host registry docker io request header accept application vnd docker distribution manifest json application vnd docker distribution manifest list json application vnd oci image manifest json application vnd oci image index json request header user agent containerd unknown request method head url bogon dockerd time level debug msg fetch response received host registry docker io response header content length response header content type application vnd docker distribution manifest list json response header date sat apr gmt response header docker content digest response header docker distribution api version registry response header etag response header strict transport security max age response status ok url bogon dockerd time level debug msg resolved desc digest host registry docker io bogon dockerd time level debug msg fetch digest mediatype application vnd docker distribution manifest list json size bogon dockerd time level debug msg fetch digest mediatype application vnd docker distribution manifest json size bogon dockerd time level debug msg fetch digest mediatype application vnd docker container image json size bogon dockerd time level debug msg load cache for from docker io library alpine with moby bogon dockerd time level warning msg grpc addrconn createtransport failed to connect to err connection error desc transport error while dialing only one connection allowed reconnecting module grpc output of docker version moelove ➜ docker version client docker engine community version api version go version git commit built tue apr os arch linux experimental true server docker engine community engine version api version minimum version go version git commit built tue apr os arch linux experimental true containerd version gitcommit runc version gitcommit docker init version gitcommit output of docker info moelove ➜ docker info client debug mode false plugins app docker app docker inc buildx build with buildkit docker inc tp docker year a docker plugin happy new year jintao zhang server containers running paused stopped images server version storage driver backing filesystem extfs supports d type true native overlay diff true logging driver json file cgroup driver systemd plugins volume local network bridge host ipvlan macvlan null overlay log awslogs fluentd gcplogs gelf journald json file local logentries splunk syslog swarm inactive runtimes runc default runtime runc init binary docker init containerd version runc version init version security options seccomp profile default kernel version operating system fedora workstation edition ostype linux architecture cpus total memory name bogon id xxxxxxxx docker root dir var lib docker debug mode true file descriptors goroutines system time eventslisteners http proxy https proxy no proxy localhost registry labels experimental true insecure registries live restore enabled true additional environment details aws virtualbox physical etc physical
0
180,314
21,625,666,277
IssuesEvent
2022-05-05 01:32:45
kapseliboi/nestjs-objection
https://api.github.com/repos/kapseliboi/nestjs-objection
opened
CVE-2022-0155 (Medium) detected in follow-redirects-1.14.5.tgz
security vulnerability
## CVE-2022-0155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.14.5.tgz</b></p></summary> <p>HTTP and HTTPS modules that follow redirects.</p> <p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.14.5.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.14.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/follow-redirects/package.json</p> <p> Dependency Hierarchy: - common-8.2.6.tgz (Root Library) - axios-0.24.0.tgz - :x: **follow-redirects-1.14.5.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor <p>Publish Date: 2022-01-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0155>CVE-2022-0155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/">https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/</a></p> <p>Release Date: 2022-01-10</p> <p>Fix Resolution (follow-redirects): 1.14.7</p> <p>Direct dependency fix Resolution (@nestjs/common): 8.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-0155 (Medium) detected in follow-redirects-1.14.5.tgz - ## CVE-2022-0155 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>follow-redirects-1.14.5.tgz</b></p></summary> <p>HTTP and HTTPS modules that follow redirects.</p> <p>Library home page: <a href="https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.14.5.tgz">https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.14.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/follow-redirects/package.json</p> <p> Dependency Hierarchy: - common-8.2.6.tgz (Root Library) - axios-0.24.0.tgz - :x: **follow-redirects-1.14.5.tgz** (Vulnerable Library) <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> follow-redirects is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor <p>Publish Date: 2022-01-10 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0155>CVE-2022-0155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/">https://huntr.dev/bounties/fc524e4b-ebb6-427d-ab67-a64181020406/</a></p> <p>Release Date: 2022-01-10</p> <p>Fix Resolution (follow-redirects): 1.14.7</p> <p>Direct dependency fix Resolution (@nestjs/common): 8.3.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in follow redirects tgz cve medium severity vulnerability vulnerable library follow redirects tgz http and https modules that follow redirects library home page a href path to dependency file package json path to vulnerable library node modules follow redirects package json dependency hierarchy common tgz root library axios tgz x follow redirects tgz vulnerable library found in base branch main vulnerability details follow redirects is vulnerable to exposure of private personal information to an unauthorized actor publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution follow redirects direct dependency fix resolution nestjs common step up your open source security game with whitesource
0
308,352
26,602,012,545
IssuesEvent
2023-01-23 16:23:49
mantidproject/mantid
https://api.github.com/repos/mantidproject/mantid
closed
Manual Testing ISIS Indirect interfaces
Manual Tests
You have been assigned manual testing. The hope is to catch as many problems with the code before release, so it would be great if you can take some time to give a serious test to your assigned area. Thank you!! The general guide to manual testing: * The tests must be performed on the installer versions of the final release candidate. Not on local compiled code. * Serious errors involving loss of functionality, crashes etc. should be raised as issues with the current release as a milestone and an email sent to the project manager immediately. * Minor and cosmetic issues should be raised as issues against the forthcoming releases. * First try things that should work, then try to break Mantid, e.g. entering invalid values, unexpected characters etc. * Don't spend more than a few hours on the testing as fatigue will kick in. * If you find errors in the documentation, please correct them. * Comment against this ticket the OS environment you are testing against. * Close the this issue once you are done. ### Specific Notes: Follow the directions at: https://developer.mantidproject.org/Testing/IndirectInelastic/IndirectInelasticAcceptanceTests.html
1.0
Manual Testing ISIS Indirect interfaces - You have been assigned manual testing. The hope is to catch as many problems with the code before release, so it would be great if you can take some time to give a serious test to your assigned area. Thank you!! The general guide to manual testing: * The tests must be performed on the installer versions of the final release candidate. Not on local compiled code. * Serious errors involving loss of functionality, crashes etc. should be raised as issues with the current release as a milestone and an email sent to the project manager immediately. * Minor and cosmetic issues should be raised as issues against the forthcoming releases. * First try things that should work, then try to break Mantid, e.g. entering invalid values, unexpected characters etc. * Don't spend more than a few hours on the testing as fatigue will kick in. * If you find errors in the documentation, please correct them. * Comment against this ticket the OS environment you are testing against. * Close the this issue once you are done. ### Specific Notes: Follow the directions at: https://developer.mantidproject.org/Testing/IndirectInelastic/IndirectInelasticAcceptanceTests.html
non_priority
manual testing isis indirect interfaces you have been assigned manual testing the hope is to catch as many problems with the code before release so it would be great if you can take some time to give a serious test to your assigned area thank you the general guide to manual testing the tests must be performed on the installer versions of the final release candidate not on local compiled code serious errors involving loss of functionality crashes etc should be raised as issues with the current release as a milestone and an email sent to the project manager immediately minor and cosmetic issues should be raised as issues against the forthcoming releases first try things that should work then try to break mantid e g entering invalid values unexpected characters etc don t spend more than a few hours on the testing as fatigue will kick in if you find errors in the documentation please correct them comment against this ticket the os environment you are testing against close the this issue once you are done specific notes follow the directions at
0
71,779
15,207,925,325
IssuesEvent
2021-02-17 01:20:53
billmcchesney1/hadoop
https://api.github.com/repos/billmcchesney1/hadoop
opened
CVE-2019-20444 (High) detected in netty-all-4.1.42.Final.jar
security vulnerability
## CVE-2019-20444 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-all-4.1.42.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to vulnerable library: hadoop/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-timelineservice-hbase/hadoop-yarn-server-timelineservice-hbase-client/target/lib/netty-all-4.1.42.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-all-4.1.42.Final.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/hadoop/commit/6dcd8400219941dcbd7fb0f6b980cc2c6a2a6b0a">6dcd8400219941dcbd7fb0f6b980cc2c6a2a6b0a</a></p> <p>Found in base branch: <b>trunk</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold." <p>Publish Date: 2020-01-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20444>CVE-2019-20444</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444</a></p> <p>Release Date: 2020-01-29</p> <p>Fix Resolution: io.netty:netty-codec-http:4.1.44</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-all","packageVersion":"4.1.42.Final","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"io.netty:netty-all:4.1.42.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.44"}],"baseBranches":["trunk"],"vulnerabilityIdentifier":"CVE-2019-20444","vulnerabilityDetails":"HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an \"invalid fold.\"","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20444","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-20444 (High) detected in netty-all-4.1.42.Final.jar - ## CVE-2019-20444 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>netty-all-4.1.42.Final.jar</b></p></summary> <p>Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers and clients.</p> <p>Library home page: <a href="https://netty.io/">https://netty.io/</a></p> <p>Path to vulnerable library: hadoop/hadoop-yarn-project/hadoop-yarn/hadoop-yarn-server/hadoop-yarn-server-timelineservice-hbase/hadoop-yarn-server-timelineservice-hbase-client/target/lib/netty-all-4.1.42.Final.jar</p> <p> Dependency Hierarchy: - :x: **netty-all-4.1.42.Final.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/hadoop/commit/6dcd8400219941dcbd7fb0f6b980cc2c6a2a6b0a">6dcd8400219941dcbd7fb0f6b980cc2c6a2a6b0a</a></p> <p>Found in base branch: <b>trunk</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold." <p>Publish Date: 2020-01-29 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20444>CVE-2019-20444</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-20444</a></p> <p>Release Date: 2020-01-29</p> <p>Fix Resolution: io.netty:netty-codec-http:4.1.44</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"io.netty","packageName":"netty-all","packageVersion":"4.1.42.Final","packageFilePaths":[],"isTransitiveDependency":false,"dependencyTree":"io.netty:netty-all:4.1.42.Final","isMinimumFixVersionAvailable":true,"minimumFixVersion":"io.netty:netty-codec-http:4.1.44"}],"baseBranches":["trunk"],"vulnerabilityIdentifier":"CVE-2019-20444","vulnerabilityDetails":"HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an \"invalid fold.\"","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-20444","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in netty all final jar cve high severity vulnerability vulnerable library netty all final jar netty is an asynchronous event driven network application framework for rapid development of maintainable high performance protocol servers and clients library home page a href path to vulnerable library hadoop hadoop yarn project hadoop yarn hadoop yarn server hadoop yarn server timelineservice hbase hadoop yarn server timelineservice hbase client target lib netty all final jar dependency hierarchy x netty all final jar vulnerable library found in head commit a href found in base branch trunk vulnerability details httpobjectdecoder java in netty before allows an http header that lacks a colon which might be interpreted as a separate header with an incorrect syntax or might be interpreted as an invalid fold publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io netty netty codec http rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree io netty netty all final isminimumfixversionavailable true minimumfixversion io netty netty codec http basebranches vulnerabilityidentifier cve vulnerabilitydetails httpobjectdecoder java in netty before allows an http header that lacks a colon which might be interpreted as a separate header with an incorrect syntax or might be interpreted as an invalid fold vulnerabilityurl
0
303,936
26,240,122,808
IssuesEvent
2023-01-05 10:46:34
centrifuge/centrifuge-chain
https://api.github.com/repos/centrifuge/centrifuge-chain
closed
Benchmarks for `pallet-investments`
I4-tests Q5-hard P5-soon crcl-runtime
Implement appropriate benchmarks for the pallet and use the generated weights in the pallet calls logic.
1.0
Benchmarks for `pallet-investments` - Implement appropriate benchmarks for the pallet and use the generated weights in the pallet calls logic.
non_priority
benchmarks for pallet investments implement appropriate benchmarks for the pallet and use the generated weights in the pallet calls logic
0
258,890
27,589,166,768
IssuesEvent
2023-03-08 22:29:23
smallwat3r/shhh
https://api.github.com/repos/smallwat3r/shhh
closed
CVE-2023-23931 (Medium) detected in cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl - autoclosed
Mend: dependency security vulnerability
## CVE-2023-23931 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl</b></p></summary> <p>cryptography is a package which provides cryptographic recipes and primitives to Python developers.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/7b/1a/bf49bade5080a5cfb226a975c118fc56c3df2878b91809a5030dd87e551b/cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl">https://files.pythonhosted.org/packages/7b/1a/bf49bade5080a5cfb226a975c118fc56c3df2878b91809a5030dd87e551b/cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/smallwat3r/shhh/commit/9d9183dfe6b39e1fa47ec2acd9fb196a3ebbe095">9d9183dfe6b39e1fa47ec2acd9fb196a3ebbe095</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. <p>Publish Date: 2023-02-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-23931>CVE-2023-23931</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2023-23931">https://www.cve.org/CVERecord?id=CVE-2023-23931</a></p> <p>Release Date: 2023-02-07</p> <p>Fix Resolution: cryptography - 39.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2023-23931 (Medium) detected in cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl - autoclosed - ## CVE-2023-23931 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl</b></p></summary> <p>cryptography is a package which provides cryptographic recipes and primitives to Python developers.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/7b/1a/bf49bade5080a5cfb226a975c118fc56c3df2878b91809a5030dd87e551b/cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl">https://files.pythonhosted.org/packages/7b/1a/bf49bade5080a5cfb226a975c118fc56c3df2878b91809a5030dd87e551b/cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl</a></p> <p>Path to dependency file: /requirements.txt</p> <p>Path to vulnerable library: /requirements.txt</p> <p> Dependency Hierarchy: - :x: **cryptography-35.0.0-cp36-abi3-manylinux_2_24_x86_64.whl** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/smallwat3r/shhh/commit/9d9183dfe6b39e1fa47ec2acd9fb196a3ebbe095">9d9183dfe6b39e1fa47ec2acd9fb196a3ebbe095</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8. <p>Publish Date: 2023-02-07 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-23931>CVE-2023-23931</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2023-23931">https://www.cve.org/CVERecord?id=CVE-2023-23931</a></p> <p>Release Date: 2023-02-07</p> <p>Fix Resolution: cryptography - 39.0.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in cryptography manylinux whl autoclosed cve medium severity vulnerability vulnerable library cryptography manylinux whl cryptography is a package which provides cryptographic recipes and primitives to python developers library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x cryptography manylinux whl vulnerable library found in head commit a href found in base branch master vulnerability details cryptography is a package designed to expose cryptographic primitives and recipes to python developers in affected versions cipher update into would accept python objects which implement the buffer protocol but provide only immutable buffers this would allow immutable objects such as bytes to be mutated thus violating fundamental rules of python and resulting in corrupted output this now correctly raises an exception this issue has been present since update into was originally introduced in cryptography publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution cryptography step up your open source security game with mend
0
127,806
18,024,329,083
IssuesEvent
2021-09-17 01:03:09
turkdevops/update-electron-app
https://api.github.com/repos/turkdevops/update-electron-app
opened
CVE-2020-28499 (High) detected in merge-1.2.1.tgz
security vulnerability
## CVE-2020-28499 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-1.2.1.tgz</b></p></summary> <p>Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge/-/merge-1.2.1.tgz">https://registry.npmjs.org/merge/-/merge-1.2.1.tgz</a></p> <p>Path to dependency file: update-electron-app/package.json</p> <p>Path to vulnerable library: update-electron-app/node_modules/merge/package.json</p> <p> Dependency Hierarchy: - jest-22.4.4.tgz (Root Library) - jest-cli-22.4.4.tgz - jest-haste-map-22.4.3.tgz - sane-2.5.2.tgz - exec-sh-0.2.2.tgz - :x: **merge-1.2.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package merge are vulnerable to Prototype Pollution via _recursiveMerge . <p>Publish Date: 2021-02-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28499>CVE-2020-28499</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/yeikos/js.merge/pull/38">https://github.com/yeikos/js.merge/pull/38</a></p> <p>Release Date: 2021-02-18</p> <p>Fix Resolution: merge - 2.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-28499 (High) detected in merge-1.2.1.tgz - ## CVE-2020-28499 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-1.2.1.tgz</b></p></summary> <p>Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge/-/merge-1.2.1.tgz">https://registry.npmjs.org/merge/-/merge-1.2.1.tgz</a></p> <p>Path to dependency file: update-electron-app/package.json</p> <p>Path to vulnerable library: update-electron-app/node_modules/merge/package.json</p> <p> Dependency Hierarchy: - jest-22.4.4.tgz (Root Library) - jest-cli-22.4.4.tgz - jest-haste-map-22.4.3.tgz - sane-2.5.2.tgz - exec-sh-0.2.2.tgz - :x: **merge-1.2.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> All versions of package merge are vulnerable to Prototype Pollution via _recursiveMerge . <p>Publish Date: 2021-02-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28499>CVE-2020-28499</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/yeikos/js.merge/pull/38">https://github.com/yeikos/js.merge/pull/38</a></p> <p>Release Date: 2021-02-18</p> <p>Fix Resolution: merge - 2.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in merge tgz cve high severity vulnerability vulnerable library merge tgz merge multiple objects into one optionally creating a new cloned object similar to the jquery extend but more flexible works in node js and the browser library home page a href path to dependency file update electron app package json path to vulnerable library update electron app node modules merge package json dependency hierarchy jest tgz root library jest cli tgz jest haste map tgz sane tgz exec sh tgz x merge tgz vulnerable library found in base branch master vulnerability details all versions of package merge are vulnerable to prototype pollution via recursivemerge publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution merge step up your open source security game with whitesource
0
135,667
12,689,191,913
IssuesEvent
2020-06-21 04:14:18
RespiraWorks/SystemDesign
https://api.github.com/repos/RespiraWorks/SystemDesign
closed
CVD - Venturi "Custom Components" Section
Documentation
1 page Description and Assembly Instructions CAD File Plan for injection molding https://docs.google.com/document/d/1wSYof_d_WnFvfAGxjNq9vY3AhY8o4VpuVuHDv58NDv8/edit#heading=h.cicffg7tb2l6
1.0
CVD - Venturi "Custom Components" Section - 1 page Description and Assembly Instructions CAD File Plan for injection molding https://docs.google.com/document/d/1wSYof_d_WnFvfAGxjNq9vY3AhY8o4VpuVuHDv58NDv8/edit#heading=h.cicffg7tb2l6
non_priority
cvd venturi custom components section page description and assembly instructions cad file plan for injection molding
0
56,017
31,494,859,694
IssuesEvent
2023-08-31 00:54:26
pulp/pulpcore
https://api.github.com/repos/pulp/pulpcore
closed
Pulpcore 3.25+ is 2x slower
Performance Issue
**Version** 3.25+ **Describe the bug** API responses are taking twice as long on pulpcore 3.25+ **To Reproduce** I tested this using the `ghcr.io/pulp/pulp` container image. Ran the following tests on pulpcore 3.23-3.26: - time curl -u admin:password http://localhost:8090/pulp/api/v3/status/ - time curl -u admin:password http://localhost:8090/pulp/api/v3/repositories/ - time curl -u admin:password http://localhost:8090/pulp/api/v3/distributions/ - time curl -u admin:password http://localhost:8090/pulp/api/v3/access_policies/ Here are the results (times are for the respective API calls listed above) ``` pulp 3.26 .046 .376 .378 .406 pulp 3.25 .057 .421 .408 .387 pulp 3.24 .044 .188 .191 .206 pulp 3.23 .069 .239 .214 .212 ``` **Expected behavior** There shouldn't be such a significant decrease in overall performance for newer versions of pulp.
True
Pulpcore 3.25+ is 2x slower - **Version** 3.25+ **Describe the bug** API responses are taking twice as long on pulpcore 3.25+ **To Reproduce** I tested this using the `ghcr.io/pulp/pulp` container image. Ran the following tests on pulpcore 3.23-3.26: - time curl -u admin:password http://localhost:8090/pulp/api/v3/status/ - time curl -u admin:password http://localhost:8090/pulp/api/v3/repositories/ - time curl -u admin:password http://localhost:8090/pulp/api/v3/distributions/ - time curl -u admin:password http://localhost:8090/pulp/api/v3/access_policies/ Here are the results (times are for the respective API calls listed above) ``` pulp 3.26 .046 .376 .378 .406 pulp 3.25 .057 .421 .408 .387 pulp 3.24 .044 .188 .191 .206 pulp 3.23 .069 .239 .214 .212 ``` **Expected behavior** There shouldn't be such a significant decrease in overall performance for newer versions of pulp.
non_priority
pulpcore is slower version describe the bug api responses are taking twice as long on pulpcore to reproduce i tested this using the ghcr io pulp pulp container image ran the following tests on pulpcore time curl u admin password time curl u admin password time curl u admin password time curl u admin password here are the results times are for the respective api calls listed above pulp pulp pulp pulp expected behavior there shouldn t be such a significant decrease in overall performance for newer versions of pulp
0
307
2,513,756,356
IssuesEvent
2015-01-15 02:40:23
progrium/dokku
https://api.github.com/repos/progrium/dokku
closed
It looks like docker is a dependency
documentation
It would be great if the readme had a link to the docker install page or something.
1.0
It looks like docker is a dependency - It would be great if the readme had a link to the docker install page or something.
non_priority
it looks like docker is a dependency it would be great if the readme had a link to the docker install page or something
0
219,707
24,524,435,696
IssuesEvent
2022-10-11 12:06:46
MatBenfield/news
https://api.github.com/repos/MatBenfield/news
closed
[SecurityWeek] German Cybersecurity Chief to be Sacked Over Alleged Russia Ties: Sources
SecurityWeek Stale
**Germany is planning to fire Arne Schoenbohm, the head of the BSI national cyber security agency, after reports he had contacts with Russian intelligence services, government sources told AFP on Monday.** The interior ministry said it is "taking reports seriously" and "investigating them comprehensively". [read more](https://www.securityweek.com/german-cybersecurity-chief-be-sacked-over-alleged-russia-ties-sources) <https://www.securityweek.com/german-cybersecurity-chief-be-sacked-over-alleged-russia-ties-sources>
True
[SecurityWeek] German Cybersecurity Chief to be Sacked Over Alleged Russia Ties: Sources - **Germany is planning to fire Arne Schoenbohm, the head of the BSI national cyber security agency, after reports he had contacts with Russian intelligence services, government sources told AFP on Monday.** The interior ministry said it is "taking reports seriously" and "investigating them comprehensively". [read more](https://www.securityweek.com/german-cybersecurity-chief-be-sacked-over-alleged-russia-ties-sources) <https://www.securityweek.com/german-cybersecurity-chief-be-sacked-over-alleged-russia-ties-sources>
non_priority
german cybersecurity chief to be sacked over alleged russia ties sources germany is planning to fire arne schoenbohm the head of the bsi national cyber security agency after reports he had contacts with russian intelligence services government sources told afp on monday the interior ministry said it is taking reports seriously and investigating them comprehensively
0
68,216
13,096,608,133
IssuesEvent
2020-08-03 15:57:52
flutter/flutter
https://api.github.com/repos/flutter/flutter
reopened
Run with flavor doesn't use flavor app name in Xcode 12
e: OS Version specific platform-ios t: xcode tool
<!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a bug or if our documentation doesn't have an answer to what you're looking for, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> Hello to all maintainers of flutter. I was trying to run my app on iOS 14 to see how it will handle the OS change and I have noticed an issue. I use flavors to launch my app, so I launch flutter run with the --flavor option, and it build successfully (with the Xcode 12 Beta CLI set) but when it goes to the simulator installation steps, I have the following error `Could not find the built application bundle at build/ios/iphonesimulator/Runner.app. Error launching application on iPhone 11.` The use of the flavors make the xcode cli generates the app with the right flavors name but at the installation step, it search for Runner.app when it should search for FlavorAppName.app ## Steps to Reproduce <!-- Please tell us exactly how to reproduce the problem you are running into. --> 1. Setup a Flutter project with Xcode Scheme and flutter flavors 2. flutter run --flavor <flavor> -t lib/flavor_main.dart 3. see the error ## Logs <!-- Include the full logs of the commands you are running between the lines with the backticks below. If you are running any "flutter" commands, please include the output of running them with "--verbose"; for example, the output of running "flutter --verbose create foo". --> <details> <summary>logs</summary> ``` export MTL_ENABLE_DEBUG_INFO\=YES export NATIVE_ARCH\=x86_64 export NATIVE_ARCH_32_BIT\=i386 export NATIVE_ARCH_64_BIT\=x86_64 export NATIVE_ARCH_ACTUAL\=x86_64 export NO_COMMON\=YES export OBJC_ABI_VERSION\=2 export OBJECT_FILE_DIR\=/Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects export OBJECT_FILE_DIR_normal\=/Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects-normal export OBJROOT\=/Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex export ONLY_ACTIVE_ARCH\=YES export OS\=MACOS export OSAC\=/usr/bin/osacompile export OTHER_LDFLAGS\=\ -framework\ Flutter\ -ObjC\ -l\"c++\"\ -l\"sqlite3\"\ -l\"stdc++\"\ -l\"z\"\ -framework\ \"AppAuth\"\ -framework\ \"CoreGraphics\"\ -framework\ \"CoreTelephony\"\ -framework\ \"CoreText\"\ -framework\ \"Crashlytics\"\ -framework\ \"FBLPromises\"\ -framework\ \"FBSDKCoreKit\"\ -framework\ \"FBSDKLoginKit\"\ -framework\ \"FIRAnalyticsConnector\"\ -framework\ \"Fabric\"\ -framework\ \"FirebaseABTesting\"\ -framework\ \"FirebaseAnalytics\"\ -framework\ \"FirebaseAuth\"\ -framework\ \"FirebaseCore\"\ -framework\ \"FirebaseCoreDiagnostics\"\ -framework\ \"FirebaseFirestore\"\ -framework\ \"FirebaseInstallations\"\ -framework\ \"Flutter\"\ -framework\ \"Foundation\"\ -framework\ \"GTMAppAuth\"\ -framework\ \"GTMSessionFetcher\"\ -framework\ \"GoogleAppMeasurement\"\ -framework\ \"GoogleDataTransport\"\ -framework\ \"GoogleDataTransportCCTSupport\"\ -framework\ \"GoogleSignIn\"\ -framework\ \"GoogleUtilities\"\ -framework\ \"LocalAuthentication\"\ -framework\ \"MobileCoreServices\"\ -framework\ \"Protobuf\"\ -framework\ \"Reachability\"\ -framework\ \"SafariServices\"\ -framework\ \"Security\"\ -framework\ \"StoreKit\"\ -framework\ \"SystemConfiguration\"\ -framework\ \"UIKit\"\ -framework\ \"absl\"\ -framework\ \"cloud_firestore\"\ -framework\ \"connectivity\"\ -framework\ \"firebase_analytics\"\ -framework\ \"firebase_auth\"\ -framework\ \"firebase_core\"\ -framework\ \"firebase_crashlytics\"\ -framework\ \"flutter_facebook_login\"\ -framework\ \"google_sign_in\"\ -framework\ \"grpc\"\ -framework\ \"grpcpp\"\ -framework\ \"leveldb\"\ -framework\ \"nanopb\"\ -framework\ \"openssl_grpc\"\ -framework\ \"path_provider\"\ -framework\ \"shared_preferences\"\ -weak_framework\ \"Accelerate\"\ -weak_framework\ \"Accounts\"\ -weak_framework\ \"AudioToolbox\"\ -weak_framework\ \"AuthenticationServices\"\ -weak_framework\ \"CoreGraphics\"\ -weak_framework\ \"CoreLoca EXECUTABLES_FOLDER_PATH = Tallam Testing.app/Executables EXECUTABLE_FOLDER_PATH = Tallam Testing.app EXECUTABLE_NAME = Tallam Testing EXECUTABLE_PATH = Tallam Testing.app/Tallam Testing EXPANDED_CODE_SIGN_IDENTITY = EXPANDED_CODE_SIGN_IDENTITY_NAME = EXPANDED_PROVISIONING_PROFILE = FILE_LIST = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects/LinkFileList FIXED_FILES_DIR = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/FixedFiles FLUTTER_APPLICATION_PATH = /Users/brandonguigo/tallam/app FLUTTER_BUILD_DIR = build FLUTTER_BUILD_NAME = 1.0.0 FLUTTER_BUILD_NUMBER = 1 FLUTTER_FRAMEWORK_DIR = /Users/brandonguigo/development/flutter/bin/cache/artifacts/engine/ios FLUTTER_ROOT = /Users/brandonguigo/development/flutter FLUTTER_SUPPRESS_ANALYTICS = true FLUTTER_TARGET = lib/main_staging.dart FRAMEWORKS_FOLDER_PATH = Tallam Testing.app/Frameworks FRAMEWORK_FLAG_PREFIX = -framework FRAMEWORK_SEARCH_PATHS = "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/AppAuth" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKCoreKit" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKLoginKit" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseABTesting" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseAuth" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCore" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCoreDiagnostics" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseFirestore" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseInstallations" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMAppAuth" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMSessionFetcher" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransport" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/PromisesObjC" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Protobuf" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Reachability" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/abseil" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/cloud_firestore" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/connectivity" "/Users/brandonguigo/t GCC_SYMBOLS_PRIVATE_EXTERN = NO GCC_TREAT_WARNINGS_AS_ERRORS = NO GCC_VERSION = com.apple.compilers.llvm.clang.1_0 GCC_VERSION_IDENTIFIER = com_apple_compilers_llvm_clang_1_0 GCC_WARN_64_TO_32_BIT_CONVERSION = YES GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR GCC_WARN_UNDECLARED_SELECTOR = YES GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE GCC_WARN_UNUSED_FUNCTION = YES GCC_WARN_UNUSED_VARIABLE = YES GENERATE_MASTER_OBJECT_FILE = NO GENERATE_PKGINFO_FILE = YES GENERATE_PROFILING_CODE = NO GENERATE_TEXT_BASED_STUBS = NO GID = 20 GROUP = staff HEADERMAP_INCLUDES_FLAT_ENTRIES_FOR_TARGET_BEING_BUILT = YES HEADERMAP_INCLUDES_FRAMEWORK_ENTRIES_FOR_ALL_PRODUCT_TYPES = YES HEADERMAP_INCLUDES_NONPUBLIC_NONPRIVATE_HEADERS = YES HEADERMAP_INCLUDES_PROJECT_HEADERS = YES HEADERMAP_USES_FRAMEWORK_PREFIX_ENTRIES = YES HEADERMAP_USES_VFS = NO @ @ HEADER_SEARCH_PATHS = "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/AppAuth/AppAuth.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC/openssl_grpc.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKCoreKit/FBSDKCoreKit.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKLoginKit/FBSDKLoginKit.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseABTesting/FirebaseABTesting.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseAuth/FirebaseAuth.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCore/FirebaseCore.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCoreDiagnostics/FirebaseCoreDiagnostics.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseFirestore/FirebaseFirestore.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseInstallations/FirebaseInstallations.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMAppAuth/GTMAppAuth.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMSessionFetcher/GTMSessionFetcher.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransport/GoogleDataTransport.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities/GoogleUtilities.framework/Headers" "/Users/brand METAL_LIBRARY_FILE_BASE = default METAL_LIBRARY_OUTPUT_DIR = /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam Testing.app MODULES_FOLDER_PATH = Tallam Testing.app/Modules MODULE_CACHE_DIR = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/ModuleCache.noindex MTL_ENABLE_DEBUG_INFO = YES NATIVE_ARCH = x86_64 NATIVE_ARCH_32_BIT = i386 NATIVE_ARCH_64_BIT = x86_64 NATIVE_ARCH_ACTUAL = x86_64 NO_COMMON = YES OBJC_ABI_VERSION = 2 OBJECT_FILE_DIR = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects OBJECT_FILE_DIR_normal = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects-normal OBJROOT = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex ONLY_ACTIVE_ARCH = YES OS = MACOS OSAC = /usr/bin/osacompile OTHER_LDFLAGS = -ObjC -l"c++" -l"sqlite3" -l"stdc++" -l"z" -framework "AppAuth" -framework "CoreGraphics" -framework "CoreTelephony" -framework "CoreText" -framework "Crashlytics" -framework "FBLPromises" -framework "FBSDKCoreKit" -framework "FBSDKLoginKit" -framework "FIRAnalyticsConnector" -framework "Fabric" -framework "FirebaseABTesting" -framework "FirebaseAnalytics" -framework "FirebaseAuth" -framework "FirebaseCore" -framework "FirebaseCoreDiagnostics" -framework "FirebaseFirestore" -framework "FirebaseInstallations" -framework "Flutter" -framework "Foundation" -framework "GTMAppAuth" -framework "GTMSessionFetcher" -framework "GoogleAppMeasurement" -framework "GoogleDataTransport" -framework "GoogleDataTransportCCTSupport" -framework "GoogleSignIn" -framework "GoogleUtilities" -framework "LocalAuthentication" -framework "MobileCoreServices" -framework "Protobuf" -framework "Reachability" -framework "SafariServices" -framework "Security" -framework "StoreKit" -framework "SystemConfiguration" -framework "UIKit" -framework "absl" -framework "cloud_firestore" -framework "connectivity" -framework "firebase_analytics" -framework "firebase_auth" -framework "firebase_core" -framework "firebase_crashlytics" -framework "flutter_facebook_login" -framework "google_sign_in" -framework "grpc" -framework "grpcpp" -framework "leveldb" -framework "nanopb" -framework "openssl_grpc" -framework "path_provider" -framework "shared_preferences" -weak_framework "Accelerate" -weak_framework "Accounts" -weak_framework "AudioToolbox" -weak_framework "AuthenticationServices" -weak_framework "CoreGraphics" -weak_framework "CoreLocation" -weak_framework "Foundation" -weak_framework "QuartzCore" -weak_framework "Security" -weak_framework "Social" -weak_framework "UIKit" PACKAGE_TYPE = com.apple.package-type.wrapper.application PACKAGE_TYPE = com.apple.package-type.wrapper.application PASCAL_STRINGS = YES PATH = /Applications/Xcode-beta.app/Contents/Developer/usr/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES = /usr/include /usr/local/include /System/Library/Frameworks /System/Library/PrivateFrameworks /Applications/Xcode-beta.app/Contents/Developer/Headers /Applications/Xcode-beta.app/Contents/Developer/SDKs /Applications/Xcode-beta.app/Contents/Developer/Platforms PBDEVELOPMENTPLIST_PATH = Tallam Testing.app/pbdevelopment.plist PFE_FILE_C_DIALECTS = objective-c PKGINFO_FILE_PATH = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/PkgInfo PKGINFO_PATH = Tallam Testing.app/PkgInfo PLATFORM_DEVELOPER_APPLICATIONS_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/Applications PLATFORM_DEVELOPER_BIN_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin PLATFORM_DEVELOPER_LIBRARY_DIR = /Applications/Xcode-beta.app/Contents/PlugIns/Xcode3Core.ideplugin/Contents/SharedSupport/Developer/Library @ HIDE_BITCODE_SYMBOLS = YES HOME = /Users/brandonguigo ICONV = /usr/bin/iconv INFOPLIST_EXPAND_BUILD_SETTINGS = YES INFOPLIST_FILE = Runner/Info.plist INFOPLIST_OUTPUT_FORMAT = binary INFOPLIST_PATH = Tallam Testing.app/Info.plist INFOPLIST_PREPROCESS = NO INFOSTRINGS_PATH = Tallam Testing.app/en.lproj/InfoPlist.strings INLINE_PRIVATE_FRAMEWORKS = NO INSTALLHDRS_COPY_PHASE = NO INSTALLHDRS_SCRIPT_PHASE = NO INSTALL_DIR = /tmp/Runner.dst/Applications INSTALL_GROUP = staff INSTALL_MODE_FLAG = u+w,go-w,a+rX INSTALL_OWNER = brandonguigo INSTALL_PATH = /Applications INSTALL_ROOT = /tmp/Runner.dst IPHONEOS_DEPLOYMENT_TARGET = 11.0 JAVAC_DEFAULT_FLAGS = -J-Xms64m -J-XX:NewSize=4M -J-Dfile.encoding=UTF8 JAVA_APP_STUB = /System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub JAVA_ARCHIVE_CLASSES = YES FRAMEWORK_VERSION = A FULL_PRODUCT_NAME = Tallam Testing.app GCC3_VERSION = 3.3 GCC_C_LANGUAGE_STANDARD = gnu99 GCC_DYNAMIC_NO_PIC = NO GCC_INLINES_ARE_PRIVATE_EXTERN = YES GCC_NO_COMMON_BLOCKS = YES GCC_OBJC_LEGACY_DISPATCH = YES GCC_OPTIMIZATION_LEVEL = 0 GCC_PFE_FILE_C_DIALECTS = c objective-c c++ objective-c++ GCC_PREPROCESSOR_DEFINITIONS = DEBUG=1 COCOAPODS=1 DEBUG=1 FBSDKCOCOAPODS=1 DEBUG=1 GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS=1 DEBUG=1 PB_FIELD_32BIT=1 PB_NO_PACKED_STRUCTS=1 PB_ENABLE_MALLOC=1 GCC_SYMBOLS_PRIVATE_EXTERN = NO GCC_TREAT_WARNINGS_AS_ERRORS = NO GCC_VERSION = com.apple.compilers.llvm.clang.1_0 GCC_VERSION_IDENTIFIER = com_apple_compilers_llvm_clang_1_0 GCC_WARN_64_TO_32_BIT_CONVERSION = YES GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR GCC_WARN_UNDECLARED_SELECTOR = YES GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE GCC_WARN_UNUSED_FUNCTION = YES GCC_WARN_UNUSED_VARIABLE = YES GENERATE_MASTER_OBJECT_FILE = NO export PACKAGE_TYPE\=com.apple.package-type.wrapper.application export PASCAL_STRINGS\=YES export PATH\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/libexec:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/local/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin export PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES\=/usr/include\ /usr/local/include\ /System/Library/Frameworks\ /System/Library/PrivateFrameworks\ /Applications/Xcode-beta.app/Contents/Developer/Headers\ /Applications/Xcode-beta.app/Contents/Developer/SDKs\ /Applications/Xcode-beta.app/Contents/Developer/Platforms export PBDEVELOPMENTPLIST_PATH\=Tallam\ Testing.app/pbdevelopment.plist @ @ export HIDE_BITCODE_SYMBOLS\=YES export HOME\=/Users/brandonguigo export ICONV\=/usr/bin/iconv export INFOPLIST_EXPAND_BUILD_SETTINGS\=YES export INFOPLIST_FILE\=Runner/Info.plist export INFOPLIST_OUTPUT_FORMAT\=binary export INFOPLIST_PATH\=Tallam\ Testing.app/Info.plist export INFOPLIST_PREPROCESS\=NO export INFOSTRINGS_PATH\=Tallam\ Testing.app/en.lproj/InfoPlist.strings export INLINE_PRIVATE_FRAMEWORKS\=NO export INSTALLHDRS_COPY_PHASE\=NO export INSTALLHDRS_SCRIPT_PHASE\=NO export INSTALL_DIR\=/tmp/Runner.dst/Applications export INSTALL_GROUP\=staff export INSTALL_MODE_FLAG\=u+w,go-w,a+rX export INSTALL_OWNER\=brandonguigo export INSTALL_PATH\=/Applications export INSTALL_ROOT\=/tmp/Runner.dst export IPHONEOS_DEPLOYMENT_TARGET\=11.0 export JAVAC_DEFAULT_FLAGS\=-J-Xms64m\ -J-XX:NewSize\=4M\ -J-Dfile.encoding\=UTF8 export JAVA_APP_STUB\=/System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub export FRAMEWORK_VERSION\=A export FULL_PRODUCT_NAME\=Tallam\ Testing.app export GCC3_VERSION\=3.3 export GCC_C_LANGUAGE_STANDARD\=gnu99 export GCC_DYNAMIC_NO_PIC\=NO export GCC_INLINES_ARE_PRIVATE_EXTERN\=YES export GCC_NO_COMMON_BLOCKS\=YES export GCC_OBJC_LEGACY_DISPATCH\=YES export GCC_OPTIMIZATION_LEVEL\=0 export GCC_PFE_FILE_C_DIALECTS\=c\ objective-c\ c++\ objective-c++ export GCC_PREPROCESSOR_DEFINITIONS\=DEBUG\=1\ \ COCOAPODS\=1\ DEBUG\=1\ \ FBSDKCOCOAPODS\=1\ DEBUG\=1\ \ GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS\=1\ DEBUG\=1\ \ PB_FIELD_32BIT\=1\ PB_NO_PACKED_STRUCTS\=1\ PB_ENABLE_MALLOC\=1 export GCC_SYMBOLS_PRIVATE_EXTERN\=NO export GCC_TREAT_WARNINGS_AS_ERRORS\=NO export GCC_VERSION\=com.apple.compilers.llvm.clang.1_0 export GCC_VERSION_IDENTIFIER\=com_apple_compilers_llvm_clang_1_0 export GCC_WARN_64_TO_32_BIT_CONVERSION\=YES export GCC_WARN_ABOUT_RETURN_TYPE\=YES_ERROR export GCC_WARN_UNDECLARED_SELECTOR\=YES export GCC_WARN_UNINITIALIZED_AUTOS\=YES_AGGRESSIVE export GCC_WARN_UNUSED_FUNCTION\=YES export GCC_WARN_UNUSED_VARIABLE\=YES export PACKAGE_TYPE\=com.apple.package-type.wrapper.application export PASCAL_STRINGS\=YES export PATH\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/libexec:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/local/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin export PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES\=/usr/include\ /usr/local/include\ /System/Library/Frameworks\ /System/Library/PrivateFrameworks\ /Applications/Xcode-beta.app/Contents/Developer/Headers\ /Applications/Xcode-beta.app/Contents/Developer/SDKs\ /Applications/Xcode-beta.app/Contents/Developer/Platforms export PBDEVELOPMENTPLIST_PATH\=Tallam\ Testing.app/pbdevelopment.plist @ @ export HIDE_BITCODE_SYMBOLS\=YES export HOME\=/Users/brandonguigo export ICONV\=/usr/bin/iconv export INFOPLIST_EXPAND_BUILD_SETTINGS\=YES export INFOPLIST_FILE\=Runner/Info.plist export INFOPLIST_OUTPUT_FORMAT\=binary export INFOPLIST_PATH\=Tallam\ Testing.app/Info.plist export INFOPLIST_PREPROCESS\=NO export INFOSTRINGS_PATH\=Tallam\ Testing.app/en.lproj/InfoPlist.strings export INLINE_PRIVATE_FRAMEWORKS\=NO export INSTALLHDRS_COPY_PHASE\=NO export INSTALLHDRS_SCRIPT_PHASE\=NO export INSTALL_DIR\=/tmp/Runner.dst/Applications export INSTALL_GROUP\=staff export INSTALL_MODE_FLAG\=u+w,go-w,a+rX export INSTALL_OWNER\=brandonguigo export INSTALL_PATH\=/Applications export INSTALL_ROOT\=/tmp/Runner.dst export IPHONEOS_DEPLOYMENT_TARGET\=11.0 export JAVAC_DEFAULT_FLAGS\=-J-Xms64m\ -J-XX:NewSize\=4M\ -J-Dfile.encoding\=UTF8 export JAVA_APP_STUB\=/System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub export FRAMEWORK_VERSION\=A export FULL_PRODUCT_NAME\=Tallam\ Testing.app export GCC3_VERSION\=3.3 export GCC_C_LANGUAGE_STANDARD\=gnu99 export GCC_DYNAMIC_NO_PIC\=NO export GCC_INLINES_ARE_PRIVATE_EXTERN\=YES export GCC_NO_COMMON_BLOCKS\=YES export GCC_OBJC_LEGACY_DISPATCH\=YES export GCC_OPTIMIZATION_LEVEL\=0 export GCC_PFE_FILE_C_DIALECTS\=c\ objective-c\ c++\ objective-c++ export GCC_PREPROCESSOR_DEFINITIONS\=DEBUG\=1\ \ COCOAPODS\=1\ DEBUG\=1\ \ FBSDKCOCOAPODS\=1\ DEBUG\=1\ \ GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS\=1\ DEBUG\=1\ \ PB_FIELD_32BIT\=1\ PB_NO_PACKED_STRUCTS\=1\ PB_ENABLE_MALLOC\=1 export GCC_SYMBOLS_PRIVATE_EXTERN\=NO export GCC_TREAT_WARNINGS_AS_ERRORS\=NO export GCC_VERSION\=com.apple.compilers.llvm.clang.1_0 export GCC_VERSION_IDENTIFIER\=com_apple_compilers_llvm_clang_1_0 export GCC_WARN_64_TO_32_BIT_CONVERSION\=YES export GCC_WARN_ABOUT_RETURN_TYPE\=YES_ERROR export GCC_WARN_UNDECLARED_SELECTOR\=YES export GCC_WARN_UNINITIALIZED_AUTOS\=YES_AGGRESSIVE export GCC_WARN_UNUSED_FUNCTION\=YES export GCC_WARN_UNUSED_VARIABLE\=YES ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/Info.plist /Users/brandonguigo/tallam/app/ios/Runner/Info.plist (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Runner/Info.plist -producttype com.apple.product-type.application -genpkginfo /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/PkgInfo -expandbuildsettings -format binary -platform iphonesimulator -additionalcontentfile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Base.lproj/LaunchScreen-SBPartialInfo.plist -additionalcontentfile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Base.lproj/Main-SBPartialInfo.plist -additionalcontentfile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/assetcatalog_generated_info.plist -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/Info.plist @ @ @ Ld /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/Tallam\ Testing normal (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects-normal/x86_64/GeneratedPluginRegistrant.o /Users/brandonguigo/tallam/app/ios/Runner/GeneratedPluginRegistrant.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ MergeSwiftModule normal x86_64 (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ CompileSwift normal x86_64 /Users/brandonguigo/tallam/app/ios/Runner/AppDelegate.swift (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ PrecompileSwiftBridgingHeader normal x86_64 (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ export PACKAGE_TYPE\=com.apple.package-type.wrapper.application export PASCAL_STRINGS\=YES export PATH\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/libexec:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/local/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin export PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES\=/usr/include\ /usr/local/include\ /System/Library/Frameworks\ /System/Library/PrivateFrameworks\ /Applications/Xcode-beta.app/Contents/Developer/Headers\ /Applications/Xcode-beta.app/Contents/Developer/SDKs\ /Applications/Xcode-beta.app/Contents/Developer/Platforms export PBDEVELOPMENTPLIST_PATH\=Tallam\ Testing.app/pbdevelopment.plist @ @ export HIDE_BITCODE_SYMBOLS\=YES export HOME\=/Users/brandonguigo export ICONV\=/usr/bin/iconv export INFOPLIST_EXPAND_BUILD_SETTINGS\=YES export INFOPLIST_FILE\=Runner/Info.plist export INFOPLIST_OUTPUT_FORMAT\=binary export INFOPLIST_PATH\=Tallam\ Testing.app/Info.plist export INFOPLIST_PREPROCESS\=NO export INFOSTRINGS_PATH\=Tallam\ Testing.app/en.lproj/InfoPlist.strings export INLINE_PRIVATE_FRAMEWORKS\=NO export INSTALLHDRS_COPY_PHASE\=NO export INSTALLHDRS_SCRIPT_PHASE\=NO export INSTALL_DIR\=/tmp/Runner.dst/Applications export INSTALL_GROUP\=staff export INSTALL_MODE_FLAG\=u+w,go-w,a+rX export INSTALL_OWNER\=brandonguigo export INSTALL_PATH\=/Applications export INSTALL_ROOT\=/tmp/Runner.dst export IPHONEOS_DEPLOYMENT_TARGET\=11.0 export JAVAC_DEFAULT_FLAGS\=-J-Xms64m\ -J-XX:NewSize\=4M\ -J-Dfile.encoding\=UTF8 export JAVA_APP_STUB\=/System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub export FRAMEWORK_VERSION\=A export FULL_PRODUCT_NAME\=Tallam\ Testing.app export GCC3_VERSION\=3.3 export GCC_C_LANGUAGE_STANDARD\=gnu99 export GCC_DYNAMIC_NO_PIC\=NO export GCC_INLINES_ARE_PRIVATE_EXTERN\=YES export GCC_NO_COMMON_BLOCKS\=YES export GCC_OBJC_LEGACY_DISPATCH\=YES export GCC_OPTIMIZATION_LEVEL\=0 export GCC_PFE_FILE_C_DIALECTS\=c\ objective-c\ c++\ objective-c++ export GCC_PREPROCESSOR_DEFINITIONS\=DEBUG\=1\ \ COCOAPODS\=1\ DEBUG\=1\ \ FBSDKCOCOAPODS\=1\ DEBUG\=1\ \ GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS\=1\ DEBUG\=1\ \ PB_FIELD_32BIT\=1\ PB_NO_PACKED_STRUCTS\=1\ PB_ENABLE_MALLOC\=1 export GCC_SYMBOLS_PRIVATE_EXTERN\=NO export GCC_TREAT_WARNINGS_AS_ERRORS\=NO export GCC_VERSION\=com.apple.compilers.llvm.clang.1_0 export GCC_VERSION_IDENTIFIER\=com_apple_compilers_llvm_clang_1_0 export GCC_WARN_64_TO_32_BIT_CONVERSION\=YES export GCC_WARN_ABOUT_RETURN_TYPE\=YES_ERROR export GCC_WARN_UNDECLARED_SELECTOR\=YES export GCC_WARN_UNINITIALIZED_AUTOS\=YES_AGGRESSIVE export GCC_WARN_UNUSED_FUNCTION\=YES export GCC_WARN_UNUSED_VARIABLE\=YES CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/grpcpp.framework (in target 'gRPC-C++' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/grpcpp.framework /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/grpcpp.framework: replacing existing signature ProcessProductPackaging "" /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Tallam\ Testing.app.xcent (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios Entitlements: CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/cloud_firestore.build/Objects-normal/x86_64/FLTCloudFirestorePlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/cloud_firestore-0.13.4/ios/Classes/FLTCloudFirestorePlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'cloud_firestore' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ WriteAuxiliaryFile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/Pods-Runner.build/Pods_Runner-all-target-headers.hmap (in target 'Pods-Runner' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods write-file /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/Pods-Runner.build/Pods_Runner-all-target-headers.hmap CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/firebase_analytics.build/Objects-normal/x86_64/FLTFirebaseAnalyticsPlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/firebase_analytics-5.0.16/ios/Classes/FLTFirebaseAnalyticsPlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'firebase_analytics' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/firebase_core.build/Objects-normal/x86_64/FLTFirebaseCorePlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/firebase_core-0.4.4/ios/Classes/FLTFirebaseCorePlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'firebase_core' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/firebase_crashlytics.build/Objects-normal/x86_64/FirebaseCrashlyticsPlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/firebase_crashlytics-0.1.3+3/ios/Classes/FirebaseCrashlyticsPlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'firebase_crashlytics' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/flutter_facebook_login/flutter_facebook_login.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/flutter_facebook_login/flutter_facebook_login-Info.plist (in target 'flutter_facebook_login' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/flutter_facebook_login/flutter_facebook_login-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/flutter_facebook_login/flutter_facebook_login.framework/Info.plist CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/path_provider/path_provider.framework (in target 'path_provider' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" @ Ld /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/shared_preferences/shared_preferences.framework/shared_preferences normal (in target 'shared_preferences' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/google_sign_in/google_sign_in.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/google_sign_in/google_sign_in-Info.plist (in target 'google_sign_in' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/google_sign_in/google_sign_in-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/google_sign_in/google_sign_in.framework/Info.plist Ld /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/connectivity/connectivity.framework/connectivity normal (in target 'connectivity' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods @ @ @ @ @ @ @ @ ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities/GoogleUtilities.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleUtilities/GoogleUtilities-Info.plist (in target 'GoogleUtilities' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleUtilities/GoogleUtilities-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities/GoogleUtilities.framework/Info.plist ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport-Info.plist (in target 'GoogleDataTransportCCTSupport' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport.framework/Info.plist WriteAuxiliaryFile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/FirebaseCore.build/FirebaseCore-all-target-headers.hmap (in target 'FirebaseCore' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods write-file /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/FirebaseCore.build/FirebaseCore-all-target-headers.hmap CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC/openssl_grpc.framework (in target 'BoringSSL-GRPC' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC/openssl_grpc.framework @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/flutter_facebook_login.build/Objects-normal/x86_64/FacebookLoginPlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/flutter_facebook_login-3.0.0/ios/Classes/FacebookLoginPlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'flutter_facebook_login' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework (in target 'nanopb' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework: replacing existing signature CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/gRPCCertificates-Cpp.bundle (in target 'gRPC-C++-gRPCCertificates-Cpp' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" GenerateDSYMFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework.dSYM /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework/nanopb (in target 'nanopb' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods /Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/dsymutil /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework/nanopb -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework.dSYM CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/PromisesObjC/FBLPromises.framework (in target 'PromisesObjC' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/PromisesObjC/FBLPromises.framework @ PACKAGE_TYPE = com.apple.package-type.wrapper.application PASCAL_STRINGS = YES PATH = /Applications/Xcode-beta.app/Contents/Developer/usr/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES = /usr/include /usr/local/include /System/Library/Frameworks /System/Library/PrivateFrameworks /Applications/Xcode-beta.app/Contents/Developer/Headers /Applications/Xcode-beta.app/Contents/Developer/SDKs /Applications/Xcode-beta.app/Contents/Developer/Platforms PBDEVELOPMENTPLIST_PATH = Tallam Testing.app/pbdevelopment.plist PFE_FILE_C_DIALECTS = objective-c PKGINFO_FILE_PATH = /Users/brandonguigo/tallam/app/build/ios/Runner.build/Release-staging-iphoneos/Runner.build/PkgInfo PKGINFO_PATH = Tallam Testing.app/PkgInfo PLATFORM_DEVELOPER_APPLICATIONS_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/Applications PLATFORM_DEVELOPER_BIN_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/usr/bin PLATFORM_DEVELOPER_LIBRARY_DIR = /Applications/Xcode-beta.app/Contents/PlugIns/Xcode3Core.ideplugin/Contents/SharedSupport/Developer/Library PLATFORM_DEVELOPER_SDK_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/SDKs HIDE_BITCODE_SYMBOLS = YES HOME = /Users/brandonguigo ICONV = /usr/bin/iconv INFOPLIST_EXPAND_BUILD_SETTINGS = YES INFOPLIST_FILE = Runner/Info.plist INFOPLIST_OUTPUT_FORMAT = binary INFOPLIST_PATH = Tallam Testing.app/Info.plist INFOPLIST_PREPROCESS = NO INFOSTRINGS_PATH = Tallam Testing.app/en.lproj/InfoPlist.strings INLINE_PRIVATE_FRAMEWORKS = NO INSTALLHDRS_COPY_PHASE = NO INSTALLHDRS_SCRIPT_PHASE = NO INSTALL_DIR = /tmp/Runner.dst/Applications INSTALL_GROUP = staff INSTALL_MODE_FLAG = u+w,go-w,a+rX INSTALL_OWNER = brandonguigo INSTALL_PATH = /Applications INSTALL_ROOT = /tmp/Runner.dst IPHONEOS_DEPLOYMENT_TARGET = 11.0 JAVAC_DEFAULT_FLAGS = -J-Xms64m -J-XX:NewSize=4M -J-Dfile.encoding=UTF8 JAVA_APP_STUB = /System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub JAVA_ARCHIVE_CLASSES = YES FRAMEWORK_VERSION = A FULL_PRODUCT_NAME = Tallam Testing.app GCC3_VERSION = 3.3 GCC_C_LANGUAGE_STANDARD = gnu99 GCC_INLINES_ARE_PRIVATE_EXTERN = YES GCC_NO_COMMON_BLOCKS = YES GCC_PFE_FILE_C_DIALECTS = c objective-c c++ objective-c++ GCC_PREPROCESSOR_DEFINITIONS = COCOAPODS=1 FBSDKCOCOAPODS=1 GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS=1 PB_FIELD_32BIT=1 PB_NO_PACKED_STRUCTS=1 PB_ENABLE_MALLOC=1 GCC_SYMBOLS_PRIVATE_EXTERN = YES GCC_THUMB_SUPPORT = YES GCC_TREAT_WARNINGS_AS_ERRORS = NO GCC_VERSION = com.apple.compilers.llvm.clang.1_0 GCC_VERSION_IDENTIFIER = com_apple_compilers_llvm_clang_1_0 GCC_WARN_64_TO_32_BIT_CONVERSION = YES GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR GCC_WARN_UNDECLARED_SELECTOR = YES GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE GCC_WARN_UNUSED_FUNCTION = YES GCC_WARN_UNUSED_VARIABLE = YES GENERATE_MASTER_OBJECT_FILE = NO GENERATE_PKGINFO_FILE = YES GENERATE_PROFILING_CODE = NO [ +15 ms] executing: [/Users/brandonguigo/development/flutter/] git -c log.showSignature=false log -n 1 --pretty=format:%H [ +32 ms] Exit code 0 from: git -c log.showSignature=false log -n 1 --pretty=format:%H [ ] 8af6b2f038c1172e61d418869363a28dffec3cb4 [ ] executing: [/Users/brandonguigo/development/flutter/] git tag --contains HEAD [ +160 ms] Exit code 0 from: git tag --contains HEAD [ +1 ms] 1.17.5 [ +8 ms] executing: [/Users/brandonguigo/development/flutter/] git rev-parse --abbrev-ref --symbolic @{u} [ +11 ms] Exit code 0 from: git rev-parse --abbrev-ref --symbolic @{u} [ ] origin/stable [ ] executing: [/Users/brandonguigo/development/flutter/] git ls-remote --get-url origin [ +10 ms] Exit code 0 from: git ls-remote --get-url origin [ ] https://github.com/flutter/flutter.git [ +73 ms] executing: [/Users/brandonguigo/development/flutter/] git rev-parse --abbrev-ref HEAD [ +13 ms] Exit code 0 from: git rev-parse --abbrev-ref HEAD [ ] stable [ +6 ms] executing: sw_vers -productName [ +14 ms] Exit code 0 from: sw_vers -productName [ ] Mac OS X [ +424 ms] Could not find the built application bundle at build/ios/iphonesimulator/Runner.app. [ +1 ms] Error launching application on iPhone 11. #0 throwToolExit (package:flutter_tools/src/base/common.dart:14:3) #1 RunCommand.runCommand (package:flutter_tools/src/commands/run.dart:569:7) <asynchronous suspension> #2 FlutterCommand.verifyThenRunCommand (package:flutter_tools/src/runner/flutter_command.dart:723:18) #3 _rootRunUnary (dart:async/zone.dart:1192:38) #4 _CustomZone.runUnary (dart:async/zone.dart:1085:19) #5 _FutureListener.handleValue (dart:async/future_impl.dart:141:18) #6 Future._propagateToListeners.handleValueCallback (dart:async/future_impl.dart:682:45) #7 Future._propagateToListeners (dart:async/future_impl.dart:711:32) #8 Future._completeWithValue (dart:async/future_impl.dart:526:5) #9 _AsyncAwaitCompleter.complete (dart:async-patch/async_patch.dart:36:15) #10 _completeOnAsyncReturn (dart:async-patch/async_patch.dart:298:13) #11 RunCommand.usageValues (package:flutter_tools/src/commands/run.dart) #12 _rootRunUnary (dart:async/zone.dart:1192:38) #13 _CustomZone.runUnary (dart:async/zone.dart:1085:19) #14 _FutureListener.handleValue (dart:async/future_impl.dart:141:18) #15 Future._propagateToListeners.handleValueCallback (dart:async/future_impl.dart:682:45) #16 Future._propagateToListeners (dart:async/future_impl.dart:711:32) #17 Future._completeWithValue (dart:async/future_impl.dart:526:5) #18 Future._asyncComplete.<anonymous closure> (dart:async/future_impl.dart:556:7) #19 _rootRun (dart:async/zone.dart:1184:13) #20 _CustomZone.run (dart:async/zone.dart:1077:19) #21 _CustomZone.runGuarded (dart:async/zone.dart:979:7) #22 _CustomZone.bindCallbackGuarded.<anonymous closure> (dart:async/zone.dart:1019:23) #23 _microtaskLoop (dart:async/schedule_microtask.dart:43:21) #24 _startMicrotaskLoop (dart:async/schedule_microtask.dart:52:5) #25 _runPendingImmediateCallback (dart:isolate-patch/isolate_patch.dart:118:13) #26 _ ``` </details> <!-- If possible, paste the output of running `flutter doctor -v` here. --> ``` Downloading android-arm-profile/darwin-x64 tools... 0,9s Downloading android-arm-release/darwin-x64 tools... 0,3s Downloading android-arm64-profile/darwin-x64 tools... 1,1s Downloading android-arm64-release/darwin-x64 tools... 0,7s Downloading android-x64-profile/darwin-x64 tools... 0,3s Downloading android-x64-release/darwin-x64 tools... 0,8s [✓] Flutter (Channel stable, v1.17.5, on Mac OS X 10.15.6 19G73, locale fr-FR) • Flutter version 1.17.5 at /Users/brandonguigo/development/flutter • Framework revision 8af6b2f038 (4 weeks ago), 2020-06-30 12:53:55 -0700 • Engine revision ee76268252 • Dart version 2.8.4 [✓] Android toolchain - develop for Android devices (Android SDK version 30.0.0) • Android SDK at /Users/brandonguigo/Library/Android/sdk • Platform android-30, build-tools 30.0.0 • Java binary at: /Users/brandonguigo/Library/Application Support/JetBrains/Toolbox/apps/AndroidStudio/ch-0/193.6514223/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) • All Android licenses accepted. [✓] Xcode - develop for iOS and macOS (Xcode 12.0) • Xcode at /Applications/Xcode-beta.app/Contents/Developer • Xcode 12.0, Build version 12A8169g • CocoaPods version 1.9.3 [✓] Android Studio (version 4.0) • Android Studio at /Users/brandonguigo/Library/Application Support/JetBrains/Toolbox/apps/AndroidStudio/ch-0/193.6514223/Android Studio.app/Contents • Flutter plugin version 47.1.2 • Dart plugin version 193.7361 • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) [!] IntelliJ IDEA Ultimate Edition (version 2020.1.2) • IntelliJ at /Users/brandonguigo/Applications/JetBrains Toolbox/IntelliJ IDEA Ultimate.app ✗ Flutter plugin not installed; this adds Flutter specific functionality. ✗ Dart plugin not installed; this adds Dart specific functionality. • For information about installing plugins, see https://flutter.dev/intellij-setup/#installing-the-plugins [✓] VS Code (version 1.47.2) • VS Code at /Applications/Visual Studio Code.app/Contents • Flutter extension version 3.12.2 [✓] Connected device (1 available) • iPhone 11 • 14719026-2269-444E-9ABB-CD7421116C11 • ios • com.apple.CoreSimulator.SimRuntime.iOS-14-0 (simulator) ! Doctor found issues in 1 category. ```
1.0
Run with flavor doesn't use flavor app name in Xcode 12 - <!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a bug or if our documentation doesn't have an answer to what you're looking for, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> Hello to all maintainers of flutter. I was trying to run my app on iOS 14 to see how it will handle the OS change and I have noticed an issue. I use flavors to launch my app, so I launch flutter run with the --flavor option, and it build successfully (with the Xcode 12 Beta CLI set) but when it goes to the simulator installation steps, I have the following error `Could not find the built application bundle at build/ios/iphonesimulator/Runner.app. Error launching application on iPhone 11.` The use of the flavors make the xcode cli generates the app with the right flavors name but at the installation step, it search for Runner.app when it should search for FlavorAppName.app ## Steps to Reproduce <!-- Please tell us exactly how to reproduce the problem you are running into. --> 1. Setup a Flutter project with Xcode Scheme and flutter flavors 2. flutter run --flavor <flavor> -t lib/flavor_main.dart 3. see the error ## Logs <!-- Include the full logs of the commands you are running between the lines with the backticks below. If you are running any "flutter" commands, please include the output of running them with "--verbose"; for example, the output of running "flutter --verbose create foo". --> <details> <summary>logs</summary> ``` export MTL_ENABLE_DEBUG_INFO\=YES export NATIVE_ARCH\=x86_64 export NATIVE_ARCH_32_BIT\=i386 export NATIVE_ARCH_64_BIT\=x86_64 export NATIVE_ARCH_ACTUAL\=x86_64 export NO_COMMON\=YES export OBJC_ABI_VERSION\=2 export OBJECT_FILE_DIR\=/Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects export OBJECT_FILE_DIR_normal\=/Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects-normal export OBJROOT\=/Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex export ONLY_ACTIVE_ARCH\=YES export OS\=MACOS export OSAC\=/usr/bin/osacompile export OTHER_LDFLAGS\=\ -framework\ Flutter\ -ObjC\ -l\"c++\"\ -l\"sqlite3\"\ -l\"stdc++\"\ -l\"z\"\ -framework\ \"AppAuth\"\ -framework\ \"CoreGraphics\"\ -framework\ \"CoreTelephony\"\ -framework\ \"CoreText\"\ -framework\ \"Crashlytics\"\ -framework\ \"FBLPromises\"\ -framework\ \"FBSDKCoreKit\"\ -framework\ \"FBSDKLoginKit\"\ -framework\ \"FIRAnalyticsConnector\"\ -framework\ \"Fabric\"\ -framework\ \"FirebaseABTesting\"\ -framework\ \"FirebaseAnalytics\"\ -framework\ \"FirebaseAuth\"\ -framework\ \"FirebaseCore\"\ -framework\ \"FirebaseCoreDiagnostics\"\ -framework\ \"FirebaseFirestore\"\ -framework\ \"FirebaseInstallations\"\ -framework\ \"Flutter\"\ -framework\ \"Foundation\"\ -framework\ \"GTMAppAuth\"\ -framework\ \"GTMSessionFetcher\"\ -framework\ \"GoogleAppMeasurement\"\ -framework\ \"GoogleDataTransport\"\ -framework\ \"GoogleDataTransportCCTSupport\"\ -framework\ \"GoogleSignIn\"\ -framework\ \"GoogleUtilities\"\ -framework\ \"LocalAuthentication\"\ -framework\ \"MobileCoreServices\"\ -framework\ \"Protobuf\"\ -framework\ \"Reachability\"\ -framework\ \"SafariServices\"\ -framework\ \"Security\"\ -framework\ \"StoreKit\"\ -framework\ \"SystemConfiguration\"\ -framework\ \"UIKit\"\ -framework\ \"absl\"\ -framework\ \"cloud_firestore\"\ -framework\ \"connectivity\"\ -framework\ \"firebase_analytics\"\ -framework\ \"firebase_auth\"\ -framework\ \"firebase_core\"\ -framework\ \"firebase_crashlytics\"\ -framework\ \"flutter_facebook_login\"\ -framework\ \"google_sign_in\"\ -framework\ \"grpc\"\ -framework\ \"grpcpp\"\ -framework\ \"leveldb\"\ -framework\ \"nanopb\"\ -framework\ \"openssl_grpc\"\ -framework\ \"path_provider\"\ -framework\ \"shared_preferences\"\ -weak_framework\ \"Accelerate\"\ -weak_framework\ \"Accounts\"\ -weak_framework\ \"AudioToolbox\"\ -weak_framework\ \"AuthenticationServices\"\ -weak_framework\ \"CoreGraphics\"\ -weak_framework\ \"CoreLoca EXECUTABLES_FOLDER_PATH = Tallam Testing.app/Executables EXECUTABLE_FOLDER_PATH = Tallam Testing.app EXECUTABLE_NAME = Tallam Testing EXECUTABLE_PATH = Tallam Testing.app/Tallam Testing EXPANDED_CODE_SIGN_IDENTITY = EXPANDED_CODE_SIGN_IDENTITY_NAME = EXPANDED_PROVISIONING_PROFILE = FILE_LIST = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects/LinkFileList FIXED_FILES_DIR = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/FixedFiles FLUTTER_APPLICATION_PATH = /Users/brandonguigo/tallam/app FLUTTER_BUILD_DIR = build FLUTTER_BUILD_NAME = 1.0.0 FLUTTER_BUILD_NUMBER = 1 FLUTTER_FRAMEWORK_DIR = /Users/brandonguigo/development/flutter/bin/cache/artifacts/engine/ios FLUTTER_ROOT = /Users/brandonguigo/development/flutter FLUTTER_SUPPRESS_ANALYTICS = true FLUTTER_TARGET = lib/main_staging.dart FRAMEWORKS_FOLDER_PATH = Tallam Testing.app/Frameworks FRAMEWORK_FLAG_PREFIX = -framework FRAMEWORK_SEARCH_PATHS = "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/AppAuth" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKCoreKit" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKLoginKit" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseABTesting" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseAuth" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCore" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCoreDiagnostics" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseFirestore" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseInstallations" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMAppAuth" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMSessionFetcher" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransport" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/PromisesObjC" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Protobuf" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Reachability" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/abseil" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/cloud_firestore" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/connectivity" "/Users/brandonguigo/t GCC_SYMBOLS_PRIVATE_EXTERN = NO GCC_TREAT_WARNINGS_AS_ERRORS = NO GCC_VERSION = com.apple.compilers.llvm.clang.1_0 GCC_VERSION_IDENTIFIER = com_apple_compilers_llvm_clang_1_0 GCC_WARN_64_TO_32_BIT_CONVERSION = YES GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR GCC_WARN_UNDECLARED_SELECTOR = YES GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE GCC_WARN_UNUSED_FUNCTION = YES GCC_WARN_UNUSED_VARIABLE = YES GENERATE_MASTER_OBJECT_FILE = NO GENERATE_PKGINFO_FILE = YES GENERATE_PROFILING_CODE = NO GENERATE_TEXT_BASED_STUBS = NO GID = 20 GROUP = staff HEADERMAP_INCLUDES_FLAT_ENTRIES_FOR_TARGET_BEING_BUILT = YES HEADERMAP_INCLUDES_FRAMEWORK_ENTRIES_FOR_ALL_PRODUCT_TYPES = YES HEADERMAP_INCLUDES_NONPUBLIC_NONPRIVATE_HEADERS = YES HEADERMAP_INCLUDES_PROJECT_HEADERS = YES HEADERMAP_USES_FRAMEWORK_PREFIX_ENTRIES = YES HEADERMAP_USES_VFS = NO @ @ HEADER_SEARCH_PATHS = "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/AppAuth/AppAuth.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC/openssl_grpc.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKCoreKit/FBSDKCoreKit.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FBSDKLoginKit/FBSDKLoginKit.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseABTesting/FirebaseABTesting.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseAuth/FirebaseAuth.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCore/FirebaseCore.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseCoreDiagnostics/FirebaseCoreDiagnostics.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseFirestore/FirebaseFirestore.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/FirebaseInstallations/FirebaseInstallations.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMAppAuth/GTMAppAuth.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GTMSessionFetcher/GTMSessionFetcher.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransport/GoogleDataTransport.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport.framework/Headers" "/Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities/GoogleUtilities.framework/Headers" "/Users/brand METAL_LIBRARY_FILE_BASE = default METAL_LIBRARY_OUTPUT_DIR = /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam Testing.app MODULES_FOLDER_PATH = Tallam Testing.app/Modules MODULE_CACHE_DIR = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/ModuleCache.noindex MTL_ENABLE_DEBUG_INFO = YES NATIVE_ARCH = x86_64 NATIVE_ARCH_32_BIT = i386 NATIVE_ARCH_64_BIT = x86_64 NATIVE_ARCH_ACTUAL = x86_64 NO_COMMON = YES OBJC_ABI_VERSION = 2 OBJECT_FILE_DIR = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects OBJECT_FILE_DIR_normal = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects-normal OBJROOT = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex ONLY_ACTIVE_ARCH = YES OS = MACOS OSAC = /usr/bin/osacompile OTHER_LDFLAGS = -ObjC -l"c++" -l"sqlite3" -l"stdc++" -l"z" -framework "AppAuth" -framework "CoreGraphics" -framework "CoreTelephony" -framework "CoreText" -framework "Crashlytics" -framework "FBLPromises" -framework "FBSDKCoreKit" -framework "FBSDKLoginKit" -framework "FIRAnalyticsConnector" -framework "Fabric" -framework "FirebaseABTesting" -framework "FirebaseAnalytics" -framework "FirebaseAuth" -framework "FirebaseCore" -framework "FirebaseCoreDiagnostics" -framework "FirebaseFirestore" -framework "FirebaseInstallations" -framework "Flutter" -framework "Foundation" -framework "GTMAppAuth" -framework "GTMSessionFetcher" -framework "GoogleAppMeasurement" -framework "GoogleDataTransport" -framework "GoogleDataTransportCCTSupport" -framework "GoogleSignIn" -framework "GoogleUtilities" -framework "LocalAuthentication" -framework "MobileCoreServices" -framework "Protobuf" -framework "Reachability" -framework "SafariServices" -framework "Security" -framework "StoreKit" -framework "SystemConfiguration" -framework "UIKit" -framework "absl" -framework "cloud_firestore" -framework "connectivity" -framework "firebase_analytics" -framework "firebase_auth" -framework "firebase_core" -framework "firebase_crashlytics" -framework "flutter_facebook_login" -framework "google_sign_in" -framework "grpc" -framework "grpcpp" -framework "leveldb" -framework "nanopb" -framework "openssl_grpc" -framework "path_provider" -framework "shared_preferences" -weak_framework "Accelerate" -weak_framework "Accounts" -weak_framework "AudioToolbox" -weak_framework "AuthenticationServices" -weak_framework "CoreGraphics" -weak_framework "CoreLocation" -weak_framework "Foundation" -weak_framework "QuartzCore" -weak_framework "Security" -weak_framework "Social" -weak_framework "UIKit" PACKAGE_TYPE = com.apple.package-type.wrapper.application PACKAGE_TYPE = com.apple.package-type.wrapper.application PASCAL_STRINGS = YES PATH = /Applications/Xcode-beta.app/Contents/Developer/usr/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES = /usr/include /usr/local/include /System/Library/Frameworks /System/Library/PrivateFrameworks /Applications/Xcode-beta.app/Contents/Developer/Headers /Applications/Xcode-beta.app/Contents/Developer/SDKs /Applications/Xcode-beta.app/Contents/Developer/Platforms PBDEVELOPMENTPLIST_PATH = Tallam Testing.app/pbdevelopment.plist PFE_FILE_C_DIALECTS = objective-c PKGINFO_FILE_PATH = /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/PkgInfo PKGINFO_PATH = Tallam Testing.app/PkgInfo PLATFORM_DEVELOPER_APPLICATIONS_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/Applications PLATFORM_DEVELOPER_BIN_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin PLATFORM_DEVELOPER_LIBRARY_DIR = /Applications/Xcode-beta.app/Contents/PlugIns/Xcode3Core.ideplugin/Contents/SharedSupport/Developer/Library @ HIDE_BITCODE_SYMBOLS = YES HOME = /Users/brandonguigo ICONV = /usr/bin/iconv INFOPLIST_EXPAND_BUILD_SETTINGS = YES INFOPLIST_FILE = Runner/Info.plist INFOPLIST_OUTPUT_FORMAT = binary INFOPLIST_PATH = Tallam Testing.app/Info.plist INFOPLIST_PREPROCESS = NO INFOSTRINGS_PATH = Tallam Testing.app/en.lproj/InfoPlist.strings INLINE_PRIVATE_FRAMEWORKS = NO INSTALLHDRS_COPY_PHASE = NO INSTALLHDRS_SCRIPT_PHASE = NO INSTALL_DIR = /tmp/Runner.dst/Applications INSTALL_GROUP = staff INSTALL_MODE_FLAG = u+w,go-w,a+rX INSTALL_OWNER = brandonguigo INSTALL_PATH = /Applications INSTALL_ROOT = /tmp/Runner.dst IPHONEOS_DEPLOYMENT_TARGET = 11.0 JAVAC_DEFAULT_FLAGS = -J-Xms64m -J-XX:NewSize=4M -J-Dfile.encoding=UTF8 JAVA_APP_STUB = /System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub JAVA_ARCHIVE_CLASSES = YES FRAMEWORK_VERSION = A FULL_PRODUCT_NAME = Tallam Testing.app GCC3_VERSION = 3.3 GCC_C_LANGUAGE_STANDARD = gnu99 GCC_DYNAMIC_NO_PIC = NO GCC_INLINES_ARE_PRIVATE_EXTERN = YES GCC_NO_COMMON_BLOCKS = YES GCC_OBJC_LEGACY_DISPATCH = YES GCC_OPTIMIZATION_LEVEL = 0 GCC_PFE_FILE_C_DIALECTS = c objective-c c++ objective-c++ GCC_PREPROCESSOR_DEFINITIONS = DEBUG=1 COCOAPODS=1 DEBUG=1 FBSDKCOCOAPODS=1 DEBUG=1 GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS=1 DEBUG=1 PB_FIELD_32BIT=1 PB_NO_PACKED_STRUCTS=1 PB_ENABLE_MALLOC=1 GCC_SYMBOLS_PRIVATE_EXTERN = NO GCC_TREAT_WARNINGS_AS_ERRORS = NO GCC_VERSION = com.apple.compilers.llvm.clang.1_0 GCC_VERSION_IDENTIFIER = com_apple_compilers_llvm_clang_1_0 GCC_WARN_64_TO_32_BIT_CONVERSION = YES GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR GCC_WARN_UNDECLARED_SELECTOR = YES GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE GCC_WARN_UNUSED_FUNCTION = YES GCC_WARN_UNUSED_VARIABLE = YES GENERATE_MASTER_OBJECT_FILE = NO export PACKAGE_TYPE\=com.apple.package-type.wrapper.application export PASCAL_STRINGS\=YES export PATH\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/libexec:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/local/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin export PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES\=/usr/include\ /usr/local/include\ /System/Library/Frameworks\ /System/Library/PrivateFrameworks\ /Applications/Xcode-beta.app/Contents/Developer/Headers\ /Applications/Xcode-beta.app/Contents/Developer/SDKs\ /Applications/Xcode-beta.app/Contents/Developer/Platforms export PBDEVELOPMENTPLIST_PATH\=Tallam\ Testing.app/pbdevelopment.plist @ @ export HIDE_BITCODE_SYMBOLS\=YES export HOME\=/Users/brandonguigo export ICONV\=/usr/bin/iconv export INFOPLIST_EXPAND_BUILD_SETTINGS\=YES export INFOPLIST_FILE\=Runner/Info.plist export INFOPLIST_OUTPUT_FORMAT\=binary export INFOPLIST_PATH\=Tallam\ Testing.app/Info.plist export INFOPLIST_PREPROCESS\=NO export INFOSTRINGS_PATH\=Tallam\ Testing.app/en.lproj/InfoPlist.strings export INLINE_PRIVATE_FRAMEWORKS\=NO export INSTALLHDRS_COPY_PHASE\=NO export INSTALLHDRS_SCRIPT_PHASE\=NO export INSTALL_DIR\=/tmp/Runner.dst/Applications export INSTALL_GROUP\=staff export INSTALL_MODE_FLAG\=u+w,go-w,a+rX export INSTALL_OWNER\=brandonguigo export INSTALL_PATH\=/Applications export INSTALL_ROOT\=/tmp/Runner.dst export IPHONEOS_DEPLOYMENT_TARGET\=11.0 export JAVAC_DEFAULT_FLAGS\=-J-Xms64m\ -J-XX:NewSize\=4M\ -J-Dfile.encoding\=UTF8 export JAVA_APP_STUB\=/System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub export FRAMEWORK_VERSION\=A export FULL_PRODUCT_NAME\=Tallam\ Testing.app export GCC3_VERSION\=3.3 export GCC_C_LANGUAGE_STANDARD\=gnu99 export GCC_DYNAMIC_NO_PIC\=NO export GCC_INLINES_ARE_PRIVATE_EXTERN\=YES export GCC_NO_COMMON_BLOCKS\=YES export GCC_OBJC_LEGACY_DISPATCH\=YES export GCC_OPTIMIZATION_LEVEL\=0 export GCC_PFE_FILE_C_DIALECTS\=c\ objective-c\ c++\ objective-c++ export GCC_PREPROCESSOR_DEFINITIONS\=DEBUG\=1\ \ COCOAPODS\=1\ DEBUG\=1\ \ FBSDKCOCOAPODS\=1\ DEBUG\=1\ \ GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS\=1\ DEBUG\=1\ \ PB_FIELD_32BIT\=1\ PB_NO_PACKED_STRUCTS\=1\ PB_ENABLE_MALLOC\=1 export GCC_SYMBOLS_PRIVATE_EXTERN\=NO export GCC_TREAT_WARNINGS_AS_ERRORS\=NO export GCC_VERSION\=com.apple.compilers.llvm.clang.1_0 export GCC_VERSION_IDENTIFIER\=com_apple_compilers_llvm_clang_1_0 export GCC_WARN_64_TO_32_BIT_CONVERSION\=YES export GCC_WARN_ABOUT_RETURN_TYPE\=YES_ERROR export GCC_WARN_UNDECLARED_SELECTOR\=YES export GCC_WARN_UNINITIALIZED_AUTOS\=YES_AGGRESSIVE export GCC_WARN_UNUSED_FUNCTION\=YES export GCC_WARN_UNUSED_VARIABLE\=YES export PACKAGE_TYPE\=com.apple.package-type.wrapper.application export PASCAL_STRINGS\=YES export PATH\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/libexec:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/local/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin export PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES\=/usr/include\ /usr/local/include\ /System/Library/Frameworks\ /System/Library/PrivateFrameworks\ /Applications/Xcode-beta.app/Contents/Developer/Headers\ /Applications/Xcode-beta.app/Contents/Developer/SDKs\ /Applications/Xcode-beta.app/Contents/Developer/Platforms export PBDEVELOPMENTPLIST_PATH\=Tallam\ Testing.app/pbdevelopment.plist @ @ export HIDE_BITCODE_SYMBOLS\=YES export HOME\=/Users/brandonguigo export ICONV\=/usr/bin/iconv export INFOPLIST_EXPAND_BUILD_SETTINGS\=YES export INFOPLIST_FILE\=Runner/Info.plist export INFOPLIST_OUTPUT_FORMAT\=binary export INFOPLIST_PATH\=Tallam\ Testing.app/Info.plist export INFOPLIST_PREPROCESS\=NO export INFOSTRINGS_PATH\=Tallam\ Testing.app/en.lproj/InfoPlist.strings export INLINE_PRIVATE_FRAMEWORKS\=NO export INSTALLHDRS_COPY_PHASE\=NO export INSTALLHDRS_SCRIPT_PHASE\=NO export INSTALL_DIR\=/tmp/Runner.dst/Applications export INSTALL_GROUP\=staff export INSTALL_MODE_FLAG\=u+w,go-w,a+rX export INSTALL_OWNER\=brandonguigo export INSTALL_PATH\=/Applications export INSTALL_ROOT\=/tmp/Runner.dst export IPHONEOS_DEPLOYMENT_TARGET\=11.0 export JAVAC_DEFAULT_FLAGS\=-J-Xms64m\ -J-XX:NewSize\=4M\ -J-Dfile.encoding\=UTF8 export JAVA_APP_STUB\=/System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub export FRAMEWORK_VERSION\=A export FULL_PRODUCT_NAME\=Tallam\ Testing.app export GCC3_VERSION\=3.3 export GCC_C_LANGUAGE_STANDARD\=gnu99 export GCC_DYNAMIC_NO_PIC\=NO export GCC_INLINES_ARE_PRIVATE_EXTERN\=YES export GCC_NO_COMMON_BLOCKS\=YES export GCC_OBJC_LEGACY_DISPATCH\=YES export GCC_OPTIMIZATION_LEVEL\=0 export GCC_PFE_FILE_C_DIALECTS\=c\ objective-c\ c++\ objective-c++ export GCC_PREPROCESSOR_DEFINITIONS\=DEBUG\=1\ \ COCOAPODS\=1\ DEBUG\=1\ \ FBSDKCOCOAPODS\=1\ DEBUG\=1\ \ GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS\=1\ DEBUG\=1\ \ PB_FIELD_32BIT\=1\ PB_NO_PACKED_STRUCTS\=1\ PB_ENABLE_MALLOC\=1 export GCC_SYMBOLS_PRIVATE_EXTERN\=NO export GCC_TREAT_WARNINGS_AS_ERRORS\=NO export GCC_VERSION\=com.apple.compilers.llvm.clang.1_0 export GCC_VERSION_IDENTIFIER\=com_apple_compilers_llvm_clang_1_0 export GCC_WARN_64_TO_32_BIT_CONVERSION\=YES export GCC_WARN_ABOUT_RETURN_TYPE\=YES_ERROR export GCC_WARN_UNDECLARED_SELECTOR\=YES export GCC_WARN_UNINITIALIZED_AUTOS\=YES_AGGRESSIVE export GCC_WARN_UNUSED_FUNCTION\=YES export GCC_WARN_UNUSED_VARIABLE\=YES ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/Info.plist /Users/brandonguigo/tallam/app/ios/Runner/Info.plist (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Runner/Info.plist -producttype com.apple.product-type.application -genpkginfo /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/PkgInfo -expandbuildsettings -format binary -platform iphonesimulator -additionalcontentfile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Base.lproj/LaunchScreen-SBPartialInfo.plist -additionalcontentfile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Base.lproj/Main-SBPartialInfo.plist -additionalcontentfile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/assetcatalog_generated_info.plist -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/Info.plist @ @ @ Ld /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/Tallam\ Testing.app/Tallam\ Testing normal (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Objects-normal/x86_64/GeneratedPluginRegistrant.o /Users/brandonguigo/tallam/app/ios/Runner/GeneratedPluginRegistrant.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ MergeSwiftModule normal x86_64 (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ CompileSwift normal x86_64 /Users/brandonguigo/tallam/app/ios/Runner/AppDelegate.swift (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ PrecompileSwiftBridgingHeader normal x86_64 (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ export PACKAGE_TYPE\=com.apple.package-type.wrapper.application export PASCAL_STRINGS\=YES export PATH\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/libexec:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneSimulator.platform/Developer/usr/local/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/bin:/Applications/Xcode-beta.app/Contents/Developer/usr/local/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin export PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES\=/usr/include\ /usr/local/include\ /System/Library/Frameworks\ /System/Library/PrivateFrameworks\ /Applications/Xcode-beta.app/Contents/Developer/Headers\ /Applications/Xcode-beta.app/Contents/Developer/SDKs\ /Applications/Xcode-beta.app/Contents/Developer/Platforms export PBDEVELOPMENTPLIST_PATH\=Tallam\ Testing.app/pbdevelopment.plist @ @ export HIDE_BITCODE_SYMBOLS\=YES export HOME\=/Users/brandonguigo export ICONV\=/usr/bin/iconv export INFOPLIST_EXPAND_BUILD_SETTINGS\=YES export INFOPLIST_FILE\=Runner/Info.plist export INFOPLIST_OUTPUT_FORMAT\=binary export INFOPLIST_PATH\=Tallam\ Testing.app/Info.plist export INFOPLIST_PREPROCESS\=NO export INFOSTRINGS_PATH\=Tallam\ Testing.app/en.lproj/InfoPlist.strings export INLINE_PRIVATE_FRAMEWORKS\=NO export INSTALLHDRS_COPY_PHASE\=NO export INSTALLHDRS_SCRIPT_PHASE\=NO export INSTALL_DIR\=/tmp/Runner.dst/Applications export INSTALL_GROUP\=staff export INSTALL_MODE_FLAG\=u+w,go-w,a+rX export INSTALL_OWNER\=brandonguigo export INSTALL_PATH\=/Applications export INSTALL_ROOT\=/tmp/Runner.dst export IPHONEOS_DEPLOYMENT_TARGET\=11.0 export JAVAC_DEFAULT_FLAGS\=-J-Xms64m\ -J-XX:NewSize\=4M\ -J-Dfile.encoding\=UTF8 export JAVA_APP_STUB\=/System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub export FRAMEWORK_VERSION\=A export FULL_PRODUCT_NAME\=Tallam\ Testing.app export GCC3_VERSION\=3.3 export GCC_C_LANGUAGE_STANDARD\=gnu99 export GCC_DYNAMIC_NO_PIC\=NO export GCC_INLINES_ARE_PRIVATE_EXTERN\=YES export GCC_NO_COMMON_BLOCKS\=YES export GCC_OBJC_LEGACY_DISPATCH\=YES export GCC_OPTIMIZATION_LEVEL\=0 export GCC_PFE_FILE_C_DIALECTS\=c\ objective-c\ c++\ objective-c++ export GCC_PREPROCESSOR_DEFINITIONS\=DEBUG\=1\ \ COCOAPODS\=1\ DEBUG\=1\ \ FBSDKCOCOAPODS\=1\ DEBUG\=1\ \ GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS\=1\ DEBUG\=1\ \ PB_FIELD_32BIT\=1\ PB_NO_PACKED_STRUCTS\=1\ PB_ENABLE_MALLOC\=1 export GCC_SYMBOLS_PRIVATE_EXTERN\=NO export GCC_TREAT_WARNINGS_AS_ERRORS\=NO export GCC_VERSION\=com.apple.compilers.llvm.clang.1_0 export GCC_VERSION_IDENTIFIER\=com_apple_compilers_llvm_clang_1_0 export GCC_WARN_64_TO_32_BIT_CONVERSION\=YES export GCC_WARN_ABOUT_RETURN_TYPE\=YES_ERROR export GCC_WARN_UNDECLARED_SELECTOR\=YES export GCC_WARN_UNINITIALIZED_AUTOS\=YES_AGGRESSIVE export GCC_WARN_UNUSED_FUNCTION\=YES export GCC_WARN_UNUSED_VARIABLE\=YES CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/grpcpp.framework (in target 'gRPC-C++' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/grpcpp.framework /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/grpcpp.framework: replacing existing signature ProcessProductPackaging "" /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Runner.build/Debug-staging-iphonesimulator/Runner.build/Tallam\ Testing.app.xcent (in target 'Runner' from project 'Runner') cd /Users/brandonguigo/tallam/app/ios Entitlements: CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/cloud_firestore.build/Objects-normal/x86_64/FLTCloudFirestorePlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/cloud_firestore-0.13.4/ios/Classes/FLTCloudFirestorePlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'cloud_firestore' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ WriteAuxiliaryFile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/Pods-Runner.build/Pods_Runner-all-target-headers.hmap (in target 'Pods-Runner' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods write-file /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/Pods-Runner.build/Pods_Runner-all-target-headers.hmap CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/firebase_analytics.build/Objects-normal/x86_64/FLTFirebaseAnalyticsPlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/firebase_analytics-5.0.16/ios/Classes/FLTFirebaseAnalyticsPlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'firebase_analytics' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/firebase_core.build/Objects-normal/x86_64/FLTFirebaseCorePlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/firebase_core-0.4.4/ios/Classes/FLTFirebaseCorePlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'firebase_core' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/firebase_crashlytics.build/Objects-normal/x86_64/FirebaseCrashlyticsPlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/firebase_crashlytics-0.1.3+3/ios/Classes/FirebaseCrashlyticsPlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'firebase_crashlytics' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/flutter_facebook_login/flutter_facebook_login.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/flutter_facebook_login/flutter_facebook_login-Info.plist (in target 'flutter_facebook_login' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/flutter_facebook_login/flutter_facebook_login-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/flutter_facebook_login/flutter_facebook_login.framework/Info.plist CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/path_provider/path_provider.framework (in target 'path_provider' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" @ Ld /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/shared_preferences/shared_preferences.framework/shared_preferences normal (in target 'shared_preferences' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ @ ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/google_sign_in/google_sign_in.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/google_sign_in/google_sign_in-Info.plist (in target 'google_sign_in' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/google_sign_in/google_sign_in-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/google_sign_in/google_sign_in.framework/Info.plist Ld /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/connectivity/connectivity.framework/connectivity normal (in target 'connectivity' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods @ @ @ @ @ @ @ @ ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities/GoogleUtilities.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleUtilities/GoogleUtilities-Info.plist (in target 'GoogleUtilities' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleUtilities/GoogleUtilities-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleUtilities/GoogleUtilities.framework/Info.plist ProcessInfoPlistFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport.framework/Info.plist /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport-Info.plist (in target 'GoogleDataTransportCCTSupport' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods builtin-infoPlistUtility /Users/brandonguigo/tallam/app/ios/Pods/Target\ Support\ Files/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport-Info.plist -producttype com.apple.product-type.framework -expandbuildsettings -format binary -platform iphonesimulator -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/GoogleDataTransportCCTSupport/GoogleDataTransportCCTSupport.framework/Info.plist WriteAuxiliaryFile /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/FirebaseCore.build/FirebaseCore-all-target-headers.hmap (in target 'FirebaseCore' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods write-file /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/FirebaseCore.build/FirebaseCore-all-target-headers.hmap CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC/openssl_grpc.framework (in target 'BoringSSL-GRPC' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/BoringSSL-GRPC/openssl_grpc.framework @ CompileC /Users/brandonguigo/Library/Developer/Xcode/DerivedData/Runner-aayyjyuncawiwkbwtdouldjbxlfc/Build/Intermediates.noindex/Pods.build/Debug-staging-iphonesimulator/flutter_facebook_login.build/Objects-normal/x86_64/FacebookLoginPlugin.o /Users/brandonguigo/.pub-cache/hosted/pub.dartlang.org/flutter_facebook_login-3.0.0/ios/Classes/FacebookLoginPlugin.m normal x86_64 objective-c com.apple.compilers.llvm.clang.1_0.compiler (in target 'flutter_facebook_login' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export LANG\=en_US.US-ASCII @ @ @ @ @ @ @ @ @ @ @ @ @ @ CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework (in target 'nanopb' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework: replacing existing signature CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/gRPC-C++/gRPCCertificates-Cpp.bundle (in target 'gRPC-C++-gRPCCertificates-Cpp' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" GenerateDSYMFile /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework.dSYM /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework/nanopb (in target 'nanopb' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods /Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/dsymutil /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework/nanopb -o /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/nanopb/nanopb.framework.dSYM CodeSign /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/PromisesObjC/FBLPromises.framework (in target 'PromisesObjC' from project 'Pods') cd /Users/brandonguigo/tallam/app/ios/Pods export CODESIGN_ALLOCATE\=/Applications/Xcode-beta.app/Contents/Developer/Toolchains/XcodeDefault.xctoolchain/usr/bin/codesign_allocate Signing Identity: "-" /usr/bin/codesign --force --sign - --timestamp\=none /Users/brandonguigo/tallam/app/build/ios/Debug-staging-iphonesimulator/PromisesObjC/FBLPromises.framework @ PACKAGE_TYPE = com.apple.package-type.wrapper.application PASCAL_STRINGS = YES PATH = /Applications/Xcode-beta.app/Contents/Developer/usr/bin:/opt/mvn/bin:/Users/brandonguigo/development/flutter/bin:/Users/brandonguigo/.nvm/versions/node/v14.5.0/bin:/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin:/Library/TeX/texbin:/Library/Apple/usr/bin PATH_PREFIXES_EXCLUDED_FROM_HEADER_DEPENDENCIES = /usr/include /usr/local/include /System/Library/Frameworks /System/Library/PrivateFrameworks /Applications/Xcode-beta.app/Contents/Developer/Headers /Applications/Xcode-beta.app/Contents/Developer/SDKs /Applications/Xcode-beta.app/Contents/Developer/Platforms PBDEVELOPMENTPLIST_PATH = Tallam Testing.app/pbdevelopment.plist PFE_FILE_C_DIALECTS = objective-c PKGINFO_FILE_PATH = /Users/brandonguigo/tallam/app/build/ios/Runner.build/Release-staging-iphoneos/Runner.build/PkgInfo PKGINFO_PATH = Tallam Testing.app/PkgInfo PLATFORM_DEVELOPER_APPLICATIONS_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/Applications PLATFORM_DEVELOPER_BIN_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/usr/bin PLATFORM_DEVELOPER_LIBRARY_DIR = /Applications/Xcode-beta.app/Contents/PlugIns/Xcode3Core.ideplugin/Contents/SharedSupport/Developer/Library PLATFORM_DEVELOPER_SDK_DIR = /Applications/Xcode-beta.app/Contents/Developer/Platforms/iPhoneOS.platform/Developer/SDKs HIDE_BITCODE_SYMBOLS = YES HOME = /Users/brandonguigo ICONV = /usr/bin/iconv INFOPLIST_EXPAND_BUILD_SETTINGS = YES INFOPLIST_FILE = Runner/Info.plist INFOPLIST_OUTPUT_FORMAT = binary INFOPLIST_PATH = Tallam Testing.app/Info.plist INFOPLIST_PREPROCESS = NO INFOSTRINGS_PATH = Tallam Testing.app/en.lproj/InfoPlist.strings INLINE_PRIVATE_FRAMEWORKS = NO INSTALLHDRS_COPY_PHASE = NO INSTALLHDRS_SCRIPT_PHASE = NO INSTALL_DIR = /tmp/Runner.dst/Applications INSTALL_GROUP = staff INSTALL_MODE_FLAG = u+w,go-w,a+rX INSTALL_OWNER = brandonguigo INSTALL_PATH = /Applications INSTALL_ROOT = /tmp/Runner.dst IPHONEOS_DEPLOYMENT_TARGET = 11.0 JAVAC_DEFAULT_FLAGS = -J-Xms64m -J-XX:NewSize=4M -J-Dfile.encoding=UTF8 JAVA_APP_STUB = /System/Library/Frameworks/JavaVM.framework/Resources/MacOS/JavaApplicationStub JAVA_ARCHIVE_CLASSES = YES FRAMEWORK_VERSION = A FULL_PRODUCT_NAME = Tallam Testing.app GCC3_VERSION = 3.3 GCC_C_LANGUAGE_STANDARD = gnu99 GCC_INLINES_ARE_PRIVATE_EXTERN = YES GCC_NO_COMMON_BLOCKS = YES GCC_PFE_FILE_C_DIALECTS = c objective-c c++ objective-c++ GCC_PREPROCESSOR_DEFINITIONS = COCOAPODS=1 FBSDKCOCOAPODS=1 GPB_USE_PROTOBUF_FRAMEWORK_IMPORTS=1 PB_FIELD_32BIT=1 PB_NO_PACKED_STRUCTS=1 PB_ENABLE_MALLOC=1 GCC_SYMBOLS_PRIVATE_EXTERN = YES GCC_THUMB_SUPPORT = YES GCC_TREAT_WARNINGS_AS_ERRORS = NO GCC_VERSION = com.apple.compilers.llvm.clang.1_0 GCC_VERSION_IDENTIFIER = com_apple_compilers_llvm_clang_1_0 GCC_WARN_64_TO_32_BIT_CONVERSION = YES GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR GCC_WARN_UNDECLARED_SELECTOR = YES GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE GCC_WARN_UNUSED_FUNCTION = YES GCC_WARN_UNUSED_VARIABLE = YES GENERATE_MASTER_OBJECT_FILE = NO GENERATE_PKGINFO_FILE = YES GENERATE_PROFILING_CODE = NO [ +15 ms] executing: [/Users/brandonguigo/development/flutter/] git -c log.showSignature=false log -n 1 --pretty=format:%H [ +32 ms] Exit code 0 from: git -c log.showSignature=false log -n 1 --pretty=format:%H [ ] 8af6b2f038c1172e61d418869363a28dffec3cb4 [ ] executing: [/Users/brandonguigo/development/flutter/] git tag --contains HEAD [ +160 ms] Exit code 0 from: git tag --contains HEAD [ +1 ms] 1.17.5 [ +8 ms] executing: [/Users/brandonguigo/development/flutter/] git rev-parse --abbrev-ref --symbolic @{u} [ +11 ms] Exit code 0 from: git rev-parse --abbrev-ref --symbolic @{u} [ ] origin/stable [ ] executing: [/Users/brandonguigo/development/flutter/] git ls-remote --get-url origin [ +10 ms] Exit code 0 from: git ls-remote --get-url origin [ ] https://github.com/flutter/flutter.git [ +73 ms] executing: [/Users/brandonguigo/development/flutter/] git rev-parse --abbrev-ref HEAD [ +13 ms] Exit code 0 from: git rev-parse --abbrev-ref HEAD [ ] stable [ +6 ms] executing: sw_vers -productName [ +14 ms] Exit code 0 from: sw_vers -productName [ ] Mac OS X [ +424 ms] Could not find the built application bundle at build/ios/iphonesimulator/Runner.app. [ +1 ms] Error launching application on iPhone 11. #0 throwToolExit (package:flutter_tools/src/base/common.dart:14:3) #1 RunCommand.runCommand (package:flutter_tools/src/commands/run.dart:569:7) <asynchronous suspension> #2 FlutterCommand.verifyThenRunCommand (package:flutter_tools/src/runner/flutter_command.dart:723:18) #3 _rootRunUnary (dart:async/zone.dart:1192:38) #4 _CustomZone.runUnary (dart:async/zone.dart:1085:19) #5 _FutureListener.handleValue (dart:async/future_impl.dart:141:18) #6 Future._propagateToListeners.handleValueCallback (dart:async/future_impl.dart:682:45) #7 Future._propagateToListeners (dart:async/future_impl.dart:711:32) #8 Future._completeWithValue (dart:async/future_impl.dart:526:5) #9 _AsyncAwaitCompleter.complete (dart:async-patch/async_patch.dart:36:15) #10 _completeOnAsyncReturn (dart:async-patch/async_patch.dart:298:13) #11 RunCommand.usageValues (package:flutter_tools/src/commands/run.dart) #12 _rootRunUnary (dart:async/zone.dart:1192:38) #13 _CustomZone.runUnary (dart:async/zone.dart:1085:19) #14 _FutureListener.handleValue (dart:async/future_impl.dart:141:18) #15 Future._propagateToListeners.handleValueCallback (dart:async/future_impl.dart:682:45) #16 Future._propagateToListeners (dart:async/future_impl.dart:711:32) #17 Future._completeWithValue (dart:async/future_impl.dart:526:5) #18 Future._asyncComplete.<anonymous closure> (dart:async/future_impl.dart:556:7) #19 _rootRun (dart:async/zone.dart:1184:13) #20 _CustomZone.run (dart:async/zone.dart:1077:19) #21 _CustomZone.runGuarded (dart:async/zone.dart:979:7) #22 _CustomZone.bindCallbackGuarded.<anonymous closure> (dart:async/zone.dart:1019:23) #23 _microtaskLoop (dart:async/schedule_microtask.dart:43:21) #24 _startMicrotaskLoop (dart:async/schedule_microtask.dart:52:5) #25 _runPendingImmediateCallback (dart:isolate-patch/isolate_patch.dart:118:13) #26 _ ``` </details> <!-- If possible, paste the output of running `flutter doctor -v` here. --> ``` Downloading android-arm-profile/darwin-x64 tools... 0,9s Downloading android-arm-release/darwin-x64 tools... 0,3s Downloading android-arm64-profile/darwin-x64 tools... 1,1s Downloading android-arm64-release/darwin-x64 tools... 0,7s Downloading android-x64-profile/darwin-x64 tools... 0,3s Downloading android-x64-release/darwin-x64 tools... 0,8s [✓] Flutter (Channel stable, v1.17.5, on Mac OS X 10.15.6 19G73, locale fr-FR) • Flutter version 1.17.5 at /Users/brandonguigo/development/flutter • Framework revision 8af6b2f038 (4 weeks ago), 2020-06-30 12:53:55 -0700 • Engine revision ee76268252 • Dart version 2.8.4 [✓] Android toolchain - develop for Android devices (Android SDK version 30.0.0) • Android SDK at /Users/brandonguigo/Library/Android/sdk • Platform android-30, build-tools 30.0.0 • Java binary at: /Users/brandonguigo/Library/Application Support/JetBrains/Toolbox/apps/AndroidStudio/ch-0/193.6514223/Android Studio.app/Contents/jre/jdk/Contents/Home/bin/java • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) • All Android licenses accepted. [✓] Xcode - develop for iOS and macOS (Xcode 12.0) • Xcode at /Applications/Xcode-beta.app/Contents/Developer • Xcode 12.0, Build version 12A8169g • CocoaPods version 1.9.3 [✓] Android Studio (version 4.0) • Android Studio at /Users/brandonguigo/Library/Application Support/JetBrains/Toolbox/apps/AndroidStudio/ch-0/193.6514223/Android Studio.app/Contents • Flutter plugin version 47.1.2 • Dart plugin version 193.7361 • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b3-6222593) [!] IntelliJ IDEA Ultimate Edition (version 2020.1.2) • IntelliJ at /Users/brandonguigo/Applications/JetBrains Toolbox/IntelliJ IDEA Ultimate.app ✗ Flutter plugin not installed; this adds Flutter specific functionality. ✗ Dart plugin not installed; this adds Dart specific functionality. • For information about installing plugins, see https://flutter.dev/intellij-setup/#installing-the-plugins [✓] VS Code (version 1.47.2) • VS Code at /Applications/Visual Studio Code.app/Contents • Flutter extension version 3.12.2 [✓] Connected device (1 available) • iPhone 11 • 14719026-2269-444E-9ABB-CD7421116C11 • ios • com.apple.CoreSimulator.SimRuntime.iOS-14-0 (simulator) ! Doctor found issues in 1 category. ```
non_priority
run with flavor doesn t use flavor app name in xcode thank you for using flutter if you are looking for support please check out our documentation or consider asking a question on stack overflow if you have found a bug or if our documentation doesn t have an answer to what you re looking for then fill out the template below please read our guide to filing a bug first hello to all maintainers of flutter i was trying to run my app on ios to see how it will handle the os change and i have noticed an issue i use flavors to launch my app so i launch flutter run with the flavor option and it build successfully with the xcode beta cli set but when it goes to the simulator installation steps i have the following error could not find the built application bundle at build ios iphonesimulator runner app error launching application on iphone the use of the flavors make the xcode cli generates the app with the right flavors name but at the installation step it search for runner app when it should search for flavorappname app steps to reproduce setup a flutter project with xcode scheme and flutter flavors flutter run flavor t lib flavor main dart see the error logs include the full logs of the commands you are running between the lines with the backticks below if you are running any flutter commands please include the output of running them with verbose for example the output of running flutter verbose create foo logs export mtl enable debug info yes export native arch export native arch bit export native arch bit export native arch actual export no common yes export objc abi version export object file dir users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build objects export object file dir normal users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build objects normal export objroot users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex export only active arch yes export os macos export osac usr bin osacompile export other ldflags framework flutter objc l c l l stdc l z framework appauth framework coregraphics framework coretelephony framework coretext framework crashlytics framework fblpromises framework fbsdkcorekit framework fbsdkloginkit framework firanalyticsconnector framework fabric framework firebaseabtesting framework firebaseanalytics framework firebaseauth framework firebasecore framework firebasecorediagnostics framework firebasefirestore framework firebaseinstallations framework flutter framework foundation framework gtmappauth framework gtmsessionfetcher framework googleappmeasurement framework googledatatransport framework googledatatransportcctsupport framework googlesignin framework googleutilities framework localauthentication framework mobilecoreservices framework protobuf framework reachability framework safariservices framework security framework storekit framework systemconfiguration framework uikit framework absl framework cloud firestore framework connectivity framework firebase analytics framework firebase auth framework firebase core framework firebase crashlytics framework flutter facebook login framework google sign in framework grpc framework grpcpp framework leveldb framework nanopb framework openssl grpc framework path provider framework shared preferences weak framework accelerate weak framework accounts weak framework audiotoolbox weak framework authenticationservices weak framework coregraphics weak framework coreloca executables folder path tallam testing app executables executable folder path tallam testing app executable name tallam testing executable path tallam testing app tallam testing expanded code sign identity expanded code sign identity name expanded provisioning profile file list users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build objects linkfilelist fixed files dir users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build fixedfiles flutter application path users brandonguigo tallam app flutter build dir build flutter build name flutter build number flutter framework dir users brandonguigo development flutter bin cache artifacts engine ios flutter root users brandonguigo development flutter flutter suppress analytics true flutter target lib main staging dart frameworks folder path tallam testing app frameworks framework flag prefix framework framework search paths users brandonguigo tallam app build ios debug staging iphonesimulator appauth users brandonguigo tallam app build ios debug staging iphonesimulator boringssl grpc users brandonguigo tallam app build ios debug staging iphonesimulator fbsdkcorekit users brandonguigo tallam app build ios debug staging iphonesimulator fbsdkloginkit users brandonguigo tallam app build ios debug staging iphonesimulator firebaseabtesting users brandonguigo tallam app build ios debug staging iphonesimulator firebaseauth users brandonguigo tallam app build ios debug staging iphonesimulator firebasecore users brandonguigo tallam app build ios debug staging iphonesimulator firebasecorediagnostics users brandonguigo tallam app build ios debug staging iphonesimulator firebasefirestore users brandonguigo tallam app build ios debug staging iphonesimulator firebaseinstallations users brandonguigo tallam app build ios debug staging iphonesimulator gtmappauth users brandonguigo tallam app build ios debug staging iphonesimulator gtmsessionfetcher users brandonguigo tallam app build ios debug staging iphonesimulator googledatatransport users brandonguigo tallam app build ios debug staging iphonesimulator googledatatransportcctsupport users brandonguigo tallam app build ios debug staging iphonesimulator googleutilities users brandonguigo tallam app build ios debug staging iphonesimulator promisesobjc users brandonguigo tallam app build ios debug staging iphonesimulator protobuf users brandonguigo tallam app build ios debug staging iphonesimulator reachability users brandonguigo tallam app build ios debug staging iphonesimulator abseil users brandonguigo tallam app build ios debug staging iphonesimulator cloud firestore users brandonguigo tallam app build ios debug staging iphonesimulator connectivity users brandonguigo t gcc symbols private extern no gcc treat warnings as errors no gcc version com apple compilers llvm clang gcc version identifier com apple compilers llvm clang gcc warn to bit conversion yes gcc warn about return type yes error gcc warn undeclared selector yes gcc warn uninitialized autos yes aggressive gcc warn unused function yes gcc warn unused variable yes generate master object file no generate pkginfo file yes generate profiling code no generate text based stubs no gid group staff headermap includes flat entries for target being built yes headermap includes framework entries for all product types yes headermap includes nonpublic nonprivate headers yes headermap includes project headers yes headermap uses framework prefix entries yes headermap uses vfs no header search paths users brandonguigo tallam app build ios debug staging iphonesimulator appauth appauth framework headers users brandonguigo tallam app build ios debug staging iphonesimulator boringssl grpc openssl grpc framework headers users brandonguigo tallam app build ios debug staging iphonesimulator fbsdkcorekit fbsdkcorekit framework headers users brandonguigo tallam app build ios debug staging iphonesimulator fbsdkloginkit fbsdkloginkit framework headers users brandonguigo tallam app build ios debug staging iphonesimulator firebaseabtesting firebaseabtesting framework headers users brandonguigo tallam app build ios debug staging iphonesimulator firebaseauth firebaseauth framework headers users brandonguigo tallam app build ios debug staging iphonesimulator firebasecore firebasecore framework headers users brandonguigo tallam app build ios debug staging iphonesimulator firebasecorediagnostics firebasecorediagnostics framework headers users brandonguigo tallam app build ios debug staging iphonesimulator firebasefirestore firebasefirestore framework headers users brandonguigo tallam app build ios debug staging iphonesimulator firebaseinstallations firebaseinstallations framework headers users brandonguigo tallam app build ios debug staging iphonesimulator gtmappauth gtmappauth framework headers users brandonguigo tallam app build ios debug staging iphonesimulator gtmsessionfetcher gtmsessionfetcher framework headers users brandonguigo tallam app build ios debug staging iphonesimulator googledatatransport googledatatransport framework headers users brandonguigo tallam app build ios debug staging iphonesimulator googledatatransportcctsupport googledatatransportcctsupport framework headers users brandonguigo tallam app build ios debug staging iphonesimulator googleutilities googleutilities framework headers users brand metal library file base default metal library output dir users brandonguigo tallam app build ios debug staging iphonesimulator tallam testing app modules folder path tallam testing app modules module cache dir users brandonguigo library developer xcode deriveddata modulecache noindex mtl enable debug info yes native arch native arch bit native arch bit native arch actual no common yes objc abi version object file dir users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build objects object file dir normal users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build objects normal objroot users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex only active arch yes os macos osac usr bin osacompile other ldflags objc l c l l stdc l z framework appauth framework coregraphics framework coretelephony framework coretext framework crashlytics framework fblpromises framework fbsdkcorekit framework fbsdkloginkit framework firanalyticsconnector framework fabric framework firebaseabtesting framework firebaseanalytics framework firebaseauth framework firebasecore framework firebasecorediagnostics framework firebasefirestore framework firebaseinstallations framework flutter framework foundation framework gtmappauth framework gtmsessionfetcher framework googleappmeasurement framework googledatatransport framework googledatatransportcctsupport framework googlesignin framework googleutilities framework localauthentication framework mobilecoreservices framework protobuf framework reachability framework safariservices framework security framework storekit framework systemconfiguration framework uikit framework absl framework cloud firestore framework connectivity framework firebase analytics framework firebase auth framework firebase core framework firebase crashlytics framework flutter facebook login framework google sign in framework grpc framework grpcpp framework leveldb framework nanopb framework openssl grpc framework path provider framework shared preferences weak framework accelerate weak framework accounts weak framework audiotoolbox weak framework authenticationservices weak framework coregraphics weak framework corelocation weak framework foundation weak framework quartzcore weak framework security weak framework social weak framework uikit package type com apple package type wrapper application package type com apple package type wrapper application pascal strings yes path applications xcode beta app contents developer usr bin opt mvn bin users brandonguigo development flutter bin users brandonguigo nvm versions node bin usr local bin usr bin bin usr sbin sbin library tex texbin library apple usr bin path prefixes excluded from header dependencies usr include usr local include system library frameworks system library privateframeworks applications xcode beta app contents developer headers applications xcode beta app contents developer sdks applications xcode beta app contents developer platforms pbdevelopmentplist path tallam testing app pbdevelopment plist pfe file c dialects objective c pkginfo file path users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build pkginfo pkginfo path tallam testing app pkginfo platform developer applications dir applications xcode beta app contents developer platforms iphonesimulator platform developer applications platform developer bin dir applications xcode beta app contents developer platforms iphonesimulator platform developer usr bin platform developer library dir applications xcode beta app contents plugins ideplugin contents sharedsupport developer library hide bitcode symbols yes home users brandonguigo iconv usr bin iconv infoplist expand build settings yes infoplist file runner info plist infoplist output format binary infoplist path tallam testing app info plist infoplist preprocess no infostrings path tallam testing app en lproj infoplist strings inline private frameworks no installhdrs copy phase no installhdrs script phase no install dir tmp runner dst applications install group staff install mode flag u w go w a rx install owner brandonguigo install path applications install root tmp runner dst iphoneos deployment target javac default flags j j xx newsize j dfile encoding java app stub system library frameworks javavm framework resources macos javaapplicationstub java archive classes yes framework version a full product name tallam testing app version gcc c language standard gcc dynamic no pic no gcc inlines are private extern yes gcc no common blocks yes gcc objc legacy dispatch yes gcc optimization level gcc pfe file c dialects c objective c c objective c gcc preprocessor definitions debug cocoapods debug fbsdkcocoapods debug gpb use protobuf framework imports debug pb field pb no packed structs pb enable malloc gcc symbols private extern no gcc treat warnings as errors no gcc version com apple compilers llvm clang gcc version identifier com apple compilers llvm clang gcc warn to bit conversion yes gcc warn about return type yes error gcc warn undeclared selector yes gcc warn uninitialized autos yes aggressive gcc warn unused function yes gcc warn unused variable yes generate master object file no export package type com apple package type wrapper application export pascal strings yes export path applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr local bin applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr libexec applications xcode beta app contents developer platforms iphonesimulator platform usr bin applications xcode beta app contents developer platforms iphonesimulator platform usr local bin applications xcode beta app contents developer platforms iphonesimulator platform developer usr bin applications xcode beta app contents developer platforms iphonesimulator platform developer usr local bin applications xcode beta app contents developer usr bin applications xcode beta app contents developer usr local bin opt mvn bin users brandonguigo development flutter bin users brandonguigo nvm versions node bin usr local bin usr bin bin usr sbin sbin library tex texbin library apple usr bin export path prefixes excluded from header dependencies usr include usr local include system library frameworks system library privateframeworks applications xcode beta app contents developer headers applications xcode beta app contents developer sdks applications xcode beta app contents developer platforms export pbdevelopmentplist path tallam testing app pbdevelopment plist export hide bitcode symbols yes export home users brandonguigo export iconv usr bin iconv export infoplist expand build settings yes export infoplist file runner info plist export infoplist output format binary export infoplist path tallam testing app info plist export infoplist preprocess no export infostrings path tallam testing app en lproj infoplist strings export inline private frameworks no export installhdrs copy phase no export installhdrs script phase no export install dir tmp runner dst applications export install group staff export install mode flag u w go w a rx export install owner brandonguigo export install path applications export install root tmp runner dst export iphoneos deployment target export javac default flags j j xx newsize j dfile encoding export java app stub system library frameworks javavm framework resources macos javaapplicationstub export framework version a export full product name tallam testing app export version export gcc c language standard export gcc dynamic no pic no export gcc inlines are private extern yes export gcc no common blocks yes export gcc objc legacy dispatch yes export gcc optimization level export gcc pfe file c dialects c objective c c objective c export gcc preprocessor definitions debug cocoapods debug fbsdkcocoapods debug gpb use protobuf framework imports debug pb field pb no packed structs pb enable malloc export gcc symbols private extern no export gcc treat warnings as errors no export gcc version com apple compilers llvm clang export gcc version identifier com apple compilers llvm clang export gcc warn to bit conversion yes export gcc warn about return type yes error export gcc warn undeclared selector yes export gcc warn uninitialized autos yes aggressive export gcc warn unused function yes export gcc warn unused variable yes export package type com apple package type wrapper application export pascal strings yes export path applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr local bin applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr libexec applications xcode beta app contents developer platforms iphonesimulator platform usr bin applications xcode beta app contents developer platforms iphonesimulator platform usr local bin applications xcode beta app contents developer platforms iphonesimulator platform developer usr bin applications xcode beta app contents developer platforms iphonesimulator platform developer usr local bin applications xcode beta app contents developer usr bin applications xcode beta app contents developer usr local bin opt mvn bin users brandonguigo development flutter bin users brandonguigo nvm versions node bin usr local bin usr bin bin usr sbin sbin library tex texbin library apple usr bin export path prefixes excluded from header dependencies usr include usr local include system library frameworks system library privateframeworks applications xcode beta app contents developer headers applications xcode beta app contents developer sdks applications xcode beta app contents developer platforms export pbdevelopmentplist path tallam testing app pbdevelopment plist export hide bitcode symbols yes export home users brandonguigo export iconv usr bin iconv export infoplist expand build settings yes export infoplist file runner info plist export infoplist output format binary export infoplist path tallam testing app info plist export infoplist preprocess no export infostrings path tallam testing app en lproj infoplist strings export inline private frameworks no export installhdrs copy phase no export installhdrs script phase no export install dir tmp runner dst applications export install group staff export install mode flag u w go w a rx export install owner brandonguigo export install path applications export install root tmp runner dst export iphoneos deployment target export javac default flags j j xx newsize j dfile encoding export java app stub system library frameworks javavm framework resources macos javaapplicationstub export framework version a export full product name tallam testing app export version export gcc c language standard export gcc dynamic no pic no export gcc inlines are private extern yes export gcc no common blocks yes export gcc objc legacy dispatch yes export gcc optimization level export gcc pfe file c dialects c objective c c objective c export gcc preprocessor definitions debug cocoapods debug fbsdkcocoapods debug gpb use protobuf framework imports debug pb field pb no packed structs pb enable malloc export gcc symbols private extern no export gcc treat warnings as errors no export gcc version com apple compilers llvm clang export gcc version identifier com apple compilers llvm clang export gcc warn to bit conversion yes export gcc warn about return type yes error export gcc warn undeclared selector yes export gcc warn uninitialized autos yes aggressive export gcc warn unused function yes export gcc warn unused variable yes processinfoplistfile users brandonguigo tallam app build ios debug staging iphonesimulator tallam testing app info plist users brandonguigo tallam app ios runner info plist in target runner from project runner cd users brandonguigo tallam app ios builtin infoplistutility users brandonguigo tallam app ios runner info plist producttype com apple product type application genpkginfo users brandonguigo tallam app build ios debug staging iphonesimulator tallam testing app pkginfo expandbuildsettings format binary platform iphonesimulator additionalcontentfile users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build base lproj launchscreen sbpartialinfo plist additionalcontentfile users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build base lproj main sbpartialinfo plist additionalcontentfile users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build assetcatalog generated info plist o users brandonguigo tallam app build ios debug staging iphonesimulator tallam testing app info plist ld users brandonguigo tallam app build ios debug staging iphonesimulator tallam testing app tallam testing normal in target runner from project runner cd users brandonguigo tallam app ios compilec users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build objects normal generatedpluginregistrant o users brandonguigo tallam app ios runner generatedpluginregistrant m normal objective c com apple compilers llvm clang compiler in target runner from project runner cd users brandonguigo tallam app ios export lang en us us ascii mergeswiftmodule normal in target runner from project runner cd users brandonguigo tallam app ios compileswift normal users brandonguigo tallam app ios runner appdelegate swift in target runner from project runner cd users brandonguigo tallam app ios precompileswiftbridgingheader normal in target runner from project runner cd users brandonguigo tallam app ios export package type com apple package type wrapper application export pascal strings yes export path applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr local bin applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr libexec applications xcode beta app contents developer platforms iphonesimulator platform usr bin applications xcode beta app contents developer platforms iphonesimulator platform usr local bin applications xcode beta app contents developer platforms iphonesimulator platform developer usr bin applications xcode beta app contents developer platforms iphonesimulator platform developer usr local bin applications xcode beta app contents developer usr bin applications xcode beta app contents developer usr local bin opt mvn bin users brandonguigo development flutter bin users brandonguigo nvm versions node bin usr local bin usr bin bin usr sbin sbin library tex texbin library apple usr bin export path prefixes excluded from header dependencies usr include usr local include system library frameworks system library privateframeworks applications xcode beta app contents developer headers applications xcode beta app contents developer sdks applications xcode beta app contents developer platforms export pbdevelopmentplist path tallam testing app pbdevelopment plist export hide bitcode symbols yes export home users brandonguigo export iconv usr bin iconv export infoplist expand build settings yes export infoplist file runner info plist export infoplist output format binary export infoplist path tallam testing app info plist export infoplist preprocess no export infostrings path tallam testing app en lproj infoplist strings export inline private frameworks no export installhdrs copy phase no export installhdrs script phase no export install dir tmp runner dst applications export install group staff export install mode flag u w go w a rx export install owner brandonguigo export install path applications export install root tmp runner dst export iphoneos deployment target export javac default flags j j xx newsize j dfile encoding export java app stub system library frameworks javavm framework resources macos javaapplicationstub export framework version a export full product name tallam testing app export version export gcc c language standard export gcc dynamic no pic no export gcc inlines are private extern yes export gcc no common blocks yes export gcc objc legacy dispatch yes export gcc optimization level export gcc pfe file c dialects c objective c c objective c export gcc preprocessor definitions debug cocoapods debug fbsdkcocoapods debug gpb use protobuf framework imports debug pb field pb no packed structs pb enable malloc export gcc symbols private extern no export gcc treat warnings as errors no export gcc version com apple compilers llvm clang export gcc version identifier com apple compilers llvm clang export gcc warn to bit conversion yes export gcc warn about return type yes error export gcc warn undeclared selector yes export gcc warn uninitialized autos yes aggressive export gcc warn unused function yes export gcc warn unused variable yes codesign users brandonguigo tallam app build ios debug staging iphonesimulator grpc c grpcpp framework in target grpc c from project pods cd users brandonguigo tallam app ios pods export codesign allocate applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin codesign allocate signing identity usr bin codesign force sign timestamp none users brandonguigo tallam app build ios debug staging iphonesimulator grpc c grpcpp framework users brandonguigo tallam app build ios debug staging iphonesimulator grpc c grpcpp framework replacing existing signature processproductpackaging users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex runner build debug staging iphonesimulator runner build tallam testing app xcent in target runner from project runner cd users brandonguigo tallam app ios entitlements compilec users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator cloud firestore build objects normal fltcloudfirestoreplugin o users brandonguigo pub cache hosted pub dartlang org cloud firestore ios classes fltcloudfirestoreplugin m normal objective c com apple compilers llvm clang compiler in target cloud firestore from project pods cd users brandonguigo tallam app ios pods export lang en us us ascii writeauxiliaryfile users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator pods runner build pods runner all target headers hmap in target pods runner from project pods cd users brandonguigo tallam app ios pods write file users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator pods runner build pods runner all target headers hmap compilec users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator firebase analytics build objects normal fltfirebaseanalyticsplugin o users brandonguigo pub cache hosted pub dartlang org firebase analytics ios classes fltfirebaseanalyticsplugin m normal objective c com apple compilers llvm clang compiler in target firebase analytics from project pods cd users brandonguigo tallam app ios pods export lang en us us ascii compilec users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator firebase core build objects normal fltfirebasecoreplugin o users brandonguigo pub cache hosted pub dartlang org firebase core ios classes fltfirebasecoreplugin m normal objective c com apple compilers llvm clang compiler in target firebase core from project pods cd users brandonguigo tallam app ios pods export lang en us us ascii compilec users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator firebase crashlytics build objects normal firebasecrashlyticsplugin o users brandonguigo pub cache hosted pub dartlang org firebase crashlytics ios classes firebasecrashlyticsplugin m normal objective c com apple compilers llvm clang compiler in target firebase crashlytics from project pods cd users brandonguigo tallam app ios pods export lang en us us ascii processinfoplistfile users brandonguigo tallam app build ios debug staging iphonesimulator flutter facebook login flutter facebook login framework info plist users brandonguigo tallam app ios pods target support files flutter facebook login flutter facebook login info plist in target flutter facebook login from project pods cd users brandonguigo tallam app ios pods builtin infoplistutility users brandonguigo tallam app ios pods target support files flutter facebook login flutter facebook login info plist producttype com apple product type framework expandbuildsettings format binary platform iphonesimulator o users brandonguigo tallam app build ios debug staging iphonesimulator flutter facebook login flutter facebook login framework info plist codesign users brandonguigo tallam app build ios debug staging iphonesimulator path provider path provider framework in target path provider from project pods cd users brandonguigo tallam app ios pods export codesign allocate applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin codesign allocate signing identity ld users brandonguigo tallam app build ios debug staging iphonesimulator shared preferences shared preferences framework shared preferences normal in target shared preferences from project pods cd users brandonguigo tallam app ios pods processinfoplistfile users brandonguigo tallam app build ios debug staging iphonesimulator google sign in google sign in framework info plist users brandonguigo tallam app ios pods target support files google sign in google sign in info plist in target google sign in from project pods cd users brandonguigo tallam app ios pods builtin infoplistutility users brandonguigo tallam app ios pods target support files google sign in google sign in info plist producttype com apple product type framework expandbuildsettings format binary platform iphonesimulator o users brandonguigo tallam app build ios debug staging iphonesimulator google sign in google sign in framework info plist ld users brandonguigo tallam app build ios debug staging iphonesimulator connectivity connectivity framework connectivity normal in target connectivity from project pods cd users brandonguigo tallam app ios pods processinfoplistfile users brandonguigo tallam app build ios debug staging iphonesimulator googleutilities googleutilities framework info plist users brandonguigo tallam app ios pods target support files googleutilities googleutilities info plist in target googleutilities from project pods cd users brandonguigo tallam app ios pods builtin infoplistutility users brandonguigo tallam app ios pods target support files googleutilities googleutilities info plist producttype com apple product type framework expandbuildsettings format binary platform iphonesimulator o users brandonguigo tallam app build ios debug staging iphonesimulator googleutilities googleutilities framework info plist processinfoplistfile users brandonguigo tallam app build ios debug staging iphonesimulator googledatatransportcctsupport googledatatransportcctsupport framework info plist users brandonguigo tallam app ios pods target support files googledatatransportcctsupport googledatatransportcctsupport info plist in target googledatatransportcctsupport from project pods cd users brandonguigo tallam app ios pods builtin infoplistutility users brandonguigo tallam app ios pods target support files googledatatransportcctsupport googledatatransportcctsupport info plist producttype com apple product type framework expandbuildsettings format binary platform iphonesimulator o users brandonguigo tallam app build ios debug staging iphonesimulator googledatatransportcctsupport googledatatransportcctsupport framework info plist writeauxiliaryfile users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator firebasecore build firebasecore all target headers hmap in target firebasecore from project pods cd users brandonguigo tallam app ios pods write file users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator firebasecore build firebasecore all target headers hmap codesign users brandonguigo tallam app build ios debug staging iphonesimulator boringssl grpc openssl grpc framework in target boringssl grpc from project pods cd users brandonguigo tallam app ios pods export codesign allocate applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin codesign allocate signing identity usr bin codesign force sign timestamp none users brandonguigo tallam app build ios debug staging iphonesimulator boringssl grpc openssl grpc framework compilec users brandonguigo library developer xcode deriveddata runner aayyjyuncawiwkbwtdouldjbxlfc build intermediates noindex pods build debug staging iphonesimulator flutter facebook login build objects normal facebookloginplugin o users brandonguigo pub cache hosted pub dartlang org flutter facebook login ios classes facebookloginplugin m normal objective c com apple compilers llvm clang compiler in target flutter facebook login from project pods cd users brandonguigo tallam app ios pods export lang en us us ascii codesign users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework in target nanopb from project pods cd users brandonguigo tallam app ios pods export codesign allocate applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin codesign allocate signing identity usr bin codesign force sign timestamp none users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework replacing existing signature codesign users brandonguigo tallam app build ios debug staging iphonesimulator grpc c grpccertificates cpp bundle in target grpc c grpccertificates cpp from project pods cd users brandonguigo tallam app ios pods export codesign allocate applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin codesign allocate signing identity generatedsymfile users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework dsym users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework nanopb in target nanopb from project pods cd users brandonguigo tallam app ios pods applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin dsymutil users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework nanopb o users brandonguigo tallam app build ios debug staging iphonesimulator nanopb nanopb framework dsym codesign users brandonguigo tallam app build ios debug staging iphonesimulator promisesobjc fblpromises framework in target promisesobjc from project pods cd users brandonguigo tallam app ios pods export codesign allocate applications xcode beta app contents developer toolchains xcodedefault xctoolchain usr bin codesign allocate signing identity usr bin codesign force sign timestamp none users brandonguigo tallam app build ios debug staging iphonesimulator promisesobjc fblpromises framework package type com apple package type wrapper application pascal strings yes path applications xcode beta app contents developer usr bin opt mvn bin users brandonguigo development flutter bin users brandonguigo nvm versions node bin usr local bin usr bin bin usr sbin sbin library tex texbin library apple usr bin path prefixes excluded from header dependencies usr include usr local include system library frameworks system library privateframeworks applications xcode beta app contents developer headers applications xcode beta app contents developer sdks applications xcode beta app contents developer platforms pbdevelopmentplist path tallam testing app pbdevelopment plist pfe file c dialects objective c pkginfo file path users brandonguigo tallam app build ios runner build release staging iphoneos runner build pkginfo pkginfo path tallam testing app pkginfo platform developer applications dir applications xcode beta app contents developer platforms iphoneos platform developer applications platform developer bin dir applications xcode beta app contents developer platforms iphoneos platform developer usr bin platform developer library dir applications xcode beta app contents plugins ideplugin contents sharedsupport developer library platform developer sdk dir applications xcode beta app contents developer platforms iphoneos platform developer sdks hide bitcode symbols yes home users brandonguigo iconv usr bin iconv infoplist expand build settings yes infoplist file runner info plist infoplist output format binary infoplist path tallam testing app info plist infoplist preprocess no infostrings path tallam testing app en lproj infoplist strings inline private frameworks no installhdrs copy phase no installhdrs script phase no install dir tmp runner dst applications install group staff install mode flag u w go w a rx install owner brandonguigo install path applications install root tmp runner dst iphoneos deployment target javac default flags j j xx newsize j dfile encoding java app stub system library frameworks javavm framework resources macos javaapplicationstub java archive classes yes framework version a full product name tallam testing app version gcc c language standard gcc inlines are private extern yes gcc no common blocks yes gcc pfe file c dialects c objective c c objective c gcc preprocessor definitions cocoapods fbsdkcocoapods gpb use protobuf framework imports pb field pb no packed structs pb enable malloc gcc symbols private extern yes gcc thumb support yes gcc treat warnings as errors no gcc version com apple compilers llvm clang gcc version identifier com apple compilers llvm clang gcc warn to bit conversion yes gcc warn about return type yes error gcc warn undeclared selector yes gcc warn uninitialized autos yes aggressive gcc warn unused function yes gcc warn unused variable yes generate master object file no generate pkginfo file yes generate profiling code no executing git c log showsignature false log n pretty format h exit code from git c log showsignature false log n pretty format h executing git tag contains head exit code from git tag contains head executing git rev parse abbrev ref symbolic u exit code from git rev parse abbrev ref symbolic u origin stable executing git ls remote get url origin exit code from git ls remote get url origin executing git rev parse abbrev ref head exit code from git rev parse abbrev ref head stable executing sw vers productname exit code from sw vers productname mac os x could not find the built application bundle at build ios iphonesimulator runner app error launching application on iphone throwtoolexit package flutter tools src base common dart runcommand runcommand package flutter tools src commands run dart fluttercommand verifythenruncommand package flutter tools src runner flutter command dart rootrununary dart async zone dart customzone rununary dart async zone dart futurelistener handlevalue dart async future impl dart future propagatetolisteners handlevaluecallback dart async future impl dart future propagatetolisteners dart async future impl dart future completewithvalue dart async future impl dart asyncawaitcompleter complete dart async patch async patch dart completeonasyncreturn dart async patch async patch dart runcommand usagevalues package flutter tools src commands run dart rootrununary dart async zone dart customzone rununary dart async zone dart futurelistener handlevalue dart async future impl dart future propagatetolisteners handlevaluecallback dart async future impl dart future propagatetolisteners dart async future impl dart future completewithvalue dart async future impl dart future asynccomplete dart async future impl dart rootrun dart async zone dart customzone run dart async zone dart customzone runguarded dart async zone dart customzone bindcallbackguarded dart async zone dart microtaskloop dart async schedule microtask dart startmicrotaskloop dart async schedule microtask dart runpendingimmediatecallback dart isolate patch isolate patch dart downloading android arm profile darwin tools downloading android arm release darwin tools downloading android profile darwin tools downloading android release darwin tools downloading android profile darwin tools downloading android release darwin tools flutter channel stable on mac os x locale fr fr • flutter version at users brandonguigo development flutter • framework revision weeks ago • engine revision • dart version android toolchain develop for android devices android sdk version • android sdk at users brandonguigo library android sdk • platform android build tools • java binary at users brandonguigo library application support jetbrains toolbox apps androidstudio ch android studio app contents jre jdk contents home bin java • java version openjdk runtime environment build release • all android licenses accepted xcode develop for ios and macos xcode • xcode at applications xcode beta app contents developer • xcode build version • cocoapods version android studio version • android studio at users brandonguigo library application support jetbrains toolbox apps androidstudio ch android studio app contents • flutter plugin version • dart plugin version • java version openjdk runtime environment build release intellij idea ultimate edition version • intellij at users brandonguigo applications jetbrains toolbox intellij idea ultimate app ✗ flutter plugin not installed this adds flutter specific functionality ✗ dart plugin not installed this adds dart specific functionality • for information about installing plugins see vs code version • vs code at applications visual studio code app contents • flutter extension version connected device available • iphone • • ios • com apple coresimulator simruntime ios simulator doctor found issues in category
0
54,141
7,875,211,522
IssuesEvent
2018-06-25 19:39:13
gritzko/ron
https://api.github.com/repos/gritzko/ron
opened
String ⊂ Atom ⊂ UUID?
documentation
Can a UUID be an atom? Can an atom be a string? How does UTF-8 string fit in 16 bytes?
1.0
String ⊂ Atom ⊂ UUID? - Can a UUID be an atom? Can an atom be a string? How does UTF-8 string fit in 16 bytes?
non_priority
string ⊂ atom ⊂ uuid can a uuid be an atom can an atom be a string how does utf string fit in bytes
0
104,803
9,010,078,837
IssuesEvent
2019-02-05 10:54:48
YaccConstructor/YaccConstructor
https://api.github.com/repos/YaccConstructor/YaccConstructor
closed
Replace FSharpx.Text.StructuredFormat with YC.PrettyPrinter
SimpleTestTask good first issue task up-for-grabs
YC.PrettyPrinter is an improved version of FSharpx.Text.StructuredFormat. Replace FSharpx.Text.StructuredFormat with YC.PrettyPrinter everywhere in YC.
1.0
Replace FSharpx.Text.StructuredFormat with YC.PrettyPrinter - YC.PrettyPrinter is an improved version of FSharpx.Text.StructuredFormat. Replace FSharpx.Text.StructuredFormat with YC.PrettyPrinter everywhere in YC.
non_priority
replace fsharpx text structuredformat with yc prettyprinter yc prettyprinter is an improved version of fsharpx text structuredformat replace fsharpx text structuredformat with yc prettyprinter everywhere in yc
0
7,929
6,304,945,691
IssuesEvent
2017-07-21 17:08:10
mozilla/thimble.mozilla.org
https://api.github.com/repos/mozilla/thimble.mozilla.org
opened
Switch to heroku-postbuild
Performance
This is an experiment and might not work but is worth a try. We use the `postinstall` script to build Thimble so that Heroku is able to run the build in its build phase and not timeout when binding to a port. This however is quite annoying for local development (especially for new contributors) since the build is run when you run `npm install` and also in the `start` script. Heroku seems to support a script called `heroku-postbuild` where we might be able to run the build step instead of relying on `postinstall`. Although the name says `postbuild`, the docs seem to indicate that it "can be used to build production assets`, but, I'm not sure (hence this is an experiment). Worth giving it a shot though. I'll take this on as I build on adding webpack to Thimble.
True
Switch to heroku-postbuild - This is an experiment and might not work but is worth a try. We use the `postinstall` script to build Thimble so that Heroku is able to run the build in its build phase and not timeout when binding to a port. This however is quite annoying for local development (especially for new contributors) since the build is run when you run `npm install` and also in the `start` script. Heroku seems to support a script called `heroku-postbuild` where we might be able to run the build step instead of relying on `postinstall`. Although the name says `postbuild`, the docs seem to indicate that it "can be used to build production assets`, but, I'm not sure (hence this is an experiment). Worth giving it a shot though. I'll take this on as I build on adding webpack to Thimble.
non_priority
switch to heroku postbuild this is an experiment and might not work but is worth a try we use the postinstall script to build thimble so that heroku is able to run the build in its build phase and not timeout when binding to a port this however is quite annoying for local development especially for new contributors since the build is run when you run npm install and also in the start script heroku seems to support a script called heroku postbuild where we might be able to run the build step instead of relying on postinstall although the name says postbuild the docs seem to indicate that it can be used to build production assets but i m not sure hence this is an experiment worth giving it a shot though i ll take this on as i build on adding webpack to thimble
0
370,494
25,910,566,236
IssuesEvent
2022-12-15 13:40:57
Requisitos-de-Software/2022.2-GoogleMaps
https://api.github.com/repos/Requisitos-de-Software/2022.2-GoogleMaps
opened
Aprimorar a priorização de requisitos
documentation
- [ ] Criar uma tabela só com todos os requisitos na página de priorização - [ ] Aplicar as técnicas de priorização - [ ] Adicionar um requisito que aborde a ação de criar um estabelecimento
1.0
Aprimorar a priorização de requisitos - - [ ] Criar uma tabela só com todos os requisitos na página de priorização - [ ] Aplicar as técnicas de priorização - [ ] Adicionar um requisito que aborde a ação de criar um estabelecimento
non_priority
aprimorar a priorização de requisitos criar uma tabela só com todos os requisitos na página de priorização aplicar as técnicas de priorização adicionar um requisito que aborde a ação de criar um estabelecimento
0
29,866
24,351,271,595
IssuesEvent
2022-10-03 00:17:29
fahadahmed/coding-pixels
https://api.github.com/repos/fahadahmed/coding-pixels
closed
Deploy the solution to Firebase and Cloud Run
task infrastructure
# Overview Deploy the whole solution on Firebase and Cloud Run. A lot of the features are alpha features hence this is an experimental product launch. ## Tasks ### Design tasks - [ ] Deploy NextJS App to Firebase Hosting - [ ] Deploy Strapi CMS to Cloud Run with database selected as Firestore - [ ] Configure Github Actions to appropriately run CI/CD pipelines to deploy relevant code to the right infrastructure
1.0
Deploy the solution to Firebase and Cloud Run - # Overview Deploy the whole solution on Firebase and Cloud Run. A lot of the features are alpha features hence this is an experimental product launch. ## Tasks ### Design tasks - [ ] Deploy NextJS App to Firebase Hosting - [ ] Deploy Strapi CMS to Cloud Run with database selected as Firestore - [ ] Configure Github Actions to appropriately run CI/CD pipelines to deploy relevant code to the right infrastructure
non_priority
deploy the solution to firebase and cloud run overview deploy the whole solution on firebase and cloud run a lot of the features are alpha features hence this is an experimental product launch tasks design tasks deploy nextjs app to firebase hosting deploy strapi cms to cloud run with database selected as firestore configure github actions to appropriately run ci cd pipelines to deploy relevant code to the right infrastructure
0
80,559
23,243,749,018
IssuesEvent
2022-08-03 17:59:23
elastic/beats
https://api.github.com/repos/elastic/beats
closed
Build 712 for main with status FAILURE
automation ci-reported Team:Elastic-Agent-Data-Plane build-failures
## :broken_heart: Tests Failed <!-- BUILD BADGES--> > _the below badges are clickable and redirect to their specific view in the CI or DOCS_ [![Pipeline View](https://img.shields.io/badge/pipeline-pipeline%20-green)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//pipeline) [![Test View](https://img.shields.io/badge/test-test-green)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//tests) [![Changes](https://img.shields.io/badge/changes-changes-green)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//changes) [![Artifacts](https://img.shields.io/badge/artifacts-artifacts-yellow)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//artifacts) [![preview](https://img.shields.io/badge/docs-preview-yellowgreen)](http://beats_null.docs-preview.app.elstc.co/diff) [![preview](https://img.shields.io/badge/elastic-observability-blue)](https://ci-stats.elastic.co/app/apm/services/beats-ci/transactions/view?rangeFrom=2022-07-25T23:59:52.256Z&rangeTo=2022-07-26T00:19:52.256Z&transactionName=Beats/beats/main&transactionType=job&latencyAggregationType=avg&traceId=21d63e45be6ba4395351625972d3ace4&transactionId=ec1f8fb8f044a52c) <!-- BUILD SUMMARY--> <details><summary>Expand to view the summary</summary> <p> #### Build stats * Start Time: 2022-07-26T00:09:52.256+0000 * Duration: 148 min 2 sec #### Test stats :test_tube: | Test | Results | | ------------ | :-----------------------------: | | Failed | 2 | | Passed | 50593 | | Skipped | 5808 | | Total | 56403 | </p> </details> <!-- TEST RESULTS IF ANY--> ### Test errors [![2](https://img.shields.io/badge/2%20-red)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//tests) <details><summary>Expand to view the tests failures</summary><p> ##### `ExtendedWin / x-pack/auditbeat-windows-10-windows-10 / TestLinkedListRemoveOlderNoAllocs – github.com/elastic/beats/v7/x-pack/auditbeat/module/system/socket/helper` <ul> <details><summary>Expand to view the error details</summary><p> ``` Failed ``` </p></details> <details><summary>Expand to view the stacktrace</summary><p> ``` === RUN TestLinkedListRemoveOlderNoAllocs linkedlist_test.go:111: Error Trace: linkedlist_test.go:111 Error: Should be zero, but was 1 Test: TestLinkedListRemoveOlderNoAllocs --- FAIL: TestLinkedListRemoveOlderNoAllocs (1.54s) ``` </p></details> </ul> ##### `ExtendedWin / x-pack/auditbeat-windows-11-windows-11 / TestLinkedListRemoveOlderNoAllocs – github.com/elastic/beats/v7/x-pack/auditbeat/module/system/socket/helper` <ul> <details><summary>Expand to view the error details</summary><p> ``` Failed ``` </p></details> <details><summary>Expand to view the stacktrace</summary><p> ``` === RUN TestLinkedListRemoveOlderNoAllocs linkedlist_test.go:111: Error Trace: linkedlist_test.go:111 Error: Should be zero, but was 1 Test: TestLinkedListRemoveOlderNoAllocs --- FAIL: TestLinkedListRemoveOlderNoAllocs (1.54s) ``` </p></details> </ul> </p></details> <!-- STEPS ERRORS IF ANY --> ### Steps errors [![8](https://img.shields.io/badge/8%20-red)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//pipeline) <details><summary>Expand to view the steps failures</summary> <p> ##### `metricbeat-goIntegTest - mage goIntegTest` <ul> <li>Took 30 min 27 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/17240/log/?start=0">here</a></li> <li>Description: <code>mage goIntegTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-11-windows-11 - mage build unitTest` <ul> <li>Took 3 min 29 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/36295/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-11-windows-11 - mage build unitTest` <ul> <li>Took 1 min 32 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37592/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-11-windows-11 - mage build unitTest` <ul> <li>Took 1 min 31 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37876/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-10-windows-10 - mage build unitTest` <ul> <li>Took 3 min 27 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/36119/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-10-windows-10 - mage build unitTest` <ul> <li>Took 1 min 33 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37588/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-10-windows-10 - mage build unitTest` <ul> <li>Took 1 min 34 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37746/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `Error signal` <ul> <li>Took 0 min 0 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/38134/log/?start=0">here</a></li> <li>Description: <code>Error "hudson.AbortException: script returned exit code 1"</code></l1> </ul> </p> </details>
1.0
Build 712 for main with status FAILURE - ## :broken_heart: Tests Failed <!-- BUILD BADGES--> > _the below badges are clickable and redirect to their specific view in the CI or DOCS_ [![Pipeline View](https://img.shields.io/badge/pipeline-pipeline%20-green)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//pipeline) [![Test View](https://img.shields.io/badge/test-test-green)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//tests) [![Changes](https://img.shields.io/badge/changes-changes-green)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//changes) [![Artifacts](https://img.shields.io/badge/artifacts-artifacts-yellow)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//artifacts) [![preview](https://img.shields.io/badge/docs-preview-yellowgreen)](http://beats_null.docs-preview.app.elstc.co/diff) [![preview](https://img.shields.io/badge/elastic-observability-blue)](https://ci-stats.elastic.co/app/apm/services/beats-ci/transactions/view?rangeFrom=2022-07-25T23:59:52.256Z&rangeTo=2022-07-26T00:19:52.256Z&transactionName=Beats/beats/main&transactionType=job&latencyAggregationType=avg&traceId=21d63e45be6ba4395351625972d3ace4&transactionId=ec1f8fb8f044a52c) <!-- BUILD SUMMARY--> <details><summary>Expand to view the summary</summary> <p> #### Build stats * Start Time: 2022-07-26T00:09:52.256+0000 * Duration: 148 min 2 sec #### Test stats :test_tube: | Test | Results | | ------------ | :-----------------------------: | | Failed | 2 | | Passed | 50593 | | Skipped | 5808 | | Total | 56403 | </p> </details> <!-- TEST RESULTS IF ANY--> ### Test errors [![2](https://img.shields.io/badge/2%20-red)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//tests) <details><summary>Expand to view the tests failures</summary><p> ##### `ExtendedWin / x-pack/auditbeat-windows-10-windows-10 / TestLinkedListRemoveOlderNoAllocs – github.com/elastic/beats/v7/x-pack/auditbeat/module/system/socket/helper` <ul> <details><summary>Expand to view the error details</summary><p> ``` Failed ``` </p></details> <details><summary>Expand to view the stacktrace</summary><p> ``` === RUN TestLinkedListRemoveOlderNoAllocs linkedlist_test.go:111: Error Trace: linkedlist_test.go:111 Error: Should be zero, but was 1 Test: TestLinkedListRemoveOlderNoAllocs --- FAIL: TestLinkedListRemoveOlderNoAllocs (1.54s) ``` </p></details> </ul> ##### `ExtendedWin / x-pack/auditbeat-windows-11-windows-11 / TestLinkedListRemoveOlderNoAllocs – github.com/elastic/beats/v7/x-pack/auditbeat/module/system/socket/helper` <ul> <details><summary>Expand to view the error details</summary><p> ``` Failed ``` </p></details> <details><summary>Expand to view the stacktrace</summary><p> ``` === RUN TestLinkedListRemoveOlderNoAllocs linkedlist_test.go:111: Error Trace: linkedlist_test.go:111 Error: Should be zero, but was 1 Test: TestLinkedListRemoveOlderNoAllocs --- FAIL: TestLinkedListRemoveOlderNoAllocs (1.54s) ``` </p></details> </ul> </p></details> <!-- STEPS ERRORS IF ANY --> ### Steps errors [![8](https://img.shields.io/badge/8%20-red)](https://beats-ci.elastic.co/blue/organizations/jenkins/Beats%2Fbeats%2Fmain/detail/main/712//pipeline) <details><summary>Expand to view the steps failures</summary> <p> ##### `metricbeat-goIntegTest - mage goIntegTest` <ul> <li>Took 30 min 27 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/17240/log/?start=0">here</a></li> <li>Description: <code>mage goIntegTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-11-windows-11 - mage build unitTest` <ul> <li>Took 3 min 29 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/36295/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-11-windows-11 - mage build unitTest` <ul> <li>Took 1 min 32 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37592/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-11-windows-11 - mage build unitTest` <ul> <li>Took 1 min 31 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37876/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-10-windows-10 - mage build unitTest` <ul> <li>Took 3 min 27 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/36119/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-10-windows-10 - mage build unitTest` <ul> <li>Took 1 min 33 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37588/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `x-pack/auditbeat-windows-10-windows-10 - mage build unitTest` <ul> <li>Took 1 min 34 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/37746/log/?start=0">here</a></li> <li>Description: <code>mage build unitTest</code></l1> </ul> ##### `Error signal` <ul> <li>Took 0 min 0 sec . View more details <a href="https://beats-ci.elastic.co//blue/rest/organizations/jenkins/pipelines/Beats/pipelines/beats/pipelines/main/runs/712/steps/38134/log/?start=0">here</a></li> <li>Description: <code>Error "hudson.AbortException: script returned exit code 1"</code></l1> </ul> </p> </details>
non_priority
build for main with status failure broken heart tests failed the below badges are clickable and redirect to their specific view in the ci or docs expand to view the summary build stats start time duration min sec test stats test tube test results failed passed skipped total test errors expand to view the tests failures extendedwin x pack auditbeat windows windows testlinkedlistremoveoldernoallocs – github com elastic beats x pack auditbeat module system socket helper expand to view the error details failed expand to view the stacktrace run testlinkedlistremoveoldernoallocs linkedlist test go error trace linkedlist test go error should be zero but was test testlinkedlistremoveoldernoallocs fail testlinkedlistremoveoldernoallocs extendedwin x pack auditbeat windows windows testlinkedlistremoveoldernoallocs – github com elastic beats x pack auditbeat module system socket helper expand to view the error details failed expand to view the stacktrace run testlinkedlistremoveoldernoallocs linkedlist test go error trace linkedlist test go error should be zero but was test testlinkedlistremoveoldernoallocs fail testlinkedlistremoveoldernoallocs steps errors expand to view the steps failures metricbeat gointegtest mage gointegtest took min sec view more details a href description mage gointegtest x pack auditbeat windows windows mage build unittest took min sec view more details a href description mage build unittest x pack auditbeat windows windows mage build unittest took min sec view more details a href description mage build unittest x pack auditbeat windows windows mage build unittest took min sec view more details a href description mage build unittest x pack auditbeat windows windows mage build unittest took min sec view more details a href description mage build unittest x pack auditbeat windows windows mage build unittest took min sec view more details a href description mage build unittest x pack auditbeat windows windows mage build unittest took min sec view more details a href description mage build unittest error signal took min sec view more details a href description error hudson abortexception script returned exit code
0
13,811
16,533,099,231
IssuesEvent
2021-05-27 08:37:43
spring-projects-experimental/spring-native
https://api.github.com/repos/spring-projects-experimental/spring-native
closed
Add initial Spring Session support
type: compatibility
[We already have hints](https://github.com/spring-projects-experimental/spring-native/blob/master/spring-native-configuration/src/main/java/org/springframework/boot/autoconfigure/session/SessionHints.java) but no sample, so we should probably add reactive and non-reactive samples and update the support documentation accordingly.
True
Add initial Spring Session support - [We already have hints](https://github.com/spring-projects-experimental/spring-native/blob/master/spring-native-configuration/src/main/java/org/springframework/boot/autoconfigure/session/SessionHints.java) but no sample, so we should probably add reactive and non-reactive samples and update the support documentation accordingly.
non_priority
add initial spring session support but no sample so we should probably add reactive and non reactive samples and update the support documentation accordingly
0
51,698
27,199,151,664
IssuesEvent
2023-02-20 08:25:46
tensorflow/tensorflow
https://api.github.com/repos/tensorflow/tensorflow
closed
XLA compilation slow on new calls although no recompiling is performed
comp:xla type:performance TF 2.7
<details><summary>Click to expand!</summary> ### Issue Type Performance ### Have you reproduced the bug with TF nightly? No ### Source source ### Tensorflow Version v2.7.0-rc1-69-gc256c071bb2 2.7.0 ### Custom Code Yes ### OS Platform and Distribution Windows 10 ### Mobile device _No response_ ### Python version 3.9 ### Bazel version _No response_ ### GCC/Compiler version _No response_ ### CUDA/cuDNN version _No response_ ### GPU model and memory _No response_ ### Current Behaviour? ```shell (ON CPU) After compilation I expect speed up in speed using @tf.function(jit_compile=True). This is the case, however when used in a loop some of the iterations happen almost instantly whilst others take quite a long time. I feels like the code is recompiling, however using print statements I see that this is not the case. At first I thought there could be easy and difficult input samples to the function, however for further debugging I added an additional loop that just repeats every function evaluation multiple times. Here I saw that it is just one time a very slow one (feels like recompiling) and afterwards on the same input and exact same function it's really quick. No additional print statement is executed, hinting to the fact that the function is not compiled again. I was wondering if this is a known issue and if so how to fix it. The last function below is called in a main script and makes use of a tf.keras.layers.Layer object and its call function. The call function is also given below and makes use of the jit_compiled function RK_multistep. ``` ### Standalone code to reproduce the issue ```shell @tf.function(jit_compile=True) def RK_multistep(hybMod, x_k, u_k, dt): print("compiling RK") M = 5 DT = dt/M ... def call(self, model, x_k, u_k): print("----- START RK repeats -----") t1 = time.time() for k in range(3): t3 = time.time() x_kk = self.method(model, x_k, u_k, self.dt) t4 = time.time() print(f"RK iteration {k} took {t4 - t3}") t2 = time.time() print(f"All RK iterations Took {t2 - t1}") print("----- END RK repeats -----") x_kk = self.RK_multistep(model, x_k, u_k, self.dt) return x_kk print("----- START model in batches -----") t1 = time.time() for k in range(20): t3 = time.time() Xbatch = np.expand_dims(X_train[k, :], 0) # add batch dimension: shape (1, state_dims) Ubatch = np.expand_dims(Utrain[1][k, :, :], 0) # add batch dimension: shape (1, prediction_length, control_dims) model_input = [Xbatch, Ubatch] Modelout = model(model_input) # here the model is called that used the call as defined above t4 = time.time() print(f"Outer layer iteration {k} took {t4 - t3}") t2 = time.time() print(f"Took {t2-t1}") ``` ### Relevant log output ```shell ----- START model in batches ----- compiling g compiling g_inner compiling PI_big compiling flow compiling flow ----- START RK repeats ----- compiling RK compiling f compiling forcebalance compiling pressure_change RK iteration 0 took 16.773661613464355 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 16.773661613464355 ----- END RK repeats ----- Outer layer iteration 0 took 17.035797357559204 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 1 took 0.015622138977050781 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 2 took 0.0 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 3 took 0.0 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 4 took 0.015624761581420898 ----- START RK repeats ----- RK iteration 0 took 15.472918510437012 RK iteration 1 took 0.01561427116394043 RK iteration 2 took 0.0 All RK iterations Took 15.488532781600952 ----- END RK repeats ----- Outer layer iteration 5 took 15.488532781600952 ----- START RK repeats ----- RK iteration 0 took 14.715417385101318 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 14.715417385101318 ----- END RK repeats ----- Outer layer iteration 6 took 14.715417385101318 ----- START RK repeats ----- RK iteration 0 took 13.904020547866821 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 13.904020547866821 ----- END RK repeats ----- Outer layer iteration 7 took 13.921808958053589 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 8 took 0.0 ... ``` </details>
True
XLA compilation slow on new calls although no recompiling is performed - <details><summary>Click to expand!</summary> ### Issue Type Performance ### Have you reproduced the bug with TF nightly? No ### Source source ### Tensorflow Version v2.7.0-rc1-69-gc256c071bb2 2.7.0 ### Custom Code Yes ### OS Platform and Distribution Windows 10 ### Mobile device _No response_ ### Python version 3.9 ### Bazel version _No response_ ### GCC/Compiler version _No response_ ### CUDA/cuDNN version _No response_ ### GPU model and memory _No response_ ### Current Behaviour? ```shell (ON CPU) After compilation I expect speed up in speed using @tf.function(jit_compile=True). This is the case, however when used in a loop some of the iterations happen almost instantly whilst others take quite a long time. I feels like the code is recompiling, however using print statements I see that this is not the case. At first I thought there could be easy and difficult input samples to the function, however for further debugging I added an additional loop that just repeats every function evaluation multiple times. Here I saw that it is just one time a very slow one (feels like recompiling) and afterwards on the same input and exact same function it's really quick. No additional print statement is executed, hinting to the fact that the function is not compiled again. I was wondering if this is a known issue and if so how to fix it. The last function below is called in a main script and makes use of a tf.keras.layers.Layer object and its call function. The call function is also given below and makes use of the jit_compiled function RK_multistep. ``` ### Standalone code to reproduce the issue ```shell @tf.function(jit_compile=True) def RK_multistep(hybMod, x_k, u_k, dt): print("compiling RK") M = 5 DT = dt/M ... def call(self, model, x_k, u_k): print("----- START RK repeats -----") t1 = time.time() for k in range(3): t3 = time.time() x_kk = self.method(model, x_k, u_k, self.dt) t4 = time.time() print(f"RK iteration {k} took {t4 - t3}") t2 = time.time() print(f"All RK iterations Took {t2 - t1}") print("----- END RK repeats -----") x_kk = self.RK_multistep(model, x_k, u_k, self.dt) return x_kk print("----- START model in batches -----") t1 = time.time() for k in range(20): t3 = time.time() Xbatch = np.expand_dims(X_train[k, :], 0) # add batch dimension: shape (1, state_dims) Ubatch = np.expand_dims(Utrain[1][k, :, :], 0) # add batch dimension: shape (1, prediction_length, control_dims) model_input = [Xbatch, Ubatch] Modelout = model(model_input) # here the model is called that used the call as defined above t4 = time.time() print(f"Outer layer iteration {k} took {t4 - t3}") t2 = time.time() print(f"Took {t2-t1}") ``` ### Relevant log output ```shell ----- START model in batches ----- compiling g compiling g_inner compiling PI_big compiling flow compiling flow ----- START RK repeats ----- compiling RK compiling f compiling forcebalance compiling pressure_change RK iteration 0 took 16.773661613464355 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 16.773661613464355 ----- END RK repeats ----- Outer layer iteration 0 took 17.035797357559204 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 1 took 0.015622138977050781 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 2 took 0.0 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 3 took 0.0 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 4 took 0.015624761581420898 ----- START RK repeats ----- RK iteration 0 took 15.472918510437012 RK iteration 1 took 0.01561427116394043 RK iteration 2 took 0.0 All RK iterations Took 15.488532781600952 ----- END RK repeats ----- Outer layer iteration 5 took 15.488532781600952 ----- START RK repeats ----- RK iteration 0 took 14.715417385101318 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 14.715417385101318 ----- END RK repeats ----- Outer layer iteration 6 took 14.715417385101318 ----- START RK repeats ----- RK iteration 0 took 13.904020547866821 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 13.904020547866821 ----- END RK repeats ----- Outer layer iteration 7 took 13.921808958053589 ----- START RK repeats ----- RK iteration 0 took 0.0 RK iteration 1 took 0.0 RK iteration 2 took 0.0 All RK iterations Took 0.0 ----- END RK repeats ----- Outer layer iteration 8 took 0.0 ... ``` </details>
non_priority
xla compilation slow on new calls although no recompiling is performed click to expand issue type performance have you reproduced the bug with tf nightly no source source tensorflow version custom code yes os platform and distribution windows mobile device no response python version bazel version no response gcc compiler version no response cuda cudnn version no response gpu model and memory no response current behaviour shell on cpu after compilation i expect speed up in speed using tf function jit compile true this is the case however when used in a loop some of the iterations happen almost instantly whilst others take quite a long time i feels like the code is recompiling however using print statements i see that this is not the case at first i thought there could be easy and difficult input samples to the function however for further debugging i added an additional loop that just repeats every function evaluation multiple times here i saw that it is just one time a very slow one feels like recompiling and afterwards on the same input and exact same function it s really quick no additional print statement is executed hinting to the fact that the function is not compiled again i was wondering if this is a known issue and if so how to fix it the last function below is called in a main script and makes use of a tf keras layers layer object and its call function the call function is also given below and makes use of the jit compiled function rk multistep standalone code to reproduce the issue shell tf function jit compile true def rk multistep hybmod x k u k dt print compiling rk m dt dt m def call self model x k u k print start rk repeats time time for k in range time time x kk self method model x k u k self dt time time print f rk iteration k took time time print f all rk iterations took print end rk repeats x kk self rk multistep model x k u k self dt return x kk print start model in batches time time for k in range time time xbatch np expand dims x train add batch dimension shape state dims ubatch np expand dims utrain add batch dimension shape prediction length control dims model input modelout model model input here the model is called that used the call as defined above time time print f outer layer iteration k took time time print f took relevant log output shell start model in batches compiling g compiling g inner compiling pi big compiling flow compiling flow start rk repeats compiling rk compiling f compiling forcebalance compiling pressure change rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took start rk repeats rk iteration took rk iteration took rk iteration took all rk iterations took end rk repeats outer layer iteration took
0
344,359
24,810,392,198
IssuesEvent
2022-10-25 08:58:01
Azure/Enterprise-Scale
https://api.github.com/repos/Azure/Enterprise-Scale
closed
Bug Report -Existing Management Group
documentation enhancement engineering Needs: Attention :wave:
<p><strong>Existing Management Group with the same name under the Root Tenant gets moved while running the Accelerator</strong> </p> <p><strong>Steps to reproduce</strong> </p> <ol> <li>Create MG named &quot;ELZ-Corp&quot; under root tenant </li> <li>Move subscriptions under the newly created MG </li> <li>Run the Accelerator deployment and specify the prefix as ELZ. </li> <li>Leave the existing name for Corp as is and run the accelerator </li> <li>The Landing zone deployment would have moved the initially created &quot;ELZ-Corp&quot; Management Group along with the subscription to the newly created Landing zone that was built using the accelerator. </li> </ol> <p>This is an issue as customers who have existing Management Group with the same name as what is specified within the Accelerator could face issues when the MG and subscriptions are moved under the new Landing zone and policies are applied. It would be good to see a warning if there are any MG groups with the same name already present in the customer environment. </p>
1.0
Bug Report -Existing Management Group - <p><strong>Existing Management Group with the same name under the Root Tenant gets moved while running the Accelerator</strong> </p> <p><strong>Steps to reproduce</strong> </p> <ol> <li>Create MG named &quot;ELZ-Corp&quot; under root tenant </li> <li>Move subscriptions under the newly created MG </li> <li>Run the Accelerator deployment and specify the prefix as ELZ. </li> <li>Leave the existing name for Corp as is and run the accelerator </li> <li>The Landing zone deployment would have moved the initially created &quot;ELZ-Corp&quot; Management Group along with the subscription to the newly created Landing zone that was built using the accelerator. </li> </ol> <p>This is an issue as customers who have existing Management Group with the same name as what is specified within the Accelerator could face issues when the MG and subscriptions are moved under the new Landing zone and policies are applied. It would be good to see a warning if there are any MG groups with the same name already present in the customer environment. </p>
non_priority
bug report existing management group existing management group with the same name under the root tenant gets moved while running the accelerator steps to reproduce create mg named quot elz corp quot under root tenant move subscriptions under the newly created mg run the accelerator deployment and specify the prefix as elz leave the existing name for corp as is and run the accelerator the landing zone deployment would have moved the initially created quot elz corp quot management group along with the subscription to the newly created landing zone that was built using the accelerator this is an issue as customers who have existing management group with the same name as what is specified within the accelerator could face issues when the mg and subscriptions are moved under the new landing zone and policies are applied it would be good to see a warning if there are any mg groups with the same name already present in the customer environment
0
6,423
4,282,399,387
IssuesEvent
2016-07-15 08:59:43
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Enhancement suggestions for the filesystem dock
discussion enhancement topic:editor usability
That topic is of course "IMO". When opening a Godot project in current master, the filesystem dock looks like that: ![fs1](https://cloud.githubusercontent.com/assets/4701338/10059235/25382ab2-624a-11e5-9bbf-c3419d997478.jpg) I do believe that not so long ago, it used to also show files and not only folders. One could expand folders in the tree to access files directly with single clicks. Now one can only double click to open folder, and then get: ![fs2](https://cloud.githubusercontent.com/assets/4701338/10059267/4f1355e6-624a-11e5-8cf4-71eb42d3ee79.jpg) Here the interface changes completely, even the buttons at the top are different. With a bit of tweaking one can find that the tree icon on the left brings back to the first screenshot, and there again there is no obvious way to switch back to the non-tree view apart from opening a folder. Then by clicking the "list" icon one can get the listing without preview, which is better IMO for projects with many files (that's of course subjective, so it's nice to have both possibilities). ![fs3](https://cloud.githubusercontent.com/assets/4701338/10059306/845c194a-624a-11e5-88f8-c07fae1a87d3.jpg) So I see actually two "problems": - Files missing from the tree is IMO a regression. Browsing the filesystem via the tree view is the most effective in my workflow. - The fact that UI buttons differ in the tree view and in the other views is a bit confusing IMO. It would probably be better to have the same icons, and be able to switch between all three layouts using three icons.
True
Enhancement suggestions for the filesystem dock - That topic is of course "IMO". When opening a Godot project in current master, the filesystem dock looks like that: ![fs1](https://cloud.githubusercontent.com/assets/4701338/10059235/25382ab2-624a-11e5-9bbf-c3419d997478.jpg) I do believe that not so long ago, it used to also show files and not only folders. One could expand folders in the tree to access files directly with single clicks. Now one can only double click to open folder, and then get: ![fs2](https://cloud.githubusercontent.com/assets/4701338/10059267/4f1355e6-624a-11e5-8cf4-71eb42d3ee79.jpg) Here the interface changes completely, even the buttons at the top are different. With a bit of tweaking one can find that the tree icon on the left brings back to the first screenshot, and there again there is no obvious way to switch back to the non-tree view apart from opening a folder. Then by clicking the "list" icon one can get the listing without preview, which is better IMO for projects with many files (that's of course subjective, so it's nice to have both possibilities). ![fs3](https://cloud.githubusercontent.com/assets/4701338/10059306/845c194a-624a-11e5-88f8-c07fae1a87d3.jpg) So I see actually two "problems": - Files missing from the tree is IMO a regression. Browsing the filesystem via the tree view is the most effective in my workflow. - The fact that UI buttons differ in the tree view and in the other views is a bit confusing IMO. It would probably be better to have the same icons, and be able to switch between all three layouts using three icons.
non_priority
enhancement suggestions for the filesystem dock that topic is of course imo when opening a godot project in current master the filesystem dock looks like that i do believe that not so long ago it used to also show files and not only folders one could expand folders in the tree to access files directly with single clicks now one can only double click to open folder and then get here the interface changes completely even the buttons at the top are different with a bit of tweaking one can find that the tree icon on the left brings back to the first screenshot and there again there is no obvious way to switch back to the non tree view apart from opening a folder then by clicking the list icon one can get the listing without preview which is better imo for projects with many files that s of course subjective so it s nice to have both possibilities so i see actually two problems files missing from the tree is imo a regression browsing the filesystem via the tree view is the most effective in my workflow the fact that ui buttons differ in the tree view and in the other views is a bit confusing imo it would probably be better to have the same icons and be able to switch between all three layouts using three icons
0
35,312
14,667,055,209
IssuesEvent
2020-12-29 17:41:16
cityofaustin/atd-data-tech
https://api.github.com/repos/cityofaustin/atd-data-tech
closed
Setup custom domain
Product: DTS Website Project: DTS Website 2.0 Service: Dev Type: DevOps Workgroup: DTS
Our new website needs to be hosted at `product.austinmobility.io` or `product.mobility.austin.gov`. I believe the latter would require a CTM DNS record change.
1.0
Setup custom domain - Our new website needs to be hosted at `product.austinmobility.io` or `product.mobility.austin.gov`. I believe the latter would require a CTM DNS record change.
non_priority
setup custom domain our new website needs to be hosted at product austinmobility io or product mobility austin gov i believe the latter would require a ctm dns record change
0
351,233
25,019,266,203
IssuesEvent
2022-11-03 22:03:29
bitsy-ai/printnanny-os
https://api.github.com/repos/bitsy-ai/printnanny-os
closed
https://printnanny.ai/docs/ serves a 404
bug documentation
## **Describe the bug** Just noticed https://printnanny.ai/docs/ serves a 404 https://docs.printnanny.ai/ uses a client-side redirect to https://docs.printnanny.ai/docs/category/quick-start/ We should be able to handle this with a server-side redirect, now that the docs site shares an ingress and static IP with the webapp/API site.
1.0
https://printnanny.ai/docs/ serves a 404 - ## **Describe the bug** Just noticed https://printnanny.ai/docs/ serves a 404 https://docs.printnanny.ai/ uses a client-side redirect to https://docs.printnanny.ai/docs/category/quick-start/ We should be able to handle this with a server-side redirect, now that the docs site shares an ingress and static IP with the webapp/API site.
non_priority
serves a describe the bug just noticed serves a uses a client side redirect to we should be able to handle this with a server side redirect now that the docs site shares an ingress and static ip with the webapp api site
0
429,331
30,036,535,605
IssuesEvent
2023-06-27 13:06:20
argoproj/argo-cd
https://api.github.com/repos/argoproj/argo-cd
closed
docs update: keycloak.md shows an old keycloak version and should be updated
enhancement documentation
# Summary The operator-manual to configure SSO with Keycloak seems to use a Keycloak version of ~13. By now, Keycloak version 20 is out and the UI has changed significantly. # Motivation If one wants to configure ArgoCD to use Keycloak for SSO, one wants to use this documentation to configure the client. # Proposal Go through the process and make new screenshots on how to configure the client properly. # Additional Info There is already an updated version Draft in my fork: [mmueller-a9s/argo-cd](https://github.com/mmueller-a9s/argo-cd/tree/docs_update_keycloak)
1.0
docs update: keycloak.md shows an old keycloak version and should be updated - # Summary The operator-manual to configure SSO with Keycloak seems to use a Keycloak version of ~13. By now, Keycloak version 20 is out and the UI has changed significantly. # Motivation If one wants to configure ArgoCD to use Keycloak for SSO, one wants to use this documentation to configure the client. # Proposal Go through the process and make new screenshots on how to configure the client properly. # Additional Info There is already an updated version Draft in my fork: [mmueller-a9s/argo-cd](https://github.com/mmueller-a9s/argo-cd/tree/docs_update_keycloak)
non_priority
docs update keycloak md shows an old keycloak version and should be updated summary the operator manual to configure sso with keycloak seems to use a keycloak version of by now keycloak version is out and the ui has changed significantly motivation if one wants to configure argocd to use keycloak for sso one wants to use this documentation to configure the client proposal go through the process and make new screenshots on how to configure the client properly additional info there is already an updated version draft in my fork
0
339,196
30,351,191,263
IssuesEvent
2023-07-11 19:06:19
unifyai/ivy
https://api.github.com/repos/unifyai/ivy
closed
Fix tensor.test_torch_instance_bitwise_or
PyTorch Frontend Sub Task Failing Test
| | | |---|---| |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5523625629/jobs/10074807417"><img src=https://img.shields.io/badge/-success-success></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/5523625629/jobs/10074807417"><img src=https://img.shields.io/badge/-success-success></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5523625629/jobs/10074807417"><img src=https://img.shields.io/badge/-success-success></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/5498464838/jobs/10019945001"><img src=https://img.shields.io/badge/-success-success></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5498464838/jobs/10019945001"><img src=https://img.shields.io/badge/-success-success></a>
1.0
Fix tensor.test_torch_instance_bitwise_or - | | | |---|---| |tensorflow|<a href="https://github.com/unifyai/ivy/actions/runs/5523625629/jobs/10074807417"><img src=https://img.shields.io/badge/-success-success></a> |jax|<a href="https://github.com/unifyai/ivy/actions/runs/5523625629/jobs/10074807417"><img src=https://img.shields.io/badge/-success-success></a> |numpy|<a href="https://github.com/unifyai/ivy/actions/runs/5523625629/jobs/10074807417"><img src=https://img.shields.io/badge/-success-success></a> |torch|<a href="https://github.com/unifyai/ivy/actions/runs/5498464838/jobs/10019945001"><img src=https://img.shields.io/badge/-success-success></a> |paddle|<a href="https://github.com/unifyai/ivy/actions/runs/5498464838/jobs/10019945001"><img src=https://img.shields.io/badge/-success-success></a>
non_priority
fix tensor test torch instance bitwise or tensorflow a href src jax a href src numpy a href src torch a href src paddle a href src
0
14,351
9,086,994,273
IssuesEvent
2019-02-18 12:32:41
gbif/registry-console
https://api.github.com/repos/gbif/registry-console
closed
Make search page with filters instead of multiple search pages per type
enhancement usability
Currently we have 5 dataset lists in the menu. The menu is getting quite large already and more is coming (management tools and vocabulary). For the most part I suspect the user just want to search all active datasets. The option to see `deleted/noEndpoint/duplicates/constituents` could the be considered filters (toggle in case of deleted). In the case we would have one search page for datasets, with filters for when you need to search for duplicates. **Requirement**: To do so nicely we would need them all to be searchable `q=something`. This is not supported by the API at this point. Same story for organizations,installations etc. ![screen shot 2019-01-14 at 10 32 24](https://user-images.githubusercontent.com/6759267/51104900-bb5f9b00-17e7-11e9-9164-2d83d500a6af.png)
True
Make search page with filters instead of multiple search pages per type - Currently we have 5 dataset lists in the menu. The menu is getting quite large already and more is coming (management tools and vocabulary). For the most part I suspect the user just want to search all active datasets. The option to see `deleted/noEndpoint/duplicates/constituents` could the be considered filters (toggle in case of deleted). In the case we would have one search page for datasets, with filters for when you need to search for duplicates. **Requirement**: To do so nicely we would need them all to be searchable `q=something`. This is not supported by the API at this point. Same story for organizations,installations etc. ![screen shot 2019-01-14 at 10 32 24](https://user-images.githubusercontent.com/6759267/51104900-bb5f9b00-17e7-11e9-9164-2d83d500a6af.png)
non_priority
make search page with filters instead of multiple search pages per type currently we have dataset lists in the menu the menu is getting quite large already and more is coming management tools and vocabulary for the most part i suspect the user just want to search all active datasets the option to see deleted noendpoint duplicates constituents could the be considered filters toggle in case of deleted in the case we would have one search page for datasets with filters for when you need to search for duplicates requirement to do so nicely we would need them all to be searchable q something this is not supported by the api at this point same story for organizations installations etc
0
226,169
24,946,616,950
IssuesEvent
2022-11-01 01:11:52
satishmukundan/WebGoat
https://api.github.com/repos/satishmukundan/WebGoat
closed
CVE-2022-40155 (High) detected in xstream-1.4.5.jar - autoclosed
security vulnerability
## CVE-2022-40155 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Path to dependency file: /webgoat-integration-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/satishmukundan/WebGoat/commit/c4196e8da2299c385e53198c98fccad8aa5ceee8">c4196e8da2299c385e53198c98fccad8aa5ceee8</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Those using Xstream to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. <p>Publish Date: 2022-09-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-40155>CVE-2022-40155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-40155 (High) detected in xstream-1.4.5.jar - autoclosed - ## CVE-2022-40155 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Path to dependency file: /webgoat-integration-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/satishmukundan/WebGoat/commit/c4196e8da2299c385e53198c98fccad8aa5ceee8">c4196e8da2299c385e53198c98fccad8aa5ceee8</a></p> <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Those using Xstream to serialise XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. <p>Publish Date: 2022-09-16 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-40155>CVE-2022-40155</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in xstream jar autoclosed cve high severity vulnerability vulnerable library xstream jar xstream is a serialization library from java objects to xml and back path to dependency file webgoat integration tests pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar home wss scanner repository com thoughtworks xstream xstream xstream jar repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch develop vulnerability details those using xstream to serialise xml data may be vulnerable to denial of service attacks dos if the parser is running on user supplied input an attacker may supply content that causes the parser to crash by stack overflow this effect may support a denial of service attack publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href step up your open source security game with mend
0
114,536
14,594,020,371
IssuesEvent
2020-12-20 02:43:44
karaoke-dev/karaoke
https://api.github.com/repos/karaoke-dev/karaoke
opened
Implement language config pop-up dialog.
Design LyricMaker editor
Add to add pop-up dialog to in: - Ruby/romaji auto-generator - Time-tag generator Also need to display in edit and import page.
1.0
Implement language config pop-up dialog. - Add to add pop-up dialog to in: - Ruby/romaji auto-generator - Time-tag generator Also need to display in edit and import page.
non_priority
implement language config pop up dialog add to add pop up dialog to in ruby romaji auto generator time tag generator also need to display in edit and import page
0
121,116
12,104,810,692
IssuesEvent
2020-04-20 20:54:36
ADALabUCSD/cerebro-system
https://api.github.com/repos/ADALabUCSD/cerebro-system
opened
Improve System Documentation
documentation
- [ ] What is it? - [ ] Highlights - [ ] Install - [ ] Getting started - [ ] API walkthrough - [ ] Acknowledgements - [ ] Citing
1.0
Improve System Documentation - - [ ] What is it? - [ ] Highlights - [ ] Install - [ ] Getting started - [ ] API walkthrough - [ ] Acknowledgements - [ ] Citing
non_priority
improve system documentation what is it highlights install getting started api walkthrough acknowledgements citing
0
152,258
19,680,432,841
IssuesEvent
2022-01-11 16:16:11
jgeraigery/dependabot-core
https://api.github.com/repos/jgeraigery/dependabot-core
closed
WS-2021-0154 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-3.1.0.tgz - autoclosed
security vulnerability
## WS-2021-0154 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json</p> <p>Path to vulnerable library: dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/node_modules/glob-parent,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/path_dependency/deps/etag/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/etag_no_lockfile/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/path_dependency/deps/etag/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/lockfile_only_change/node_modules/glob-parent,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/library/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm5_and_yarn/npm_subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/path_dependency/deps/etag/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/no_lockfile_change/node_modules/glob-parent,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm5/subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/helpers/node_modules/glob-base/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/app_no_version/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - eslint-plugin-markdown-1.0.0-beta.3.tgz (Root Library) - remark-4.2.2.tgz - chokidar-1.7.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-3.1.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent directory path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p> <p>Path to dependency file: dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/lerna/package.json</p> <p>Path to vulnerable library: dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/lerna/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/lerna/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/multiple_sources/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/node_modules/glob-parent</p> <p> Dependency Hierarchy: - bull-arena-2.4.5.tgz (Root Library) - nodemon-1.18.4.tgz - chokidar-2.0.4.tgz - :x: **glob-parent-3.1.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/dependabot-core/commit/4b127eb9cf26ad213bb9929b8ac3d63c66d689f1">4b127eb9cf26ad213bb9929b8ac3d63c66d689f1</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2. <p>Publish Date: 2021-01-27 <p>URL: <a href=https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366>WS-2021-0154</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2">https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2</a></p> <p>Release Date: 2021-01-27</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/path_dependency/deps/etag/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/etag_no_lockfile/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/path_dependency/deps/etag/package.json","/npm_and_yarn/spec/fixtures/projects/yarn/lockfile_only_change/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/library/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/npm5_and_yarn/npm_subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/path_dependency/deps/etag/package.json","/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/yarn/no_lockfile_change/package.json","/npm_and_yarn/spec/fixtures/projects/npm5/subdependency_update/package.json","/npm_and_yarn/helpers/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/app_no_version/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint-plugin-markdown:1.0.0-beta.3;remark:4.2.2;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 5.1.2"},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"3.1.0","packageFilePaths":["/npm_and_yarn/spec/fixtures/projects/npm7/lerna/package.json","/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/lerna/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/multiple_sources/package.json","/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json"],"isTransitiveDependency":true,"dependencyTree":"bull-arena:2.4.5;nodemon:1.18.4;chokidar:2.0.4;glob-parent:3.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 5.1.2"}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2021-0154","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2.","vulnerabilityUrl":"https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
WS-2021-0154 (Medium) detected in glob-parent-2.0.0.tgz, glob-parent-3.1.0.tgz - autoclosed - ## WS-2021-0154 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>glob-parent-2.0.0.tgz</b>, <b>glob-parent-3.1.0.tgz</b></p></summary> <p> <details><summary><b>glob-parent-2.0.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-2.0.0.tgz</a></p> <p>Path to dependency file: dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json</p> <p>Path to vulnerable library: dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/node_modules/glob-parent,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/path_dependency/deps/etag/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/etag_no_lockfile/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/path_dependency/deps/etag/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/lockfile_only_change/node_modules/glob-parent,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/library/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm5_and_yarn/npm_subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/path_dependency/deps/etag/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/no_lockfile_change/node_modules/glob-parent,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm5/subdependency_update/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/helpers/node_modules/glob-base/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/app_no_version/node_modules/glob-parent/package.json</p> <p> Dependency Hierarchy: - eslint-plugin-markdown-1.0.0-beta.3.tgz (Root Library) - remark-4.2.2.tgz - chokidar-1.7.0.tgz - :x: **glob-parent-2.0.0.tgz** (Vulnerable Library) </details> <details><summary><b>glob-parent-3.1.0.tgz</b></p></summary> <p>Strips glob magic from a string to provide the parent directory path</p> <p>Library home page: <a href="https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz">https://registry.npmjs.org/glob-parent/-/glob-parent-3.1.0.tgz</a></p> <p>Path to dependency file: dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/lerna/package.json</p> <p>Path to vulnerable library: dependabot-core/npm_and_yarn/spec/fixtures/projects/npm7/lerna/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/lerna/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/npm6/multiple_sources/node_modules/glob-parent/package.json,dependabot-core/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/node_modules/glob-parent</p> <p> Dependency Hierarchy: - bull-arena-2.4.5.tgz (Root Library) - nodemon-1.18.4.tgz - chokidar-2.0.4.tgz - :x: **glob-parent-3.1.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jgeraigery/dependabot-core/commit/4b127eb9cf26ad213bb9929b8ac3d63c66d689f1">4b127eb9cf26ad213bb9929b8ac3d63c66d689f1</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2. <p>Publish Date: 2021-01-27 <p>URL: <a href=https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366>WS-2021-0154</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2">https://github.com/gulpjs/glob-parent/releases/tag/v5.1.2</a></p> <p>Release Date: 2021-01-27</p> <p>Fix Resolution: glob-parent - 5.1.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"2.0.0","packageFilePaths":["/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/path_dependency/deps/etag/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/etag_no_lockfile/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/path_dependency/deps/etag/package.json","/npm_and_yarn/spec/fixtures/projects/yarn/lockfile_only_change/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/library/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/npm5_and_yarn/npm_subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/path_dependency/deps/etag/package.json","/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/npm_subdependency_update/package.json","/npm_and_yarn/spec/fixtures/projects/yarn/no_lockfile_change/package.json","/npm_and_yarn/spec/fixtures/projects/npm5/subdependency_update/package.json","/npm_and_yarn/helpers/package.json","/npm_and_yarn/spec/fixtures/projects/npm7/app_no_version/package.json"],"isTransitiveDependency":true,"dependencyTree":"eslint-plugin-markdown:1.0.0-beta.3;remark:4.2.2;chokidar:1.7.0;glob-parent:2.0.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 5.1.2"},{"packageType":"javascript/Node.js","packageName":"glob-parent","packageVersion":"3.1.0","packageFilePaths":["/npm_and_yarn/spec/fixtures/projects/npm7/lerna/package.json","/npm_and_yarn/spec/fixtures/projects/npm6_and_yarn/lerna/package.json","/npm_and_yarn/spec/fixtures/projects/npm6/multiple_sources/package.json","/npm_and_yarn/spec/fixtures/projects/yarn/github_dependency_slash/package.json"],"isTransitiveDependency":true,"dependencyTree":"bull-arena:2.4.5;nodemon:1.18.4;chokidar:2.0.4;glob-parent:3.1.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"glob-parent - 5.1.2"}],"baseBranches":["main"],"vulnerabilityIdentifier":"WS-2021-0154","vulnerabilityDetails":"Regular Expression Denial of Service (ReDoS) vulnerability was found in glob-parent before 5.1.2.","vulnerabilityUrl":"https://github.com/gulpjs/glob-parent/commit/f9231168b0041fea3f8f954b3cceb56269fc6366","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
ws medium detected in glob parent tgz glob parent tgz autoclosed ws medium severity vulnerability vulnerable libraries glob parent tgz glob parent tgz glob parent tgz strips glob magic from a string to provide the parent path library home page a href path to dependency file dependabot core npm and yarn spec fixtures projects yarn github dependency slash package json path to vulnerable library dependabot core npm and yarn spec fixtures projects yarn github dependency slash node modules glob parent dependabot core npm and yarn spec fixtures projects path dependency deps etag node modules glob parent package json dependabot core npm and yarn spec fixtures projects etag no lockfile node modules glob parent package json dependabot core npm and yarn spec fixtures projects path dependency deps etag node modules glob parent package json dependabot core npm and yarn spec fixtures projects yarn lockfile only change node modules glob parent dependabot core npm and yarn spec fixtures projects library node modules glob parent package json dependabot core npm and yarn spec fixtures projects subdependency update node modules glob parent package json dependabot core npm and yarn spec fixtures projects subdependency update node modules glob parent package json dependabot core npm and yarn spec fixtures projects and yarn npm subdependency update node modules glob parent package json dependabot core npm and yarn spec fixtures projects and yarn path dependency deps etag node modules glob parent package json dependabot core npm and yarn spec fixtures projects and yarn npm subdependency update node modules glob parent package json dependabot core npm and yarn spec fixtures projects yarn no lockfile change node modules glob parent dependabot core npm and yarn spec fixtures projects subdependency update node modules glob parent package json dependabot core npm and yarn helpers node modules glob base node modules glob parent package json dependabot core npm and yarn spec fixtures projects app no version node modules glob parent package json dependency hierarchy eslint plugin markdown beta tgz root library remark tgz chokidar tgz x glob parent tgz vulnerable library glob parent tgz strips glob magic from a string to provide the parent directory path library home page a href path to dependency file dependabot core npm and yarn spec fixtures projects lerna package json path to vulnerable library dependabot core npm and yarn spec fixtures projects lerna node modules glob parent package json dependabot core npm and yarn spec fixtures projects and yarn lerna node modules glob parent package json dependabot core npm and yarn spec fixtures projects multiple sources node modules glob parent package json dependabot core npm and yarn spec fixtures projects yarn github dependency slash node modules glob parent dependency hierarchy bull arena tgz root library nodemon tgz chokidar tgz x glob parent tgz vulnerable library found in head commit a href found in base branch main vulnerability details regular expression denial of service redos vulnerability was found in glob parent before publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution glob parent isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree eslint plugin markdown beta remark chokidar glob parent isminimumfixversionavailable true minimumfixversion glob parent packagetype javascript node js packagename glob parent packageversion packagefilepaths istransitivedependency true dependencytree bull arena nodemon chokidar glob parent isminimumfixversionavailable true minimumfixversion glob parent basebranches vulnerabilityidentifier ws vulnerabilitydetails regular expression denial of service redos vulnerability was found in glob parent before vulnerabilityurl
0
236,849
18,111,243,609
IssuesEvent
2021-09-23 04:28:03
Soulsender/scarabbot
https://api.github.com/repos/Soulsender/scarabbot
closed
Write Usage Docs
documentation enhancement
Modifed Usage - [ ] Token instruction - [ ] keep_alive instructions - [ ] Prefix instructions Unmodifed Usage - [ ] Invite link
1.0
Write Usage Docs - Modifed Usage - [ ] Token instruction - [ ] keep_alive instructions - [ ] Prefix instructions Unmodifed Usage - [ ] Invite link
non_priority
write usage docs modifed usage token instruction keep alive instructions prefix instructions unmodifed usage invite link
0
48,437
7,432,128,903
IssuesEvent
2018-03-25 21:28:09
aws/aws-amplify
https://api.github.com/repos/aws/aws-amplify
closed
Sign in with MFA broken ? callback.mfaSetup is undefined when trying to sign in
beta documentation feature-request
Hi I try to sign in with a user. The sign up worked just fine even with MFA but the sign in throws `Uncaught Error: callback.mfaSetup is not a function` when calling `Auth.signIn(username, password)`. I tracked it down to `amazon-cognito-identity-js/es/CognitoUser.js` ```js if (challengeName === 'MFA_SETUP') { this.Session = dataAuthenticate.Session; return callback.mfaSetup(challengeName, challengeParameters); } ``` `callback.mfaSetup` is `undefined. What is wrong here ? This is the complete code ```js import React, {Component} from 'react'; import logo from './logo.svg'; import styles from './app.module.css'; import Amplify, {Auth} from 'aws-amplify'; Amplify.configure({ Auth: { identityPoolId: 'xxxxxxxxxxxxxxxxxx', //REQUIRED - Amazon Cognito Identity Pool ID region: 'ap-southeast-2', // REQUIRED - Amazon Cognito Region userPoolId: 'xxxxxxxxxxxxxx', //'XX-XXXX-X_abcd1234', //OPTIONAL - Amazon Cognito User Pool ID userPoolWebClientId: 'xxxxxxxxxxxxxxxx' //'XX-XXXX-X_abcd1234', //OPTIONAL - Amazon Cognito Web Client ID }, }); class App extends Component { constructor(props) { super(props); this.state = { email: '', password: '', phone: '', code: '', user: null }; } handleInputChange = e => { const {target} = e; const value = target.type === 'checkbox' ? target.checked : target.value; const name = target.name; this.setState({ [name]: value }); }; handleSubmitSignIn = e => { const {email, password} = this.state; const username = email; debugger; Auth.signIn(username, password) .then(user => { console.log(user); this.setState({user}); }) .catch(err => console.log(err)); e.preventDefault(); }; handleSubmitConfirmSignIn = e => { const {user, code} = this.state; Auth.confirmSignIn(user, code) .then(data => console.log(data)) .catch(err => console.log(err)); e.preventDefault(); }; handleSubmitSignUp = e => { const {email, password, phone} = this.state; const username = email; Auth.signUp(username, password, email, phone) .then(data => console.log(data)) .catch(err => console.log(err)); e.preventDefault(); }; handleSubmitConfirmSignUp = e => { const {email, code} = this.state; const username = email; Auth.confirmSignUp(username, code) .then(data => console.log(data)) .catch(err => console.log(err)); e.preventDefault(); }; handleClickSignOut = e => { Auth.signOut() .then(data => console.log(data)) .catch(err => console.log(err)); }; render() { const {email, password, phone, code} = this.state; return ( <div className={styles.app}> <header className={styles.appHeader}> <img src={logo} className={styles.appLogo} alt="logo"/> <h1 className={styles.appTitle}>Welcome to the Platform</h1> </header> <p className={styles.appIntro}> Please sign in to proceed. </p> <form className={styles.form} name="SignIn" onSubmit={this.handleSubmitSignIn}> <label>Email <input name="email" type="email" value={email} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Password <input name="password" type="password" value={password} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Sign In</button> </form> <br/> <form className={styles.form} name="ConfirmSignIn" onSubmit={this.handleSubmitConfirmSignIn}> <label>Code <input name="code" type="text" value={code} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Confirm Sign In</button> </form> <br/> <form className={styles.form} name="signUp" onSubmit={this.handleSubmitSignUp}> <label>Email <input name="email" type="email" value={email} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Password <input name="password" type="password" value={password} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Phone <input name="phone" type="tel" value={phone} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Sign Up</button> </form> <br/> <form className={styles.form} name="confirmSignUp" onSubmit={this.handleSubmitConfirmSignUp}> <label>Email <input name="email" type="email" value={email} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Code <input name="code" type="text" value={code} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Confirm Sign Up</button> </form> <br/> <button onClick={this.handleClickSignOut}>Sign Out</button> <br/> <div>{JSON.stringify(Auth.currentUserInfo())}</div> </div> ); } } export default App; ```
1.0
Sign in with MFA broken ? callback.mfaSetup is undefined when trying to sign in - Hi I try to sign in with a user. The sign up worked just fine even with MFA but the sign in throws `Uncaught Error: callback.mfaSetup is not a function` when calling `Auth.signIn(username, password)`. I tracked it down to `amazon-cognito-identity-js/es/CognitoUser.js` ```js if (challengeName === 'MFA_SETUP') { this.Session = dataAuthenticate.Session; return callback.mfaSetup(challengeName, challengeParameters); } ``` `callback.mfaSetup` is `undefined. What is wrong here ? This is the complete code ```js import React, {Component} from 'react'; import logo from './logo.svg'; import styles from './app.module.css'; import Amplify, {Auth} from 'aws-amplify'; Amplify.configure({ Auth: { identityPoolId: 'xxxxxxxxxxxxxxxxxx', //REQUIRED - Amazon Cognito Identity Pool ID region: 'ap-southeast-2', // REQUIRED - Amazon Cognito Region userPoolId: 'xxxxxxxxxxxxxx', //'XX-XXXX-X_abcd1234', //OPTIONAL - Amazon Cognito User Pool ID userPoolWebClientId: 'xxxxxxxxxxxxxxxx' //'XX-XXXX-X_abcd1234', //OPTIONAL - Amazon Cognito Web Client ID }, }); class App extends Component { constructor(props) { super(props); this.state = { email: '', password: '', phone: '', code: '', user: null }; } handleInputChange = e => { const {target} = e; const value = target.type === 'checkbox' ? target.checked : target.value; const name = target.name; this.setState({ [name]: value }); }; handleSubmitSignIn = e => { const {email, password} = this.state; const username = email; debugger; Auth.signIn(username, password) .then(user => { console.log(user); this.setState({user}); }) .catch(err => console.log(err)); e.preventDefault(); }; handleSubmitConfirmSignIn = e => { const {user, code} = this.state; Auth.confirmSignIn(user, code) .then(data => console.log(data)) .catch(err => console.log(err)); e.preventDefault(); }; handleSubmitSignUp = e => { const {email, password, phone} = this.state; const username = email; Auth.signUp(username, password, email, phone) .then(data => console.log(data)) .catch(err => console.log(err)); e.preventDefault(); }; handleSubmitConfirmSignUp = e => { const {email, code} = this.state; const username = email; Auth.confirmSignUp(username, code) .then(data => console.log(data)) .catch(err => console.log(err)); e.preventDefault(); }; handleClickSignOut = e => { Auth.signOut() .then(data => console.log(data)) .catch(err => console.log(err)); }; render() { const {email, password, phone, code} = this.state; return ( <div className={styles.app}> <header className={styles.appHeader}> <img src={logo} className={styles.appLogo} alt="logo"/> <h1 className={styles.appTitle}>Welcome to the Platform</h1> </header> <p className={styles.appIntro}> Please sign in to proceed. </p> <form className={styles.form} name="SignIn" onSubmit={this.handleSubmitSignIn}> <label>Email <input name="email" type="email" value={email} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Password <input name="password" type="password" value={password} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Sign In</button> </form> <br/> <form className={styles.form} name="ConfirmSignIn" onSubmit={this.handleSubmitConfirmSignIn}> <label>Code <input name="code" type="text" value={code} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Confirm Sign In</button> </form> <br/> <form className={styles.form} name="signUp" onSubmit={this.handleSubmitSignUp}> <label>Email <input name="email" type="email" value={email} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Password <input name="password" type="password" value={password} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Phone <input name="phone" type="tel" value={phone} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Sign Up</button> </form> <br/> <form className={styles.form} name="confirmSignUp" onSubmit={this.handleSubmitConfirmSignUp}> <label>Email <input name="email" type="email" value={email} required={true} onChange={this.handleInputChange}/> </label> <br/> <label>Code <input name="code" type="text" value={code} required={true} onChange={this.handleInputChange}/> </label> <br/> <button>Confirm Sign Up</button> </form> <br/> <button onClick={this.handleClickSignOut}>Sign Out</button> <br/> <div>{JSON.stringify(Auth.currentUserInfo())}</div> </div> ); } } export default App; ```
non_priority
sign in with mfa broken callback mfasetup is undefined when trying to sign in hi i try to sign in with a user the sign up worked just fine even with mfa but the sign in throws uncaught error callback mfasetup is not a function when calling auth signin username password i tracked it down to amazon cognito identity js es cognitouser js js if challengename mfa setup this session dataauthenticate session return callback mfasetup challengename challengeparameters callback mfasetup is undefined what is wrong here this is the complete code js import react component from react import logo from logo svg import styles from app module css import amplify auth from aws amplify amplify configure auth identitypoolid xxxxxxxxxxxxxxxxxx required amazon cognito identity pool id region ap southeast required amazon cognito region userpoolid xxxxxxxxxxxxxx xx xxxx x optional amazon cognito user pool id userpoolwebclientid xxxxxxxxxxxxxxxx xx xxxx x optional amazon cognito web client id class app extends component constructor props super props this state email password phone code user null handleinputchange e const target e const value target type checkbox target checked target value const name target name this setstate value handlesubmitsignin e const email password this state const username email debugger auth signin username password then user console log user this setstate user catch err console log err e preventdefault handlesubmitconfirmsignin e const user code this state auth confirmsignin user code then data console log data catch err console log err e preventdefault handlesubmitsignup e const email password phone this state const username email auth signup username password email phone then data console log data catch err console log err e preventdefault handlesubmitconfirmsignup e const email code this state const username email auth confirmsignup username code then data console log data catch err console log err e preventdefault handleclicksignout e auth signout then data console log data catch err console log err render const email password phone code this state return welcome to the platform please sign in to proceed email input name email type email value email required true onchange this handleinputchange password input name password type password value password required true onchange this handleinputchange sign in code input name code type text value code required true onchange this handleinputchange confirm sign in email input name email type email value email required true onchange this handleinputchange password input name password type password value password required true onchange this handleinputchange phone input name phone type tel value phone required true onchange this handleinputchange sign up email input name email type email value email required true onchange this handleinputchange code input name code type text value code required true onchange this handleinputchange confirm sign up sign out json stringify auth currentuserinfo export default app
0
50,229
21,041,075,578
IssuesEvent
2022-03-31 12:23:47
azure-deprecation/dashboard
https://api.github.com/repos/azure-deprecation/dashboard
opened
Azure Application Gateway (classic) is retiring on August 31st 2024
impact:migration-required verified area:service-runtime cloud:public services:app-gateway
Azure Application Gateway (classic) is retiring on August 31st 2024 **Deadline:** Aug 31, 2024 **Impacted Services:** - Azure Application Gateway **More information:** - https://azure.microsoft.com/updates/five-azure-classic-networking-services-will-be-retired-on-31-august-2024/ - https://docs.microsoft.com/azure/application-gateway/classic-to-resource-manager - https://github.com/azure-deprecation/dashboard/issues/167 ### Notice Here's the official report from Microsoft: > In August 2021, we announced that Azure Cloud Services (classic) will be retired on 31 August 2024. **Because classic Azure Virtual Network, reserved IP addresses, Azure ExpressRoute gateway, Azure Application Gateway, and Azure VPN Gateway are dependent on Azure Cloud Services (classic), they’ll be retired on the same date.** > > Before that date, you’ll need to migrate any resources that use these classic networking services to the Azure Resource Manager deployment model, which provides the same capabilities as classic plus: > > - Simplified resource deployment with a management layer that enables you to create, update, and delete Azure resources. > - Resource grouping, which allows you to deploy, monitor, manage, and apply access control policies to resources as a group. ### Timeline | Phase | Date | Description | |:------|------|-------------| |Announcement|Mar 18, 2022|Deprecation was announced| |Deprecation|Aug 31, 2024|Service will no longer work| ### Impact Azure Application Gateway (classic) is retiring on August 31st 2024 and migration to ARM-based Azure Application Gateway is required. ### Required Action A migration guide is available [here](https://docs.microsoft.com/azure/application-gateway/classic-to-resource-manager). Here's the official report from Microsoft: > To avoid service disruptions, follow the [guidance to migrate your resources](https://docs.microsoft.com/azure/application-gateway/classic-to-resource-manager) that use these classic networking services to Azure Resource Manager by 31 August 2024. ### Contact You can get in touch through the following options: - Get answers from Microsoft Q&A ([link](https://aka.ms/AAflal1)). - Contact Azure support ([link](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview)).
2.0
Azure Application Gateway (classic) is retiring on August 31st 2024 - Azure Application Gateway (classic) is retiring on August 31st 2024 **Deadline:** Aug 31, 2024 **Impacted Services:** - Azure Application Gateway **More information:** - https://azure.microsoft.com/updates/five-azure-classic-networking-services-will-be-retired-on-31-august-2024/ - https://docs.microsoft.com/azure/application-gateway/classic-to-resource-manager - https://github.com/azure-deprecation/dashboard/issues/167 ### Notice Here's the official report from Microsoft: > In August 2021, we announced that Azure Cloud Services (classic) will be retired on 31 August 2024. **Because classic Azure Virtual Network, reserved IP addresses, Azure ExpressRoute gateway, Azure Application Gateway, and Azure VPN Gateway are dependent on Azure Cloud Services (classic), they’ll be retired on the same date.** > > Before that date, you’ll need to migrate any resources that use these classic networking services to the Azure Resource Manager deployment model, which provides the same capabilities as classic plus: > > - Simplified resource deployment with a management layer that enables you to create, update, and delete Azure resources. > - Resource grouping, which allows you to deploy, monitor, manage, and apply access control policies to resources as a group. ### Timeline | Phase | Date | Description | |:------|------|-------------| |Announcement|Mar 18, 2022|Deprecation was announced| |Deprecation|Aug 31, 2024|Service will no longer work| ### Impact Azure Application Gateway (classic) is retiring on August 31st 2024 and migration to ARM-based Azure Application Gateway is required. ### Required Action A migration guide is available [here](https://docs.microsoft.com/azure/application-gateway/classic-to-resource-manager). Here's the official report from Microsoft: > To avoid service disruptions, follow the [guidance to migrate your resources](https://docs.microsoft.com/azure/application-gateway/classic-to-resource-manager) that use these classic networking services to Azure Resource Manager by 31 August 2024. ### Contact You can get in touch through the following options: - Get answers from Microsoft Q&A ([link](https://aka.ms/AAflal1)). - Contact Azure support ([link](https://portal.azure.com/#blade/Microsoft_Azure_Support/HelpAndSupportBlade/overview)).
non_priority
azure application gateway classic is retiring on august azure application gateway classic is retiring on august deadline aug impacted services azure application gateway more information notice here s the official report from microsoft in august we announced that azure cloud services classic will be retired on august because classic azure virtual network reserved ip addresses azure expressroute gateway azure application gateway and azure vpn gateway are dependent on azure cloud services classic they’ll be retired on the same date before that date you’ll need to migrate any resources that use these classic networking services to the azure resource manager deployment model which provides the same capabilities as classic plus simplified resource deployment with a management layer that enables you to create update and delete azure resources resource grouping which allows you to deploy monitor manage and apply access control policies to resources as a group timeline phase date description announcement mar deprecation was announced deprecation aug service will no longer work impact azure application gateway classic is retiring on august and migration to arm based azure application gateway is required required action a migration guide is available here s the official report from microsoft to avoid service disruptions follow the that use these classic networking services to azure resource manager by august contact you can get in touch through the following options get answers from microsoft q a contact azure support
0
391,347
26,887,608,690
IssuesEvent
2023-02-06 05:34:37
Seakimhour/pro-translate
https://api.github.com/repos/Seakimhour/pro-translate
closed
Data Storage Method
documentation
各 Web サイトには独自の「ローカル ストレージ」があり、相互にデータを取得できないので、ローカル ストレージは使用できません。 Chrome には、ユーザー データの変更を保存、取得、追跡するための chrome.storage API が用意されています。 このプロジェクトでは、[WebExtension Polyfill](https://github.com/mozilla/webextension-polyfill) を使用します。 これにより、拡張機能がより多くのブラウザーをサポートできるようになります。 #### ユーザー設定データ ```js settings: { targetLanguage: { code: "en", country: "English" }, secondTargetLanguage: { code: "ja", country: "Japanese" }, autoSwitch: true, targetFormat: "camel", autoSetFormat: true, showIcon: true, cases: ["snake", "param", "camel", "pascal", "path", "constant", "dot"] } ``` #### 設定ページのスクリーンショットです。 ![Image](https://user-images.githubusercontent.com/52590443/214995604-7f824723-0ac0-469f-bc57-ce43dd673348.png) #### この拡張機能で使用するデータは JS ファイルの形に保存しています。 [format-cases.js](https://github.com/Seakimhour/pro-translate/blob/master/src/assets/format-cases.js) [languages.js](https://github.com/Seakimhour/pro-translate/blob/master/src/assets/languages.js) 利用するとき`import`で呼び出し ```js import { formatCases } from "../../assets/format-cases.js"; ```
1.0
Data Storage Method - 各 Web サイトには独自の「ローカル ストレージ」があり、相互にデータを取得できないので、ローカル ストレージは使用できません。 Chrome には、ユーザー データの変更を保存、取得、追跡するための chrome.storage API が用意されています。 このプロジェクトでは、[WebExtension Polyfill](https://github.com/mozilla/webextension-polyfill) を使用します。 これにより、拡張機能がより多くのブラウザーをサポートできるようになります。 #### ユーザー設定データ ```js settings: { targetLanguage: { code: "en", country: "English" }, secondTargetLanguage: { code: "ja", country: "Japanese" }, autoSwitch: true, targetFormat: "camel", autoSetFormat: true, showIcon: true, cases: ["snake", "param", "camel", "pascal", "path", "constant", "dot"] } ``` #### 設定ページのスクリーンショットです。 ![Image](https://user-images.githubusercontent.com/52590443/214995604-7f824723-0ac0-469f-bc57-ce43dd673348.png) #### この拡張機能で使用するデータは JS ファイルの形に保存しています。 [format-cases.js](https://github.com/Seakimhour/pro-translate/blob/master/src/assets/format-cases.js) [languages.js](https://github.com/Seakimhour/pro-translate/blob/master/src/assets/languages.js) 利用するとき`import`で呼び出し ```js import { formatCases } from "../../assets/format-cases.js"; ```
non_priority
data storage method 各 web サイトには独自の「ローカル ストレージ」があり、相互にデータを取得できないので、ローカル ストレージは使用できません。 chrome には、ユーザー データの変更を保存、取得、追跡するための chrome storage api が用意されています。 このプロジェクトでは、 を使用します。 これにより、拡張機能がより多くのブラウザーをサポートできるようになります。 ユーザー設定データ js settings targetlanguage code en country english secondtargetlanguage code ja country japanese autoswitch true targetformat camel autosetformat true showicon true cases 設定ページのスクリーンショットです。 この拡張機能で使用するデータは js ファイルの形に保存しています。 利用するとき import で呼び出し js import formatcases from assets format cases js
0
270,011
28,960,375,777
IssuesEvent
2023-05-10 01:36:48
praneethpanasala/linux
https://api.github.com/repos/praneethpanasala/linux
reopened
CVE-2022-20227 (Medium) detected in linuxlinux-4.19.6
Mend: dependency security vulnerability
## CVE-2022-20227 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel <p>Publish Date: 2022-07-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20227>CVE-2022-20227</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/kernel/common/+/fb4ff0f96de37">https://android.googlesource.com/kernel/common/+/fb4ff0f96de37</a></p> <p>Release Date: 2022-07-13</p> <p>Fix Resolution: android-12.1.0_r0.35</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-20227 (Medium) detected in linuxlinux-4.19.6 - ## CVE-2022-20227 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.19.6</b></p></summary> <p> <p>Apache Software Foundation (ASF)</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://api.github.com/repos/praneethpanasala/linux/commits/d80c4f847c91020292cb280132b15e2ea147f1a3">d80c4f847c91020292cb280132b15e2ea147f1a3</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> In USB driver, there is a possible out of bounds read due to a heap buffer overflow. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-216825460References: Upstream kernel <p>Publish Date: 2022-07-13 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-20227>CVE-2022-20227</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://android.googlesource.com/kernel/common/+/fb4ff0f96de37">https://android.googlesource.com/kernel/common/+/fb4ff0f96de37</a></p> <p>Release Date: 2022-07-13</p> <p>Fix Resolution: android-12.1.0_r0.35</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linuxlinux cve medium severity vulnerability vulnerable library linuxlinux apache software foundation asf library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details in usb driver there is a possible out of bounds read due to a heap buffer overflow this could lead to local information disclosure with user execution privileges needed user interaction is not needed for exploitation product androidversions android kernelandroid id a upstream kernel publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution android step up your open source security game with mend
0
14,835
3,898,887,383
IssuesEvent
2016-04-17 11:42:41
coala-analyzer/coala
https://api.github.com/repos/coala-analyzer/coala
opened
Add double backticks
area/documentation difficulty/newcomer
In the file ``docs/Users/Exit_Codes.rst`` we refer to the command coala, and therefore it should be in double backticks everywhere in the file (it's a small file).
1.0
Add double backticks - In the file ``docs/Users/Exit_Codes.rst`` we refer to the command coala, and therefore it should be in double backticks everywhere in the file (it's a small file).
non_priority
add double backticks in the file docs users exit codes rst we refer to the command coala and therefore it should be in double backticks everywhere in the file it s a small file
0
51,210
13,630,283,329
IssuesEvent
2020-09-24 16:13:13
sumanth-nb/depenency-checker
https://api.github.com/repos/sumanth-nb/depenency-checker
opened
CVE-2019-10768 (High) detected in angular-1.6.10.tgz
security vulnerability
## CVE-2019-10768 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>angular-1.6.10.tgz</b></p></summary> <p>HTML enhanced for web apps</p> <p>Library home page: <a href="https://registry.npmjs.org/angular/-/angular-1.6.10.tgz">https://registry.npmjs.org/angular/-/angular-1.6.10.tgz</a></p> <p>Path to dependency file: depenency-checker/package.json</p> <p>Path to vulnerable library: depenency-checker/node_modules/angular/package.json</p> <p> Dependency Hierarchy: - angular-translate-2.15.2.tgz (Root Library) - :x: **angular-1.6.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sumanth-nb/depenency-checker/commit/614ccfcf2bfc23de11442e8f556c369bc14b36ee">614ccfcf2bfc23de11442e8f556c369bc14b36ee</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload. <p>Publish Date: 2019-11-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10768>CVE-2019-10768</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768</a></p> <p>Release Date: 2019-11-19</p> <p>Fix Resolution: v1.7.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-10768 (High) detected in angular-1.6.10.tgz - ## CVE-2019-10768 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>angular-1.6.10.tgz</b></p></summary> <p>HTML enhanced for web apps</p> <p>Library home page: <a href="https://registry.npmjs.org/angular/-/angular-1.6.10.tgz">https://registry.npmjs.org/angular/-/angular-1.6.10.tgz</a></p> <p>Path to dependency file: depenency-checker/package.json</p> <p>Path to vulnerable library: depenency-checker/node_modules/angular/package.json</p> <p> Dependency Hierarchy: - angular-translate-2.15.2.tgz (Root Library) - :x: **angular-1.6.10.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/sumanth-nb/depenency-checker/commit/614ccfcf2bfc23de11442e8f556c369bc14b36ee">614ccfcf2bfc23de11442e8f556c369bc14b36ee</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In AngularJS before 1.7.9 the function `merge()` could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload. <p>Publish Date: 2019-11-19 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10768>CVE-2019-10768</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10768</a></p> <p>Release Date: 2019-11-19</p> <p>Fix Resolution: v1.7.9</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in angular tgz cve high severity vulnerability vulnerable library angular tgz html enhanced for web apps library home page a href path to dependency file depenency checker package json path to vulnerable library depenency checker node modules angular package json dependency hierarchy angular translate tgz root library x angular tgz vulnerable library found in head commit a href found in base branch master vulnerability details in angularjs before the function merge could be tricked into adding or modifying properties of object prototype using a proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
4,109
4,891,209,092
IssuesEvent
2016-11-18 16:04:33
molgenis/molgenis
https://api.github.com/repos/molgenis/molgenis
closed
Sign up is not working
2.0-RC bug mod:security
#### Reproduce Fill in the next fields: Username: ... Password: ... Repeat password: ... Email address: ... #### Expected To be signed up #### Observed Error! An error occurred. Please contact the administrator. You are not signed up!
True
Sign up is not working - #### Reproduce Fill in the next fields: Username: ... Password: ... Repeat password: ... Email address: ... #### Expected To be signed up #### Observed Error! An error occurred. Please contact the administrator. You are not signed up!
non_priority
sign up is not working reproduce fill in the next fields username password repeat password email address expected to be signed up observed error an error occurred please contact the administrator you are not signed up
0
72,055
18,983,876,251
IssuesEvent
2021-11-21 11:30:59
CosmosOS/Cosmos
https://api.github.com/repos/CosmosOS/Cosmos
opened
Build problem: Unable to start debugging. The startup project cannot be launched.
Area: Visual Studio Integration Area: Build
Have you checked Github Issues for similar errors? Yes **Exception** ``` Unable to start debugging. The startup project cannot be launched. Ensure that the correct project is set as the startup project. The startup project can be changed by selecting the 'Set as Startup Project' command from the right click menu in Solution Explorer. Additionally make sure its debug settings are correctly configured in project properties. ``` ** VS Output Logs ** None **To Reproduce** Install everything required for the user kit. Create a new VS project. Try to compile and start (debug) the project. **Screenshots** ![image](https://user-images.githubusercontent.com/60812901/142759859-4aeeae33-4b9d-47de-9535-f57e512c62b4.png) **Context** Before posting please confirm that the following are in order [X] Both Cosmos VS Extensions are installed [X] In the NuGet Package Manager "Include prerelease" is selected [X] The Cosmos NuGet package store is selected (NOT nuget.org) in 'Manage NuGet Packages' [X] The Cosmos NuGet packages are installed When starting (pressing F5) for the first time it started a command line window and generated an iso file, but after that the window closed and VS will just show an error when trying to compile in any way.
1.0
Build problem: Unable to start debugging. The startup project cannot be launched. - Have you checked Github Issues for similar errors? Yes **Exception** ``` Unable to start debugging. The startup project cannot be launched. Ensure that the correct project is set as the startup project. The startup project can be changed by selecting the 'Set as Startup Project' command from the right click menu in Solution Explorer. Additionally make sure its debug settings are correctly configured in project properties. ``` ** VS Output Logs ** None **To Reproduce** Install everything required for the user kit. Create a new VS project. Try to compile and start (debug) the project. **Screenshots** ![image](https://user-images.githubusercontent.com/60812901/142759859-4aeeae33-4b9d-47de-9535-f57e512c62b4.png) **Context** Before posting please confirm that the following are in order [X] Both Cosmos VS Extensions are installed [X] In the NuGet Package Manager "Include prerelease" is selected [X] The Cosmos NuGet package store is selected (NOT nuget.org) in 'Manage NuGet Packages' [X] The Cosmos NuGet packages are installed When starting (pressing F5) for the first time it started a command line window and generated an iso file, but after that the window closed and VS will just show an error when trying to compile in any way.
non_priority
build problem unable to start debugging the startup project cannot be launched have you checked github issues for similar errors yes exception unable to start debugging the startup project cannot be launched ensure that the correct project is set as the startup project the startup project can be changed by selecting the set as startup project command from the right click menu in solution explorer additionally make sure its debug settings are correctly configured in project properties vs output logs none to reproduce install everything required for the user kit create a new vs project try to compile and start debug the project screenshots context before posting please confirm that the following are in order both cosmos vs extensions are installed in the nuget package manager include prerelease is selected the cosmos nuget package store is selected not nuget org in manage nuget packages the cosmos nuget packages are installed when starting pressing for the first time it started a command line window and generated an iso file but after that the window closed and vs will just show an error when trying to compile in any way
0
2,567
2,978,160,034
IssuesEvent
2015-07-16 02:59:52
eslint/eslint
https://api.github.com/repos/eslint/eslint
closed
mocha-phantomjs install creating issues with peerdependency
bug build
As of the latest release of `mocha-phantomjs`, they locked down their `phantomjs` peerDependency version to `1.9.7-15` (https://github.com/nathanboktae/mocha-phantomjs/commit/219bc30afa7bb629549fdff89d989e737fa67303). But we in our package explicitly require `phantomjs`, so we end up installing the latest (`1.9.17`), and then we get an install error. here is the error: ```sh npm ERR! Windows_NT 6.3.9600 npm ERR! argv "c:\\Program Files\\nodejs\\node.exe" "c:\\Program Files\\nodejs\\node_modules\\npm\\bin\\npm-cli.js" "install" npm ERR! node v0.12.7 npm ERR! npm v2.11.3 npm ERR! code EPEERINVALID npm ERR! peerinvalid The package phantomjs does not satisfy its siblings' peerDependencies requirements! npm ERR! peerinvalid Peer mocha-phantomjs@3.5.4 wants phantomjs@1.9.1 - 1.9.7-15 npm ERR! Please include the following file with any support request: npm ERR! C:\Users\Gyandeep\WebstormProjects\eslint\npm-debug.log ``` Question: Why do we have `phantomjs` as a devDependency?
1.0
mocha-phantomjs install creating issues with peerdependency - As of the latest release of `mocha-phantomjs`, they locked down their `phantomjs` peerDependency version to `1.9.7-15` (https://github.com/nathanboktae/mocha-phantomjs/commit/219bc30afa7bb629549fdff89d989e737fa67303). But we in our package explicitly require `phantomjs`, so we end up installing the latest (`1.9.17`), and then we get an install error. here is the error: ```sh npm ERR! Windows_NT 6.3.9600 npm ERR! argv "c:\\Program Files\\nodejs\\node.exe" "c:\\Program Files\\nodejs\\node_modules\\npm\\bin\\npm-cli.js" "install" npm ERR! node v0.12.7 npm ERR! npm v2.11.3 npm ERR! code EPEERINVALID npm ERR! peerinvalid The package phantomjs does not satisfy its siblings' peerDependencies requirements! npm ERR! peerinvalid Peer mocha-phantomjs@3.5.4 wants phantomjs@1.9.1 - 1.9.7-15 npm ERR! Please include the following file with any support request: npm ERR! C:\Users\Gyandeep\WebstormProjects\eslint\npm-debug.log ``` Question: Why do we have `phantomjs` as a devDependency?
non_priority
mocha phantomjs install creating issues with peerdependency as of the latest release of mocha phantomjs they locked down their phantomjs peerdependency version to but we in our package explicitly require phantomjs so we end up installing the latest and then we get an install error here is the error sh npm err windows nt npm err argv c program files nodejs node exe c program files nodejs node modules npm bin npm cli js install npm err node npm err npm npm err code epeerinvalid npm err peerinvalid the package phantomjs does not satisfy its siblings peerdependencies requirements npm err peerinvalid peer mocha phantomjs wants phantomjs npm err please include the following file with any support request npm err c users gyandeep webstormprojects eslint npm debug log question why do we have phantomjs as a devdependency
0
220,647
16,978,866,342
IssuesEvent
2021-06-30 05:52:37
razor-network/razor-go
https://api.github.com/repos/razor-network/razor-go
closed
Change the heading of README.md
documentation good first issue
The heading of the README file reads Go-CLI. Instead, the repo name has been changed to `razor-go`.
1.0
Change the heading of README.md - The heading of the README file reads Go-CLI. Instead, the repo name has been changed to `razor-go`.
non_priority
change the heading of readme md the heading of the readme file reads go cli instead the repo name has been changed to razor go
0
20,753
14,138,681,577
IssuesEvent
2020-11-10 08:47:47
fluencelabs/fluence
https://api.github.com/repos/fluencelabs/fluence
closed
Implement control RPC for the node
scala ~infrastructure ~node ~worker
It should contain the following methods: - stop app - restart app - run app
1.0
Implement control RPC for the node - It should contain the following methods: - stop app - restart app - run app
non_priority
implement control rpc for the node it should contain the following methods stop app restart app run app
0
94,412
27,186,451,551
IssuesEvent
2023-02-19 09:15:57
curl/curl
https://api.github.com/repos/curl/curl
closed
Unable detect OpenSSL while set host to arm-linux-gnueabi
build TLS
While I configure the cURL 7.88.0 source with: > ./configure --with-openssl It works correctly. But if I set host to arm-linux-gnueabi, configure like these: > ./configure --with-openssl --host=arm-linux-gnueabi > ./configure --with-openssl --host=arm-linux-gnueabi --target=arm-linux-gnueabi > ./configure --with-openssl --host=arm-linux-gnueabi --target=arm-linux-gnueabi CC=arm-linux-gnueabi-gcc I got an error: > configure: error: --with-openssl was given but OpenSSL could not be detected Ubuntu version is 14.04.6, arm-linux-gnueabi-gcc version is 4.7.3, OpenSSL version is 1.0.1f. What's the reason and how can I solve it? Please help me, Thanks.
1.0
Unable detect OpenSSL while set host to arm-linux-gnueabi - While I configure the cURL 7.88.0 source with: > ./configure --with-openssl It works correctly. But if I set host to arm-linux-gnueabi, configure like these: > ./configure --with-openssl --host=arm-linux-gnueabi > ./configure --with-openssl --host=arm-linux-gnueabi --target=arm-linux-gnueabi > ./configure --with-openssl --host=arm-linux-gnueabi --target=arm-linux-gnueabi CC=arm-linux-gnueabi-gcc I got an error: > configure: error: --with-openssl was given but OpenSSL could not be detected Ubuntu version is 14.04.6, arm-linux-gnueabi-gcc version is 4.7.3, OpenSSL version is 1.0.1f. What's the reason and how can I solve it? Please help me, Thanks.
non_priority
unable detect openssl while set host to arm linux gnueabi while i configure the curl source with configure with openssl it works correctly but if i set host to arm linux gnueabi configure like these configure with openssl host arm linux gnueabi configure with openssl host arm linux gnueabi target arm linux gnueabi configure with openssl host arm linux gnueabi target arm linux gnueabi cc arm linux gnueabi gcc i got an error configure error with openssl was given but openssl could not be detected ubuntu version is arm linux gnueabi gcc version is openssl version is what s the reason and how can i solve it please help me thanks
0
44,265
23,534,436,331
IssuesEvent
2022-08-19 18:53:51
Agoric/agoric-sdk
https://api.github.com/repos/Agoric/agoric-sdk
closed
Long block times for a network under load
bug SwingSet performance MUST-HAVE
## Describe the bug On a testnet with 90 ag-solos interacting with the AMM, block times are abnormally long (15 seconds). Additionally in the log output it appears that consensus times out multiple times depending on the host. ## To Reproduce Steps to reproduce the behavior: 1. spin up a new testnet with 4 validators 2. launch 90 ag-solos 3. see block times take a lot more than 5 seconds with only 90 clients ## Expected behavior Block times for < 2000 active connections should be less than the empty block interval ## Additional context I can spin up an instagoric environment that exhibits this behavior easily ## Screenshots Consensus log: https://gist.github.com/arirubinstein/5270b67b15f042f57965b1cc811c1354 <img width="1368" alt="Screen Shot 2022-05-12 at 6 30 19 PM" src="https://user-images.githubusercontent.com/22369/168193705-fb3f73d9-f1a0-4f3d-9a89-487c33d634e5.png">
True
Long block times for a network under load - ## Describe the bug On a testnet with 90 ag-solos interacting with the AMM, block times are abnormally long (15 seconds). Additionally in the log output it appears that consensus times out multiple times depending on the host. ## To Reproduce Steps to reproduce the behavior: 1. spin up a new testnet with 4 validators 2. launch 90 ag-solos 3. see block times take a lot more than 5 seconds with only 90 clients ## Expected behavior Block times for < 2000 active connections should be less than the empty block interval ## Additional context I can spin up an instagoric environment that exhibits this behavior easily ## Screenshots Consensus log: https://gist.github.com/arirubinstein/5270b67b15f042f57965b1cc811c1354 <img width="1368" alt="Screen Shot 2022-05-12 at 6 30 19 PM" src="https://user-images.githubusercontent.com/22369/168193705-fb3f73d9-f1a0-4f3d-9a89-487c33d634e5.png">
non_priority
long block times for a network under load describe the bug on a testnet with ag solos interacting with the amm block times are abnormally long seconds additionally in the log output it appears that consensus times out multiple times depending on the host to reproduce steps to reproduce the behavior spin up a new testnet with validators launch ag solos see block times take a lot more than seconds with only clients expected behavior block times for active connections should be less than the empty block interval additional context i can spin up an instagoric environment that exhibits this behavior easily screenshots consensus log img width alt screen shot at pm src
0
46,988
13,200,394,926
IssuesEvent
2020-08-14 08:09:05
jnfaerch/comic-lib
https://api.github.com/repos/jnfaerch/comic-lib
opened
CVE-2020-7598 (Medium) detected in multiple libraries
security vulnerability
## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/comic-lib/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/comic-lib/node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - ts-node-7.0.1.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-0.0.10.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/comic-lib/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/comic-lib/node_modules/optimist/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/comic-lib/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/comic-lib/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - compiler-cli-8.0.1.tgz (Root Library) - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jnfaerch/comic-lib/commit/e4078f6f753ac0d6d7caf3eedbcda1f7851fab6b">e4078f6f753ac0d6d7caf3eedbcda1f7851fab6b</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-7598 (Medium) detected in multiple libraries - ## CVE-2020-7598 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>minimist-0.0.8.tgz</b>, <b>minimist-0.0.10.tgz</b>, <b>minimist-1.2.0.tgz</b></p></summary> <p> <details><summary><b>minimist-0.0.8.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.8.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/comic-lib/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/comic-lib/node_modules/mkdirp/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - ts-node-7.0.1.tgz (Root Library) - mkdirp-0.5.1.tgz - :x: **minimist-0.0.8.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-0.0.10.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz">https://registry.npmjs.org/minimist/-/minimist-0.0.10.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/comic-lib/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/comic-lib/node_modules/optimist/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - karma-4.1.0.tgz (Root Library) - optimist-0.6.1.tgz - :x: **minimist-0.0.10.tgz** (Vulnerable Library) </details> <details><summary><b>minimist-1.2.0.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.0.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/comic-lib/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/comic-lib/node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - compiler-cli-8.0.1.tgz (Root Library) - :x: **minimist-1.2.0.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/jnfaerch/comic-lib/commit/e4078f6f753ac0d6d7caf3eedbcda1f7851fab6b">e4078f6f753ac0d6d7caf3eedbcda1f7851fab6b</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> minimist before 1.2.2 could be tricked into adding or modifying properties of Object.prototype using a "constructor" or "__proto__" payload. <p>Publish Date: 2020-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7598>CVE-2020-7598</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94">https://github.com/substack/minimist/commit/63e7ed05aa4b1889ec2f3b196426db4500cbda94</a></p> <p>Release Date: 2020-03-11</p> <p>Fix Resolution: minimist - 0.2.1,1.2.3</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries minimist tgz minimist tgz minimist tgz minimist tgz parse argument options library home page a href path to dependency file tmp ws scm comic lib package json path to vulnerable library tmp ws scm comic lib node modules mkdirp node modules minimist package json dependency hierarchy ts node tgz root library mkdirp tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file tmp ws scm comic lib package json path to vulnerable library tmp ws scm comic lib node modules optimist node modules minimist package json dependency hierarchy karma tgz root library optimist tgz x minimist tgz vulnerable library minimist tgz parse argument options library home page a href path to dependency file tmp ws scm comic lib package json path to vulnerable library tmp ws scm comic lib node modules minimist package json dependency hierarchy compiler cli tgz root library x minimist tgz vulnerable library found in head commit a href vulnerability details minimist before could be tricked into adding or modifying properties of object prototype using a constructor or proto payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution minimist step up your open source security game with whitesource
0
7,186
24,367,195,369
IssuesEvent
2022-10-03 16:03:52
bcgov/api-services-portal
https://api.github.com/repos/bcgov/api-services-portal
opened
Cypress Test - Product Page Refresh
automation
- [ ] Update all existing scenarios as per new Product Page controls and UI
1.0
Cypress Test - Product Page Refresh - - [ ] Update all existing scenarios as per new Product Page controls and UI
non_priority
cypress test product page refresh update all existing scenarios as per new product page controls and ui
0
237,871
26,085,417,800
IssuesEvent
2022-12-26 01:42:53
VivekBuzruk/UI
https://api.github.com/repos/VivekBuzruk/UI
opened
CVE-2022-46175 (High) detected in json5-1.0.1.tgz
security vulnerability
## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json</p> <p> Dependency Hierarchy: - build-angular-0.800.6.tgz (Root Library) - loader-utils-1.2.3.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/VivekBuzruk/UI/commits/edeb2a2fd15349abe4886893f9325323672726f3">edeb2a2fd15349abe4886893f9325323672726f3</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-46175 (High) detected in json5-1.0.1.tgz - ## CVE-2022-46175 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>json5-1.0.1.tgz</b></p></summary> <p>JSON for humans.</p> <p>Library home page: <a href="https://registry.npmjs.org/json5/-/json5-1.0.1.tgz">https://registry.npmjs.org/json5/-/json5-1.0.1.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/json5/package.json</p> <p> Dependency Hierarchy: - build-angular-0.800.6.tgz (Root Library) - loader-utils-1.2.3.tgz - :x: **json5-1.0.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/VivekBuzruk/UI/commits/edeb2a2fd15349abe4886893f9325323672726f3">edeb2a2fd15349abe4886893f9325323672726f3</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JSON5 is an extension to the popular JSON file format that aims to be easier to write and maintain by hand (e.g. for config files). The `parse` method of the JSON5 library before and including version `2.2.1` does not restrict parsing of keys named `__proto__`, allowing specially crafted strings to pollute the prototype of the resulting object. This vulnerability pollutes the prototype of the object returned by `JSON5.parse` and not the global Object prototype, which is the commonly understood definition of Prototype Pollution. However, polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations. This vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from `JSON5.parse`. The actual impact will depend on how applications utilize the returned object and how they filter unwanted keys, but could include denial of service, cross-site scripting, elevation of privilege, and in extreme cases, remote code execution. `JSON5.parse` should restrict parsing of `__proto__` keys when parsing JSON strings to objects. As a point of reference, the `JSON.parse` method included in JavaScript ignores `__proto__` keys. Simply changing `JSON5.parse` to `JSON.parse` in the examples above mitigates this vulnerability. This vulnerability is patched in json5 version 2.2.2 and later. <p>Publish Date: 2022-12-24 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-46175>CVE-2022-46175</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2022-46175">https://www.cve.org/CVERecord?id=CVE-2022-46175</a></p> <p>Release Date: 2022-12-24</p> <p>Fix Resolution: json5 - 2.2.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tgz cve high severity vulnerability vulnerable library tgz json for humans library home page a href path to dependency file package json path to vulnerable library node modules package json dependency hierarchy build angular tgz root library loader utils tgz x tgz vulnerable library found in head commit a href found in base branch master vulnerability details is an extension to the popular json file format that aims to be easier to write and maintain by hand e g for config files the parse method of the library before and including version does not restrict parsing of keys named proto allowing specially crafted strings to pollute the prototype of the resulting object this vulnerability pollutes the prototype of the object returned by parse and not the global object prototype which is the commonly understood definition of prototype pollution however polluting the prototype of a single object can have significant security impact for an application if the object is later used in trusted operations this vulnerability could allow an attacker to set arbitrary and unexpected keys on the object returned from parse the actual impact will depend on how applications utilize the returned object and how they filter unwanted keys but could include denial of service cross site scripting elevation of privilege and in extreme cases remote code execution parse should restrict parsing of proto keys when parsing json strings to objects as a point of reference the json parse method included in javascript ignores proto keys simply changing parse to json parse in the examples above mitigates this vulnerability this vulnerability is patched in version and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
258,462
22,321,315,711
IssuesEvent
2022-06-14 06:43:37
pytorch/pytorch
https://api.github.com/repos/pytorch/pytorch
opened
DISABLED test_noncontiguous_samples_nn_functional_conv_transpose3d_cuda_float32 (__main__.TestCommonCUDA)
module: flaky-tests skipped module: unknown
Platforms: linux This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_noncontiguous_samples_nn_functional_conv_transpose3d_cuda_float32&suite=TestCommonCUDA&file=test_ops.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/6872850782). Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 red and 1 green.
1.0
DISABLED test_noncontiguous_samples_nn_functional_conv_transpose3d_cuda_float32 (__main__.TestCommonCUDA) - Platforms: linux This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_noncontiguous_samples_nn_functional_conv_transpose3d_cuda_float32&suite=TestCommonCUDA&file=test_ops.py) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/6872850782). Over the past 3 hours, it has been determined flaky in 1 workflow(s) with 1 red and 1 green.
non_priority
disabled test noncontiguous samples nn functional conv cuda main testcommoncuda platforms linux this test was disabled because it is failing in ci see and the most recent trunk over the past hours it has been determined flaky in workflow s with red and green
0
186,929
21,992,990,183
IssuesEvent
2022-05-26 01:17:39
vipinsun/blockchain-carbon-accounting
https://api.github.com/repos/vipinsun/blockchain-carbon-accounting
opened
CVE-2022-24434 (High) detected in dicer-0.3.0.tgz, dicer-0.2.5.tgz
security vulnerability
## CVE-2022-24434 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>dicer-0.3.0.tgz</b>, <b>dicer-0.2.5.tgz</b></p></summary> <p> <details><summary><b>dicer-0.3.0.tgz</b></p></summary> <p>A very fast streaming multipart parser for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/dicer/-/dicer-0.3.0.tgz">https://registry.npmjs.org/dicer/-/dicer-0.3.0.tgz</a></p> <p>Path to dependency file: /utility-emissions-channel/typescript_app/package.json</p> <p>Path to vulnerable library: /utility-emissions-channel/typescript_app/node_modules/s3rver/node_modules/dicer/package.json</p> <p> Dependency Hierarchy: - serverless-s3-local-0.6.7.tgz (Root Library) - s3rver-3.6.1.tgz - busboy-0.3.1.tgz - :x: **dicer-0.3.0.tgz** (Vulnerable Library) </details> <details><summary><b>dicer-0.2.5.tgz</b></p></summary> <p>A very fast streaming multipart parser for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/dicer/-/dicer-0.2.5.tgz">https://registry.npmjs.org/dicer/-/dicer-0.2.5.tgz</a></p> <p>Path to dependency file: /utility-emissions-channel/typescript_app/package.json</p> <p>Path to vulnerable library: /utility-emissions-channel/typescript_app/node_modules/dicer/package.json</p> <p> Dependency Hierarchy: - multer-1.4.2.tgz (Root Library) - busboy-0.2.14.tgz - :x: **dicer-0.2.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/vipinsun/blockchain-carbon-accounting/commit/d388e16464e00b9ce84df0d247029f534a429b90">d388e16464e00b9ce84df0d247029f534a429b90</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects all versions of package dicer. A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes. <p>Publish Date: 2022-05-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24434>CVE-2022-24434</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24434">https://nvd.nist.gov/vuln/detail/CVE-2022-24434</a></p> <p>Release Date: 2022-05-20</p> <p>Fix Resolution: no_fix</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24434 (High) detected in dicer-0.3.0.tgz, dicer-0.2.5.tgz - ## CVE-2022-24434 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>dicer-0.3.0.tgz</b>, <b>dicer-0.2.5.tgz</b></p></summary> <p> <details><summary><b>dicer-0.3.0.tgz</b></p></summary> <p>A very fast streaming multipart parser for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/dicer/-/dicer-0.3.0.tgz">https://registry.npmjs.org/dicer/-/dicer-0.3.0.tgz</a></p> <p>Path to dependency file: /utility-emissions-channel/typescript_app/package.json</p> <p>Path to vulnerable library: /utility-emissions-channel/typescript_app/node_modules/s3rver/node_modules/dicer/package.json</p> <p> Dependency Hierarchy: - serverless-s3-local-0.6.7.tgz (Root Library) - s3rver-3.6.1.tgz - busboy-0.3.1.tgz - :x: **dicer-0.3.0.tgz** (Vulnerable Library) </details> <details><summary><b>dicer-0.2.5.tgz</b></p></summary> <p>A very fast streaming multipart parser for node.js</p> <p>Library home page: <a href="https://registry.npmjs.org/dicer/-/dicer-0.2.5.tgz">https://registry.npmjs.org/dicer/-/dicer-0.2.5.tgz</a></p> <p>Path to dependency file: /utility-emissions-channel/typescript_app/package.json</p> <p>Path to vulnerable library: /utility-emissions-channel/typescript_app/node_modules/dicer/package.json</p> <p> Dependency Hierarchy: - multer-1.4.2.tgz (Root Library) - busboy-0.2.14.tgz - :x: **dicer-0.2.5.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/vipinsun/blockchain-carbon-accounting/commit/d388e16464e00b9ce84df0d247029f534a429b90">d388e16464e00b9ce84df0d247029f534a429b90</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects all versions of package dicer. A malicious attacker can send a modified form to server, and crash the nodejs service. An attacker could sent the payload again and again so that the service continuously crashes. <p>Publish Date: 2022-05-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24434>CVE-2022-24434</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2022-24434">https://nvd.nist.gov/vuln/detail/CVE-2022-24434</a></p> <p>Release Date: 2022-05-20</p> <p>Fix Resolution: no_fix</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in dicer tgz dicer tgz cve high severity vulnerability vulnerable libraries dicer tgz dicer tgz dicer tgz a very fast streaming multipart parser for node js library home page a href path to dependency file utility emissions channel typescript app package json path to vulnerable library utility emissions channel typescript app node modules node modules dicer package json dependency hierarchy serverless local tgz root library tgz busboy tgz x dicer tgz vulnerable library dicer tgz a very fast streaming multipart parser for node js library home page a href path to dependency file utility emissions channel typescript app package json path to vulnerable library utility emissions channel typescript app node modules dicer package json dependency hierarchy multer tgz root library busboy tgz x dicer tgz vulnerable library found in head commit a href found in base branch main vulnerability details this affects all versions of package dicer a malicious attacker can send a modified form to server and crash the nodejs service an attacker could sent the payload again and again so that the service continuously crashes publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution no fix step up your open source security game with whitesource
0
302,977
26,177,506,004
IssuesEvent
2023-01-02 11:37:41
ECP-WarpX/WarpX
https://api.github.com/repos/ECP-WarpX/WarpX
closed
Boundary issue in 1D ES solve
bug component: electrostatic bug: affects latest release component: boundary
The current ES solver generates spurious fields close to the left boundary. Please see plot of E_z below ran with periodic BC. Roelof already found a solution using a SuperLU solve as you can observe on the bottom . ![image](https://user-images.githubusercontent.com/66696778/206767048-6a0c275d-1c4d-4a3d-8765-fc30c8c65207.png) ![image](https://user-images.githubusercontent.com/66696778/206796636-fa67f615-9d38-4deb-86eb-64650aaa6c4a.png)
1.0
Boundary issue in 1D ES solve - The current ES solver generates spurious fields close to the left boundary. Please see plot of E_z below ran with periodic BC. Roelof already found a solution using a SuperLU solve as you can observe on the bottom . ![image](https://user-images.githubusercontent.com/66696778/206767048-6a0c275d-1c4d-4a3d-8765-fc30c8c65207.png) ![image](https://user-images.githubusercontent.com/66696778/206796636-fa67f615-9d38-4deb-86eb-64650aaa6c4a.png)
non_priority
boundary issue in es solve the current es solver generates spurious fields close to the left boundary please see plot of e z below ran with periodic bc roelof already found a solution using a superlu solve as you can observe on the bottom
0
33,490
6,208,829,504
IssuesEvent
2017-07-07 01:25:10
sequelize/sequelize
https://api.github.com/repos/sequelize/sequelize
closed
Documentation shows two different ways of setting the size of the connection pool
documentation stale
[This page](http://docs.sequelizejs.com/en/v3/api/sequelize/) says that `maxConnections` should be set, but [this page](http://docs.sequelizejs.com/en/v3/docs/getting-started/) says that `max` should be set. Looking at [the source](https://github.com/sequelize/sequelize/blob/master/lib/sequelize.js) is appears that `max` is the correct field name. Ditto for `min` vs `minConnection` and `idle` vs `maxIdleTime`. If you agree that this is an issue I'm happy to make a PR updating the docs so that they are consistent.
1.0
Documentation shows two different ways of setting the size of the connection pool - [This page](http://docs.sequelizejs.com/en/v3/api/sequelize/) says that `maxConnections` should be set, but [this page](http://docs.sequelizejs.com/en/v3/docs/getting-started/) says that `max` should be set. Looking at [the source](https://github.com/sequelize/sequelize/blob/master/lib/sequelize.js) is appears that `max` is the correct field name. Ditto for `min` vs `minConnection` and `idle` vs `maxIdleTime`. If you agree that this is an issue I'm happy to make a PR updating the docs so that they are consistent.
non_priority
documentation shows two different ways of setting the size of the connection pool says that maxconnections should be set but says that max should be set looking at is appears that max is the correct field name ditto for min vs minconnection and idle vs maxidletime if you agree that this is an issue i m happy to make a pr updating the docs so that they are consistent
0
53,979
6,358,286,643
IssuesEvent
2017-07-31 00:45:32
QubesOS/updates-status
https://api.github.com/repos/QubesOS/updates-status
closed
manager v4.0.2 (r4.0)
r4.0-dom0-testing
Update of manager to v4.0.2 for Qubes r4.0, see comments below for details. Built from: https://github.com/QubesOS/qubes-manager/commit/d349248b35c0dc7333c81221cd2cbc0827277f89 [Changes since previous version](https://github.com/QubesOS/qubes-manager/compare/v4.0.1...v4.0.2): QubesOS/qubes-manager@d349248 version 4.0.2 QubesOS/qubes-manager@9de507f Change 'hvm' property to 'virt_mode' QubesOS/qubes-manager@fe79d52 Merge remote-tracking branch 'qubesos/pr/37' QubesOS/qubes-manager@e2f6c00 fixes to system menu Referenced issues: QubesOS/qubes-issues#2912 If you're release manager, you can issue GPG-inline signed command: * `Upload manager d349248b35c0dc7333c81221cd2cbc0827277f89 r4.0 current repo` (available 7 days from now) * `Upload manager d349248b35c0dc7333c81221cd2cbc0827277f89 r4.0 current (dists) repo`, you can choose subset of distributions, like `vm-fc24 vm-fc25` (available 7 days from now) * `Upload manager d349248b35c0dc7333c81221cd2cbc0827277f89 r4.0 security-testing repo` Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
1.0
manager v4.0.2 (r4.0) - Update of manager to v4.0.2 for Qubes r4.0, see comments below for details. Built from: https://github.com/QubesOS/qubes-manager/commit/d349248b35c0dc7333c81221cd2cbc0827277f89 [Changes since previous version](https://github.com/QubesOS/qubes-manager/compare/v4.0.1...v4.0.2): QubesOS/qubes-manager@d349248 version 4.0.2 QubesOS/qubes-manager@9de507f Change 'hvm' property to 'virt_mode' QubesOS/qubes-manager@fe79d52 Merge remote-tracking branch 'qubesos/pr/37' QubesOS/qubes-manager@e2f6c00 fixes to system menu Referenced issues: QubesOS/qubes-issues#2912 If you're release manager, you can issue GPG-inline signed command: * `Upload manager d349248b35c0dc7333c81221cd2cbc0827277f89 r4.0 current repo` (available 7 days from now) * `Upload manager d349248b35c0dc7333c81221cd2cbc0827277f89 r4.0 current (dists) repo`, you can choose subset of distributions, like `vm-fc24 vm-fc25` (available 7 days from now) * `Upload manager d349248b35c0dc7333c81221cd2cbc0827277f89 r4.0 security-testing repo` Above commands will work only if packages in current-testing repository were built from given commit (i.e. no new version superseded it).
non_priority
manager update of manager to for qubes see comments below for details built from qubesos qubes manager version qubesos qubes manager change hvm property to virt mode qubesos qubes manager merge remote tracking branch qubesos pr qubesos qubes manager fixes to system menu referenced issues qubesos qubes issues if you re release manager you can issue gpg inline signed command upload manager current repo available days from now upload manager current dists repo you can choose subset of distributions like vm vm available days from now upload manager security testing repo above commands will work only if packages in current testing repository were built from given commit i e no new version superseded it
0
129,848
17,926,434,267
IssuesEvent
2021-09-10 00:37:06
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
TabBarView always change to the first one after minimize the application window in flutter for windows
framework f: material design platform-windows has reproducible steps a: state restoration found in release: 1.22
<!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a bug or if our documentation doesn't have an answer to what you're looking for, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Steps to Reproduce <!-- You must include full steps to reproduce so that we can reproduce the problem. --> 1. Run `flutter create bug`. 2. Update the lib/main.dart as follows: ... <!-- include every file that is different from the template app! --> ``` import 'package:flutter/material.dart'; void main() { runApp(TabBarDemo()); } class TabBarDemo extends StatelessWidget { @override Widget build(BuildContext context) { return MaterialApp( home: DefaultTabController( length: 3, child: Scaffold( appBar: AppBar( bottom: TabBar( tabs: [ Tab(icon: Icon(Icons.directions_car)), Tab(icon: Icon(Icons.directions_transit)), Tab(icon: Icon(Icons.directions_bike)), ], ), title: Text('Tabs Demo'), ), body: TabBarView( children: [ Icon(Icons.directions_car), Icon(Icons.directions_transit), Icon(Icons.directions_bike), ], ), ), ), ); } } ``` 3. flutter run -d windows switch tab to second or third tab, minimize application and reopen it. **Expected results:** <!-- what did you want to see? --> TabBarView should be synced with tabbar. **Actual results:** <!-- what did you see? --> First TabBarView is shown. See the picture: ![Capturer_gif_20200827_215419_317](https://user-images.githubusercontent.com/14681050/91451774-553a6580-e8b0-11ea-8000-da996d4baa2e.gif) <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. --> ``` ``` <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [√] Flutter (Channel master, 1.22.0-2.0.pre.93, on Microsoft Windows [Version 10.0.18363.1016], locale zh-CN) • Flutter version 1.22.0-2.0.pre.93 at F:\flutter • Framework revision f35a8b7470 (9 hours ago), 2020-08-26 21:33:03 -0700 • Engine revision 388193a67b • Dart version 2.10.0 (build 2.10.0-62.0.dev) • Pub download mirror https://pub.flutter-io.cn • Flutter download mirror https://storage.flutter-io.cn [!] Android toolchain - develop for Android devices (Android SDK version 29.0.2) • Android SDK at F:\Android_SDK • Platform android-29, build-tools 29.0.2 • ANDROID_SDK_ROOT = F:\Android_SDK X Android SDK file not found: F:\Android_SDK\platforms\android-29\android.jar. • Try re-installing or updating your Android SDK, visit https://flutter.dev/docs/get-started/install/windows#android-setup for detailed instructions. [√] Visual Studio - develop for Windows (Visual Studio Community 2019 16.6.5) • Visual Studio at C:\Program Files (x86)\Microsoft Visual Studio\2019\Community • Visual Studio Community 2019 version 16.6.30320.27 • Windows 10 SDK version 10.0.18362.0 [√] Android Studio (version 4.0) • Android Studio at F:\Android Studio • Flutter plugin version 48.1.2 • Dart plugin version 193.7361 • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b01) [√] VS Code (version 1.48.2) • VS Code at C:\Users\zouji\AppData\Local\Programs\Microsoft VS Code • Flutter extension version 3.13.2 [√] Connected device (1 available) • Windows (desktop) • windows • windows-x64 • Microsoft Windows [Version 10.0.18363.1016] ! Doctor found issues in 1 category. ``` </details> BTW, I cannot reproduce this in flutter for macos.
1.0
TabBarView always change to the first one after minimize the application window in flutter for windows - <!-- Thank you for using Flutter! If you are looking for support, please check out our documentation or consider asking a question on Stack Overflow: * https://flutter.dev/ * https://api.flutter.dev/ * https://stackoverflow.com/questions/tagged/flutter?sort=frequent If you have found a bug or if our documentation doesn't have an answer to what you're looking for, then fill out the template below. Please read our guide to filing a bug first: https://flutter.dev/docs/resources/bug-reports --> ## Steps to Reproduce <!-- You must include full steps to reproduce so that we can reproduce the problem. --> 1. Run `flutter create bug`. 2. Update the lib/main.dart as follows: ... <!-- include every file that is different from the template app! --> ``` import 'package:flutter/material.dart'; void main() { runApp(TabBarDemo()); } class TabBarDemo extends StatelessWidget { @override Widget build(BuildContext context) { return MaterialApp( home: DefaultTabController( length: 3, child: Scaffold( appBar: AppBar( bottom: TabBar( tabs: [ Tab(icon: Icon(Icons.directions_car)), Tab(icon: Icon(Icons.directions_transit)), Tab(icon: Icon(Icons.directions_bike)), ], ), title: Text('Tabs Demo'), ), body: TabBarView( children: [ Icon(Icons.directions_car), Icon(Icons.directions_transit), Icon(Icons.directions_bike), ], ), ), ), ); } } ``` 3. flutter run -d windows switch tab to second or third tab, minimize application and reopen it. **Expected results:** <!-- what did you want to see? --> TabBarView should be synced with tabbar. **Actual results:** <!-- what did you see? --> First TabBarView is shown. See the picture: ![Capturer_gif_20200827_215419_317](https://user-images.githubusercontent.com/14681050/91451774-553a6580-e8b0-11ea-8000-da996d4baa2e.gif) <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. --> ``` ``` <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [√] Flutter (Channel master, 1.22.0-2.0.pre.93, on Microsoft Windows [Version 10.0.18363.1016], locale zh-CN) • Flutter version 1.22.0-2.0.pre.93 at F:\flutter • Framework revision f35a8b7470 (9 hours ago), 2020-08-26 21:33:03 -0700 • Engine revision 388193a67b • Dart version 2.10.0 (build 2.10.0-62.0.dev) • Pub download mirror https://pub.flutter-io.cn • Flutter download mirror https://storage.flutter-io.cn [!] Android toolchain - develop for Android devices (Android SDK version 29.0.2) • Android SDK at F:\Android_SDK • Platform android-29, build-tools 29.0.2 • ANDROID_SDK_ROOT = F:\Android_SDK X Android SDK file not found: F:\Android_SDK\platforms\android-29\android.jar. • Try re-installing or updating your Android SDK, visit https://flutter.dev/docs/get-started/install/windows#android-setup for detailed instructions. [√] Visual Studio - develop for Windows (Visual Studio Community 2019 16.6.5) • Visual Studio at C:\Program Files (x86)\Microsoft Visual Studio\2019\Community • Visual Studio Community 2019 version 16.6.30320.27 • Windows 10 SDK version 10.0.18362.0 [√] Android Studio (version 4.0) • Android Studio at F:\Android Studio • Flutter plugin version 48.1.2 • Dart plugin version 193.7361 • Java version OpenJDK Runtime Environment (build 1.8.0_242-release-1644-b01) [√] VS Code (version 1.48.2) • VS Code at C:\Users\zouji\AppData\Local\Programs\Microsoft VS Code • Flutter extension version 3.13.2 [√] Connected device (1 available) • Windows (desktop) • windows • windows-x64 • Microsoft Windows [Version 10.0.18363.1016] ! Doctor found issues in 1 category. ``` </details> BTW, I cannot reproduce this in flutter for macos.
non_priority
tabbarview always change to the first one after minimize the application window in flutter for windows thank you for using flutter if you are looking for support please check out our documentation or consider asking a question on stack overflow if you have found a bug or if our documentation doesn t have an answer to what you re looking for then fill out the template below please read our guide to filing a bug first steps to reproduce run flutter create bug update the lib main dart as follows import package flutter material dart void main runapp tabbardemo class tabbardemo extends statelesswidget override widget build buildcontext context return materialapp home defaulttabcontroller length child scaffold appbar appbar bottom tabbar tabs tab icon icon icons directions car tab icon icon icons directions transit tab icon icon icons directions bike title text tabs demo body tabbarview children icon icons directions car icon icons directions transit icon icons directions bike flutter run d windows switch tab to second or third tab minimize application and reopen it expected results tabbarview should be synced with tabbar actual results first tabbarview is shown see the picture logs run your application with flutter run verbose and attach all the log output below between the lines with the backticks if there is an exception please see if the error message includes enough information to explain how to solve the issue run flutter analyze and attach any output of that command below if there are any analysis errors try resolving them before filing this issue flutter channel master pre on microsoft windows locale zh cn • flutter version pre at f flutter • framework revision hours ago • engine revision • dart version build dev • pub download mirror • flutter download mirror android toolchain develop for android devices android sdk version • android sdk at f android sdk • platform android build tools • android sdk root f android sdk x android sdk file not found f android sdk platforms android android jar • try re installing or updating your android sdk visit for detailed instructions visual studio develop for windows visual studio community • visual studio at c program files microsoft visual studio community • visual studio community version • windows sdk version android studio version • android studio at f android studio • flutter plugin version • dart plugin version • java version openjdk runtime environment build release vs code version • vs code at c users zouji appdata local programs microsoft vs code • flutter extension version connected device available • windows desktop • windows • windows • microsoft windows doctor found issues in category btw i cannot reproduce this in flutter for macos
0
416,862
28,104,131,002
IssuesEvent
2023-03-30 22:14:49
ivangoncharuk/DrawnToMagic
https://api.github.com/repos/ivangoncharuk/DrawnToMagic
opened
Improve the README Doc
documentation
- [ ] Add a todo list and reference them to issues. - [ ] Add labels for the version number.
1.0
Improve the README Doc - - [ ] Add a todo list and reference them to issues. - [ ] Add labels for the version number.
non_priority
improve the readme doc add a todo list and reference them to issues add labels for the version number
0
97,683
28,441,554,686
IssuesEvent
2023-04-16 00:38:04
blueprint-freespeech/gosling
https://api.github.com/repos/blueprint-freespeech/gosling
opened
Setup Github CI/CD
documentation build sponsor 2
CI/CD should perform the following: - [ ] Build crates and tests for target platforms (Windows, macOS, Linux) - [ ] Generate Rust and C documentation - [ ] Publish documentation on github-pages - [ ] Run unit tests for target platforms (Windows, macOS, Linux)
1.0
Setup Github CI/CD - CI/CD should perform the following: - [ ] Build crates and tests for target platforms (Windows, macOS, Linux) - [ ] Generate Rust and C documentation - [ ] Publish documentation on github-pages - [ ] Run unit tests for target platforms (Windows, macOS, Linux)
non_priority
setup github ci cd ci cd should perform the following build crates and tests for target platforms windows macos linux generate rust and c documentation publish documentation on github pages run unit tests for target platforms windows macos linux
0
75,735
14,517,546,830
IssuesEvent
2020-12-13 20:02:58
sanskrit-lexicon/csl-pywork
https://api.github.com/repos/sanskrit-lexicon/csl-pywork
closed
templates and constants
code-cleanup documentation
This comment begins my review and extension of the initial classification work for the modules of pywork. The idea of csl-pywork is similar to that of csl-websanlexicon. The repository should contain programs and data files required to regenerate the pywork directories for the individual dictionaries. Thus, the individual pywork directories can be managed in the central location of csl-pywork. This particular work is being done in a 'v01' directory, which currently is NOT part of the repository; it resides only in the Cologne server. When the dust settles, it is anticipated that 'v01' will be added to the repository. The files managed by csl-pywork are classified as either: * `constants` -- files that are identical for each dictionary. * `templates` -- files that are different for each dictionary, but whose differences can easily be captured by a few parameters in a template file. When the values of the template parameters are substituted into the template, the resulting rendered template is what is needed for the particular dictionary's pywork directory. * `idiosycratics` -- these files are quite different for each dictionary. For example, the abbreviation expansions would be such a file (for those dictionaries which have abbreviation markup). This comment pertains only to the `constants` and `templates`. The `idiosyncratics` will be discussed in other issues. ## computed pywork files An example of a computed file would be xxx.xml, the xml version of a dictionary digitization. We do not contemplate inclusion of computed files as part of this csl-pywork repository. Rather, full initialization (or updating) of an individual pywork directory will be done in two steps: * transferring files from this csl-pywork to the individual pywork directory -- a 'generate' program in csl-pywork will do this step * computing additional files within the individual pywork directory. For example, a redo_hw.sh script in the individual pywork directory will be run to compute xxxhw.txt.
1.0
templates and constants - This comment begins my review and extension of the initial classification work for the modules of pywork. The idea of csl-pywork is similar to that of csl-websanlexicon. The repository should contain programs and data files required to regenerate the pywork directories for the individual dictionaries. Thus, the individual pywork directories can be managed in the central location of csl-pywork. This particular work is being done in a 'v01' directory, which currently is NOT part of the repository; it resides only in the Cologne server. When the dust settles, it is anticipated that 'v01' will be added to the repository. The files managed by csl-pywork are classified as either: * `constants` -- files that are identical for each dictionary. * `templates` -- files that are different for each dictionary, but whose differences can easily be captured by a few parameters in a template file. When the values of the template parameters are substituted into the template, the resulting rendered template is what is needed for the particular dictionary's pywork directory. * `idiosycratics` -- these files are quite different for each dictionary. For example, the abbreviation expansions would be such a file (for those dictionaries which have abbreviation markup). This comment pertains only to the `constants` and `templates`. The `idiosyncratics` will be discussed in other issues. ## computed pywork files An example of a computed file would be xxx.xml, the xml version of a dictionary digitization. We do not contemplate inclusion of computed files as part of this csl-pywork repository. Rather, full initialization (or updating) of an individual pywork directory will be done in two steps: * transferring files from this csl-pywork to the individual pywork directory -- a 'generate' program in csl-pywork will do this step * computing additional files within the individual pywork directory. For example, a redo_hw.sh script in the individual pywork directory will be run to compute xxxhw.txt.
non_priority
templates and constants this comment begins my review and extension of the initial classification work for the modules of pywork the idea of csl pywork is similar to that of csl websanlexicon the repository should contain programs and data files required to regenerate the pywork directories for the individual dictionaries thus the individual pywork directories can be managed in the central location of csl pywork this particular work is being done in a directory which currently is not part of the repository it resides only in the cologne server when the dust settles it is anticipated that will be added to the repository the files managed by csl pywork are classified as either constants files that are identical for each dictionary templates files that are different for each dictionary but whose differences can easily be captured by a few parameters in a template file when the values of the template parameters are substituted into the template the resulting rendered template is what is needed for the particular dictionary s pywork directory idiosycratics these files are quite different for each dictionary for example the abbreviation expansions would be such a file for those dictionaries which have abbreviation markup this comment pertains only to the constants and templates the idiosyncratics will be discussed in other issues computed pywork files an example of a computed file would be xxx xml the xml version of a dictionary digitization we do not contemplate inclusion of computed files as part of this csl pywork repository rather full initialization or updating of an individual pywork directory will be done in two steps transferring files from this csl pywork to the individual pywork directory a generate program in csl pywork will do this step computing additional files within the individual pywork directory for example a redo hw sh script in the individual pywork directory will be run to compute xxxhw txt
0
28,989
23,648,658,962
IssuesEvent
2022-08-26 02:54:28
dotnet/project-system
https://api.github.com/repos/dotnet/project-system
closed
Consolidate build pipeline orgs and use consistent pipeline naming
Area-Infrastructure Triage-Approved
Relates to: https://github.com/dotnet/project-system/issues/7915 This issue extends beyond this repo, but to all the repos our team owns. We own these repos: - https://github.com/dotnet/project-system - https://github.com/dotnet/project-system-tools - https://github.com/dotnet/NuGet.BuildTasks - https://github.com/dotnet/ProjFileTools We currently use 2 different DevOps orgs (1 project within each org). They are: - https://dev.azure.com/devdiv/DevDiv - Org: `devdiv` - Project: `DevDiv` - https://dev.azure.com/dnceng/public - Org: `dnceng` - Project: `public` The specific reason for this is they have different access settings: [private vs public](https://docs.microsoft.com/en-us/azure/devops/organizations/projects/about-projects#private-and-public-projects). The `DevDiv` project is **private** (aka *Enterprise*) and the `public` project is **public**. For our GitHub pull-request pipelines, we require a **public** project. For our build (signing, packaging, etc.), we require a **private** project. As it currently stands, every project in the `devdiv` org is **private**. However, in the `dnceng` org, contains both a **public** (`public`) and **private** (`internal`) project. From my understanding, our Microsoft org, **.NET**, would be billed to the `dnceng` (DotNet Engineering) DevOps org. Technically speaking, the only thing that is required to be in the `devdiv` org is our insertion PRs to Visual Studio since the VS repo exists within that org. One restriction to that is the amount of *variable groups* we rely on in our pipelines to make them function. Since we create VS components, we rely on their variables. However, there might be similar variables in the `dnceng` org. This issue would be to investigate if it is possible to consolidate the pipelines into the same org or if that is even worthwhile. Right now, the downside of using 2 orgs is: - Different variable groups (for secrets primarily) - Different pipeline images/image pools - (Potentially) using resources that we aren't billed for - Confusion when investigating infrastructure issues or documenting infrastructure - Different naming and folder conventions for pipelines This issue would also see consistent naming of pipelines. Here are the current names (and folders) of pipelines, separated by pipeline type and repo: - GitHub PR build pipeline - `project-system`: dotnet\project-system: [**unit-tests**](https://dev.azure.com/dnceng/public/_build?definitionId=406) - `project-system-tools`: dotnet\project-system-tools: [**build**](https://dev.azure.com/dnceng/public/_build?definitionId=446) - `NuGet.BuildTasks`: dotnet\NuGet.BuildTasks: [**dotnet.NuGet.BuildTasks-CI**](https://dev.azure.com/dnceng/public/_build?definitionId=567) - `ProjFileTools`: *None* - GitHub PR RichNav pipeline - `project-system`: dotnet\project-system: [**project-system-richnav**](https://dev.azure.com/dnceng/public/_build?definitionId=910) - `project-system-tools`: *None* - `NuGet.BuildTasks`: *None* - `ProjFileTools`: *None* - Localization pipeline (after PR merge) - `project-system`: dotnet\project-system: [**one-loc-build**](https://dev.azure.com/dnceng/public/_build?definitionId=981) - `project-system-tools`: *None* - `NuGet.BuildTasks`: *None* - `ProjFileTools`: *None* - Signed build/packaging pipeline (after PR merge) - `project-system`: DotNet\project-system: [**DotNet-Project-System**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=9675) - `project-system-tools`: DotNet\project-system-tools: [**project-system-tools**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=7294) - `NuGet.BuildTasks`: *No Folder*: [**dotnet.NuGet.BuildTasks**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=11797) - `ProjFileTools`: *None* - Compliance pipeline (after PR merge) - `project-system`: DotNet\project-system: [**DotNet-Project-System-Compliance**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=15013) - `project-system-tools`: *None* - `NuGet.BuildTasks`: *No Folder*: [**DotNet.NuGet.BuildTasks-Compliance**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=15125) - `ProjFileTools`: *None* - VS Insertion release pipeline - `project-system`: Managed Languages\Project System: [**Project System Insertion (main -> main)**](https://dev.azure.com/devdiv/DevDiv/_release?view=all&_a=releases&definitionId=1242) - `project-system-tools`: *None* - `NuGet.BuildTasks`: Managed Languages: [**Nuget.BuildTasks**](https://dev.azure.com/devdiv/DevDiv/_release?view=all&_a=releases&definitionId=1937) - `ProjFileTools`: *None* - *Additional pipelines* - `project-system`: dotnet\project-system: [**integration-tests**](https://dev.azure.com/dnceng/public/_build?definitionId=417) (standard pipeline) - `project-system`: Managed Languages\Project System: [**Project System - OptProf**](https://dev.azure.com/devdiv/DevDiv/_release?view=all&_a=releases&definitionId=3197) (release pipeline) - There are also multiple variants of the *Project System Insertion* release pipeline targeting different branches and a validation release pipeline
1.0
Consolidate build pipeline orgs and use consistent pipeline naming - Relates to: https://github.com/dotnet/project-system/issues/7915 This issue extends beyond this repo, but to all the repos our team owns. We own these repos: - https://github.com/dotnet/project-system - https://github.com/dotnet/project-system-tools - https://github.com/dotnet/NuGet.BuildTasks - https://github.com/dotnet/ProjFileTools We currently use 2 different DevOps orgs (1 project within each org). They are: - https://dev.azure.com/devdiv/DevDiv - Org: `devdiv` - Project: `DevDiv` - https://dev.azure.com/dnceng/public - Org: `dnceng` - Project: `public` The specific reason for this is they have different access settings: [private vs public](https://docs.microsoft.com/en-us/azure/devops/organizations/projects/about-projects#private-and-public-projects). The `DevDiv` project is **private** (aka *Enterprise*) and the `public` project is **public**. For our GitHub pull-request pipelines, we require a **public** project. For our build (signing, packaging, etc.), we require a **private** project. As it currently stands, every project in the `devdiv` org is **private**. However, in the `dnceng` org, contains both a **public** (`public`) and **private** (`internal`) project. From my understanding, our Microsoft org, **.NET**, would be billed to the `dnceng` (DotNet Engineering) DevOps org. Technically speaking, the only thing that is required to be in the `devdiv` org is our insertion PRs to Visual Studio since the VS repo exists within that org. One restriction to that is the amount of *variable groups* we rely on in our pipelines to make them function. Since we create VS components, we rely on their variables. However, there might be similar variables in the `dnceng` org. This issue would be to investigate if it is possible to consolidate the pipelines into the same org or if that is even worthwhile. Right now, the downside of using 2 orgs is: - Different variable groups (for secrets primarily) - Different pipeline images/image pools - (Potentially) using resources that we aren't billed for - Confusion when investigating infrastructure issues or documenting infrastructure - Different naming and folder conventions for pipelines This issue would also see consistent naming of pipelines. Here are the current names (and folders) of pipelines, separated by pipeline type and repo: - GitHub PR build pipeline - `project-system`: dotnet\project-system: [**unit-tests**](https://dev.azure.com/dnceng/public/_build?definitionId=406) - `project-system-tools`: dotnet\project-system-tools: [**build**](https://dev.azure.com/dnceng/public/_build?definitionId=446) - `NuGet.BuildTasks`: dotnet\NuGet.BuildTasks: [**dotnet.NuGet.BuildTasks-CI**](https://dev.azure.com/dnceng/public/_build?definitionId=567) - `ProjFileTools`: *None* - GitHub PR RichNav pipeline - `project-system`: dotnet\project-system: [**project-system-richnav**](https://dev.azure.com/dnceng/public/_build?definitionId=910) - `project-system-tools`: *None* - `NuGet.BuildTasks`: *None* - `ProjFileTools`: *None* - Localization pipeline (after PR merge) - `project-system`: dotnet\project-system: [**one-loc-build**](https://dev.azure.com/dnceng/public/_build?definitionId=981) - `project-system-tools`: *None* - `NuGet.BuildTasks`: *None* - `ProjFileTools`: *None* - Signed build/packaging pipeline (after PR merge) - `project-system`: DotNet\project-system: [**DotNet-Project-System**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=9675) - `project-system-tools`: DotNet\project-system-tools: [**project-system-tools**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=7294) - `NuGet.BuildTasks`: *No Folder*: [**dotnet.NuGet.BuildTasks**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=11797) - `ProjFileTools`: *None* - Compliance pipeline (after PR merge) - `project-system`: DotNet\project-system: [**DotNet-Project-System-Compliance**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=15013) - `project-system-tools`: *None* - `NuGet.BuildTasks`: *No Folder*: [**DotNet.NuGet.BuildTasks-Compliance**](https://dev.azure.com/devdiv/DevDiv/_build?definitionId=15125) - `ProjFileTools`: *None* - VS Insertion release pipeline - `project-system`: Managed Languages\Project System: [**Project System Insertion (main -> main)**](https://dev.azure.com/devdiv/DevDiv/_release?view=all&_a=releases&definitionId=1242) - `project-system-tools`: *None* - `NuGet.BuildTasks`: Managed Languages: [**Nuget.BuildTasks**](https://dev.azure.com/devdiv/DevDiv/_release?view=all&_a=releases&definitionId=1937) - `ProjFileTools`: *None* - *Additional pipelines* - `project-system`: dotnet\project-system: [**integration-tests**](https://dev.azure.com/dnceng/public/_build?definitionId=417) (standard pipeline) - `project-system`: Managed Languages\Project System: [**Project System - OptProf**](https://dev.azure.com/devdiv/DevDiv/_release?view=all&_a=releases&definitionId=3197) (release pipeline) - There are also multiple variants of the *Project System Insertion* release pipeline targeting different branches and a validation release pipeline
non_priority
consolidate build pipeline orgs and use consistent pipeline naming relates to this issue extends beyond this repo but to all the repos our team owns we own these repos we currently use different devops orgs project within each org they are org devdiv project devdiv org dnceng project public the specific reason for this is they have different access settings the devdiv project is private aka enterprise and the public project is public for our github pull request pipelines we require a public project for our build signing packaging etc we require a private project as it currently stands every project in the devdiv org is private however in the dnceng org contains both a public public and private internal project from my understanding our microsoft org net would be billed to the dnceng dotnet engineering devops org technically speaking the only thing that is required to be in the devdiv org is our insertion prs to visual studio since the vs repo exists within that org one restriction to that is the amount of variable groups we rely on in our pipelines to make them function since we create vs components we rely on their variables however there might be similar variables in the dnceng org this issue would be to investigate if it is possible to consolidate the pipelines into the same org or if that is even worthwhile right now the downside of using orgs is different variable groups for secrets primarily different pipeline images image pools potentially using resources that we aren t billed for confusion when investigating infrastructure issues or documenting infrastructure different naming and folder conventions for pipelines this issue would also see consistent naming of pipelines here are the current names and folders of pipelines separated by pipeline type and repo github pr build pipeline project system dotnet project system project system tools dotnet project system tools nuget buildtasks dotnet nuget buildtasks projfiletools none github pr richnav pipeline project system dotnet project system project system tools none nuget buildtasks none projfiletools none localization pipeline after pr merge project system dotnet project system project system tools none nuget buildtasks none projfiletools none signed build packaging pipeline after pr merge project system dotnet project system project system tools dotnet project system tools nuget buildtasks no folder projfiletools none compliance pipeline after pr merge project system dotnet project system project system tools none nuget buildtasks no folder projfiletools none vs insertion release pipeline project system managed languages project system project system tools none nuget buildtasks managed languages projfiletools none additional pipelines project system dotnet project system standard pipeline project system managed languages project system release pipeline there are also multiple variants of the project system insertion release pipeline targeting different branches and a validation release pipeline
0
63,000
15,394,758,405
IssuesEvent
2021-03-03 18:19:28
awslabs/aws-media-services-application-mapper
https://api.github.com/repos/awslabs/aws-media-services-application-mapper
opened
Build script updates for error handling and rebuilds
build-and-deploy installation
Placeholder issue for changes while testing builds and rebuilds.
1.0
Build script updates for error handling and rebuilds - Placeholder issue for changes while testing builds and rebuilds.
non_priority
build script updates for error handling and rebuilds placeholder issue for changes while testing builds and rebuilds
0
332,072
29,182,487,274
IssuesEvent
2023-05-19 13:01:41
paradigmxyz/reth
https://api.github.com/repos/paradigmxyz/reth
closed
Hive engine: PrevRandao Opcode Transactions failures
C-bug A-consensus C-test
### Describe the bug Tests currently timeout, I think we're not detecting prevrandao (missing check) ### Steps to reproduce ./hive --client reth --sim ethereum/engine --sim.limit "/PrevRandao Opcode Transactions" ### Node logs _No response_ ### Platform(s) _No response_ ### What version/commit are you on? _No response_ ### Code of Conduct - [X] I agree to follow the Code of Conduct
1.0
Hive engine: PrevRandao Opcode Transactions failures - ### Describe the bug Tests currently timeout, I think we're not detecting prevrandao (missing check) ### Steps to reproduce ./hive --client reth --sim ethereum/engine --sim.limit "/PrevRandao Opcode Transactions" ### Node logs _No response_ ### Platform(s) _No response_ ### What version/commit are you on? _No response_ ### Code of Conduct - [X] I agree to follow the Code of Conduct
non_priority
hive engine prevrandao opcode transactions failures describe the bug tests currently timeout i think we re not detecting prevrandao missing check steps to reproduce hive client reth sim ethereum engine sim limit prevrandao opcode transactions node logs no response platform s no response what version commit are you on no response code of conduct i agree to follow the code of conduct
0
73,129
31,878,404,645
IssuesEvent
2023-09-16 04:33:06
Azure/azure-sdk-for-python
https://api.github.com/repos/Azure/azure-sdk-for-python
closed
Support Multiple Ip address in generate_blob_sas function in Azure store SDK
feature-request Storage Service Attention Client customer-reported issue-addressed
**Is your feature request related to a problem? Please describe.** We are trying to generate azure SAS for blobs and wanted to provide ip level restrictions. Currently we can provide wither IP address or range of IP addresses e.g. 121.12.34.15 or 121.12.34.15 - 121.12.34.20 **Describe the solution you'd like** We would like to provide separate multiple different IP addresses like 121.12.34.15 or 121.15.30.255 or 121.2.2.10 Location in code: from azure.storage.common.sharedaccesssignature import ( def generate_blob_sas( account_name, # type: str container_name, # type: str blob_name, # type: str snapshot=None, # type: Optional[str] account_key=None, # type: Optional[str] user_delegation_key=None, # type: Optional[UserDelegationKey] permission=None, # type: Optional[Union[BlobSasPermissions, str]] expiry=None, # type: Optional[Union[datetime, str]] start=None, # type: Optional[Union[datetime, str]] policy_id=None, # type: Optional[str] def generate_blob_sas( account_name, # type: str container_name, # type: str blob_name, # type: str snapshot=None, # type: Optional[str] account_key=None, # type: Optional[str] user_delegation_key=None, # type: Optional[UserDelegationKey] permission=None, # type: Optional[Union[BlobSasPermissions, str]] expiry=None, # type: Optional[Union[datetime, str]] start=None, # type: Optional[Union[datetime, str]] policy_id=None, # type: Optional[str] ip=None, # type: Optional[str] **kwargs # type: Any ): **kwargs # type: Any ):
1.0
Support Multiple Ip address in generate_blob_sas function in Azure store SDK - **Is your feature request related to a problem? Please describe.** We are trying to generate azure SAS for blobs and wanted to provide ip level restrictions. Currently we can provide wither IP address or range of IP addresses e.g. 121.12.34.15 or 121.12.34.15 - 121.12.34.20 **Describe the solution you'd like** We would like to provide separate multiple different IP addresses like 121.12.34.15 or 121.15.30.255 or 121.2.2.10 Location in code: from azure.storage.common.sharedaccesssignature import ( def generate_blob_sas( account_name, # type: str container_name, # type: str blob_name, # type: str snapshot=None, # type: Optional[str] account_key=None, # type: Optional[str] user_delegation_key=None, # type: Optional[UserDelegationKey] permission=None, # type: Optional[Union[BlobSasPermissions, str]] expiry=None, # type: Optional[Union[datetime, str]] start=None, # type: Optional[Union[datetime, str]] policy_id=None, # type: Optional[str] def generate_blob_sas( account_name, # type: str container_name, # type: str blob_name, # type: str snapshot=None, # type: Optional[str] account_key=None, # type: Optional[str] user_delegation_key=None, # type: Optional[UserDelegationKey] permission=None, # type: Optional[Union[BlobSasPermissions, str]] expiry=None, # type: Optional[Union[datetime, str]] start=None, # type: Optional[Union[datetime, str]] policy_id=None, # type: Optional[str] ip=None, # type: Optional[str] **kwargs # type: Any ): **kwargs # type: Any ):
non_priority
support multiple ip address in generate blob sas function in azure store sdk is your feature request related to a problem please describe we are trying to generate azure sas for blobs and wanted to provide ip level restrictions currently we can provide wither ip address or range of ip addresses e g or describe the solution you d like we would like to provide separate multiple different ip addresses like or or location in code from azure storage common sharedaccesssignature import def generate blob sas account name type str container name type str blob name type str snapshot none type optional account key none type optional user delegation key none type optional permission none type optional expiry none type optional start none type optional policy id none type optional def generate blob sas account name type str container name type str blob name type str snapshot none type optional account key none type optional user delegation key none type optional permission none type optional expiry none type optional start none type optional policy id none type optional ip none type optional kwargs type any kwargs type any
0
46,269
9,920,610,373
IssuesEvent
2019-06-30 11:03:50
WarEmu/WarBugs
https://api.github.com/repos/WarEmu/WarBugs
closed
Mobs/NPC disappearing in Mount Gunbad after joining a scenario
Dungeon: Mount Gunbad NPC Sourcecode
NPC/Mobs disappearing in Mount Gunbad when joining a scenario while in the dungeon. In my case I was in Mount Gunbad with a friend of mine, as the group leader and joined a scenario. As I returned, the mobs/npc where gone for me, but not for the friend of mine. It could be reproduced and was not a display bug only, as I could run right through the mobs. Zoning in/out helps.
1.0
Mobs/NPC disappearing in Mount Gunbad after joining a scenario - NPC/Mobs disappearing in Mount Gunbad when joining a scenario while in the dungeon. In my case I was in Mount Gunbad with a friend of mine, as the group leader and joined a scenario. As I returned, the mobs/npc where gone for me, but not for the friend of mine. It could be reproduced and was not a display bug only, as I could run right through the mobs. Zoning in/out helps.
non_priority
mobs npc disappearing in mount gunbad after joining a scenario npc mobs disappearing in mount gunbad when joining a scenario while in the dungeon in my case i was in mount gunbad with a friend of mine as the group leader and joined a scenario as i returned the mobs npc where gone for me but not for the friend of mine it could be reproduced and was not a display bug only as i could run right through the mobs zoning in out helps
0
428,274
29,936,740,817
IssuesEvent
2023-06-22 13:14:03
playmint/ds
https://api.github.com/repos/playmint/ds
closed
Move docs from notion to github
documentation
Everything under these pages should be in the ds repo as markdown files under a top level /docs/ folder https://www.notion.so/playmint/How-To-Docs-f2d8a9d7210847aa9b19e0207e5498bc
1.0
Move docs from notion to github - Everything under these pages should be in the ds repo as markdown files under a top level /docs/ folder https://www.notion.so/playmint/How-To-Docs-f2d8a9d7210847aa9b19e0207e5498bc
non_priority
move docs from notion to github everything under these pages should be in the ds repo as markdown files under a top level docs folder
0
116,244
9,829,170,400
IssuesEvent
2019-06-15 18:12:40
AlternateLife/Bugs
https://api.github.com/repos/AlternateLife/Bugs
closed
Crash am Golfplatz
bug crash duplikat ingame stresstest
**Beschreibe den Fehler** Crash am Golfplatz an der gleichen Stelle, an der Staiy Probleme hat. **Reproduktion des Fehlers** Am Golfplatz das Schild auf dem Grünstreifen umfahren, Crash. **Erwartetes Verhalten** Kein Crash **Screenshots** [Bild](https://s18.directupload.net/images/190615/veeggpys.png) **System** - Betriebssystem: Windows 10 1809 - GTA Version: Socialclub
1.0
Crash am Golfplatz - **Beschreibe den Fehler** Crash am Golfplatz an der gleichen Stelle, an der Staiy Probleme hat. **Reproduktion des Fehlers** Am Golfplatz das Schild auf dem Grünstreifen umfahren, Crash. **Erwartetes Verhalten** Kein Crash **Screenshots** [Bild](https://s18.directupload.net/images/190615/veeggpys.png) **System** - Betriebssystem: Windows 10 1809 - GTA Version: Socialclub
non_priority
crash am golfplatz beschreibe den fehler crash am golfplatz an der gleichen stelle an der staiy probleme hat reproduktion des fehlers am golfplatz das schild auf dem grünstreifen umfahren crash erwartetes verhalten kein crash screenshots system betriebssystem windows gta version socialclub
0
46,609
13,175,426,365
IssuesEvent
2020-08-12 01:35:22
shaundmorris/ddf
https://api.github.com/repos/shaundmorris/ddf
closed
CVE-2014-3604 Medium Severity Vulnerability detected by WhiteSource
security vulnerability wontfix
## CVE-2014-3604 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>not-yet-commons-ssl-0.3.11.jar</b></p></summary> <p>A Java SSL component library</p> <p>path: /root/.m2/repository/ca/juliusdavies/not-yet-commons-ssl/0.3.11/not-yet-commons-ssl-0.3.11.jar,2/repository/ca/juliusdavies/not-yet-commons-ssl/0.3.11/not-yet-commons-ssl-0.3.11.jar</p> <p> Dependency Hierarchy: - :x: **not-yet-commons-ssl-0.3.11.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. <p>Publish Date: 2014-10-25 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3604>CVE-2014-3604</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://xforce.iss.net/xforce/xfdb/97659">http://xforce.iss.net/xforce/xfdb/97659</a></p> <p>Release Date: 2017-12-31</p> <p>Fix Resolution: Apply the patch for this vulnerability, available from the Julius Davies SVN Repository. See References.</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2014-3604 Medium Severity Vulnerability detected by WhiteSource - ## CVE-2014-3604 - Medium Severity Vulnerability <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>not-yet-commons-ssl-0.3.11.jar</b></p></summary> <p>A Java SSL component library</p> <p>path: /root/.m2/repository/ca/juliusdavies/not-yet-commons-ssl/0.3.11/not-yet-commons-ssl-0.3.11.jar,2/repository/ca/juliusdavies/not-yet-commons-ssl/0.3.11/not-yet-commons-ssl-0.3.11.jar</p> <p> Dependency Hierarchy: - :x: **not-yet-commons-ssl-0.3.11.jar** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Certificates.java in Not Yet Commons SSL before 0.3.15 does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. <p>Publish Date: 2014-10-25 <p>URL: <a href=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3604>CVE-2014-3604</a></p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>6.8</b>)</summary> <p> Base Score Metrics not available</p> </p> </details> <p></p> <details><summary><img src='https://www.whitesourcesoftware.com/wp-content/uploads/2018/10/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="http://xforce.iss.net/xforce/xfdb/97659">http://xforce.iss.net/xforce/xfdb/97659</a></p> <p>Release Date: 2017-12-31</p> <p>Fix Resolution: Apply the patch for this vulnerability, available from the Julius Davies SVN Repository. See References.</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium severity vulnerability detected by whitesource cve medium severity vulnerability vulnerable library not yet commons ssl jar a java ssl component library path root repository ca juliusdavies not yet commons ssl not yet commons ssl jar repository ca juliusdavies not yet commons ssl not yet commons ssl jar dependency hierarchy x not yet commons ssl jar vulnerable library vulnerability details certificates java in not yet commons ssl before does not properly verify that the server hostname matches a domain name in the subject s common name cn field of the x certificate which allows man in the middle attackers to spoof ssl servers via an arbitrary valid certificate publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution apply the patch for this vulnerability available from the julius davies svn repository see references step up your open source security game with whitesource
0
10,080
7,084,977,847
IssuesEvent
2018-01-11 09:21:12
gnocchixyz/gnocchi
https://api.github.com/repos/gnocchixyz/gnocchi
closed
parallel_operations doesn't honour the provided value
bug performance
### Which version of Gnocchi are you using master ### How to reproduce your problem set parallel_operations or aggregation_workers_number to any number other than the cpu core count ### What is the result that you get https://github.com/gnocchixyz/gnocchi/blob/2dbb4bcb69ceb23e1d79baed28699da6b596e9f9/gnocchi/utils.py#L305 is always the cpu core count ### What is result that you expected the value i set in conf. it does say the correct value when service is launched and all the option values are printed out in debug. it's just that the value there is not what is eventually used.
True
parallel_operations doesn't honour the provided value - ### Which version of Gnocchi are you using master ### How to reproduce your problem set parallel_operations or aggregation_workers_number to any number other than the cpu core count ### What is the result that you get https://github.com/gnocchixyz/gnocchi/blob/2dbb4bcb69ceb23e1d79baed28699da6b596e9f9/gnocchi/utils.py#L305 is always the cpu core count ### What is result that you expected the value i set in conf. it does say the correct value when service is launched and all the option values are printed out in debug. it's just that the value there is not what is eventually used.
non_priority
parallel operations doesn t honour the provided value which version of gnocchi are you using master how to reproduce your problem set parallel operations or aggregation workers number to any number other than the cpu core count what is the result that you get is always the cpu core count what is result that you expected the value i set in conf it does say the correct value when service is launched and all the option values are printed out in debug it s just that the value there is not what is eventually used
0
32,857
13,939,893,558
IssuesEvent
2020-10-22 17:07:08
microsoft/BotFramework-Composer
https://api.github.com/repos/microsoft/BotFramework-Composer
closed
Error when building newest main branch
Bot Services Type: Bug
<!-- Complete the necessary portions of this template and delete the rest. --> ## Describe the bug ``` Error: no such file or directory, open '....\publishTest\package.json' ``` To fix this error, the `publishTest` folder should be deleted manually. ![image](https://user-images.githubusercontent.com/8528761/96837735-774c0080-1479-11eb-9689-326a0a44f0b0.png) <!-- Give a clear and concise description of what the bug is. --> ## Version <!-- What version of the Composer are you using? Paste the build SHA found on the about page (`/about`). --> ## Browser <!-- What browser are you using? --> - [ ] Electron distribution - [ ] Chrome - [ ] Safari - [ ] Firefox - [ ] Edge ## OS <!-- What operating system are you using? --> - [ ] macOS - [ ] Windows - [ ] Ubuntu ## To Reproduce Steps to reproduce the behavior: 1. Go to '...' 2. Click on '....' 3. Scroll down to '....' 4. See error ## Expected behavior <!-- Give a clear and concise description of what you expected to happen. --> ## Screenshots <!-- If applicable, add screenshots/gif/video to help explain your problem. --> ## Additional context <!-- Add any other context about the problem here. -->
1.0
Error when building newest main branch - <!-- Complete the necessary portions of this template and delete the rest. --> ## Describe the bug ``` Error: no such file or directory, open '....\publishTest\package.json' ``` To fix this error, the `publishTest` folder should be deleted manually. ![image](https://user-images.githubusercontent.com/8528761/96837735-774c0080-1479-11eb-9689-326a0a44f0b0.png) <!-- Give a clear and concise description of what the bug is. --> ## Version <!-- What version of the Composer are you using? Paste the build SHA found on the about page (`/about`). --> ## Browser <!-- What browser are you using? --> - [ ] Electron distribution - [ ] Chrome - [ ] Safari - [ ] Firefox - [ ] Edge ## OS <!-- What operating system are you using? --> - [ ] macOS - [ ] Windows - [ ] Ubuntu ## To Reproduce Steps to reproduce the behavior: 1. Go to '...' 2. Click on '....' 3. Scroll down to '....' 4. See error ## Expected behavior <!-- Give a clear and concise description of what you expected to happen. --> ## Screenshots <!-- If applicable, add screenshots/gif/video to help explain your problem. --> ## Additional context <!-- Add any other context about the problem here. -->
non_priority
error when building newest main branch describe the bug error no such file or directory open publishtest package json to fix this error the publishtest folder should be deleted manually version browser electron distribution chrome safari firefox edge os macos windows ubuntu to reproduce steps to reproduce the behavior go to click on scroll down to see error expected behavior screenshots additional context
0
188,659
15,167,127,352
IssuesEvent
2021-02-12 17:19:36
cpauvert/in-phi-luence
https://api.github.com/repos/cpauvert/in-phi-luence
closed
Fix creation date of data sources
bug documentation
Perhaps with a additional tabs after the details of the influences that indicate the source of the data, how and how recent it is.
1.0
Fix creation date of data sources - Perhaps with a additional tabs after the details of the influences that indicate the source of the data, how and how recent it is.
non_priority
fix creation date of data sources perhaps with a additional tabs after the details of the influences that indicate the source of the data how and how recent it is
0
99,846
16,463,564,766
IssuesEvent
2021-05-22 01:02:47
RG4421/cbp-theme
https://api.github.com/repos/RG4421/cbp-theme
opened
CVE-2021-23386 (High) detected in dns-packet-1.3.1.tgz
security vulnerability
## CVE-2021-23386 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dns-packet-1.3.1.tgz</b></p></summary> <p>An abstract-encoding compliant module for encoding / decoding DNS packets</p> <p>Library home page: <a href="https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz">https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz</a></p> <p>Path to dependency file: cbp-theme/ds-ux-guidelines/package.json</p> <p>Path to vulnerable library: cbp-theme/ds-ux-guidelines/node_modules/dns-packet/package.json</p> <p> Dependency Hierarchy: - gatsby-2.20.10.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - bonjour-3.5.0.tgz - multicast-dns-6.2.3.tgz - :x: **dns-packet-1.3.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names. <p>Publish Date: 2021-05-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386>CVE-2021-23386</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386</a></p> <p>Release Date: 2021-05-20</p> <p>Fix Resolution: dns-packet - 5.2.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"dns-packet","packageVersion":"1.3.1","packageFilePaths":["/ds-ux-guidelines/package.json"],"isTransitiveDependency":true,"dependencyTree":"gatsby:2.20.10;webpack-dev-server:3.10.3;bonjour:3.5.0;multicast-dns:6.2.3;dns-packet:1.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"dns-packet - 5.2.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23386","vulnerabilityDetails":"This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386","cvss3Severity":"high","cvss3Score":"7.7","cvss3Metrics":{"A":"Low","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-23386 (High) detected in dns-packet-1.3.1.tgz - ## CVE-2021-23386 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>dns-packet-1.3.1.tgz</b></p></summary> <p>An abstract-encoding compliant module for encoding / decoding DNS packets</p> <p>Library home page: <a href="https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz">https://registry.npmjs.org/dns-packet/-/dns-packet-1.3.1.tgz</a></p> <p>Path to dependency file: cbp-theme/ds-ux-guidelines/package.json</p> <p>Path to vulnerable library: cbp-theme/ds-ux-guidelines/node_modules/dns-packet/package.json</p> <p> Dependency Hierarchy: - gatsby-2.20.10.tgz (Root Library) - webpack-dev-server-3.10.3.tgz - bonjour-3.5.0.tgz - multicast-dns-6.2.3.tgz - :x: **dns-packet-1.3.1.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names. <p>Publish Date: 2021-05-20 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386>CVE-2021-23386</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: Low </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-23386</a></p> <p>Release Date: 2021-05-20</p> <p>Fix Resolution: dns-packet - 5.2.2</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"dns-packet","packageVersion":"1.3.1","packageFilePaths":["/ds-ux-guidelines/package.json"],"isTransitiveDependency":true,"dependencyTree":"gatsby:2.20.10;webpack-dev-server:3.10.3;bonjour:3.5.0;multicast-dns:6.2.3;dns-packet:1.3.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"dns-packet - 5.2.2"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2021-23386","vulnerabilityDetails":"This affects the package dns-packet before 5.2.2. It creates buffers with allocUnsafe and does not always fill them before forming network packets. This can expose internal application memory over unencrypted network when querying crafted invalid domain names.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-23386","cvss3Severity":"high","cvss3Score":"7.7","cvss3Metrics":{"A":"Low","AC":"High","PR":"Low","S":"Changed","C":"High","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in dns packet tgz cve high severity vulnerability vulnerable library dns packet tgz an abstract encoding compliant module for encoding decoding dns packets library home page a href path to dependency file cbp theme ds ux guidelines package json path to vulnerable library cbp theme ds ux guidelines node modules dns packet package json dependency hierarchy gatsby tgz root library webpack dev server tgz bonjour tgz multicast dns tgz x dns packet tgz vulnerable library found in base branch master vulnerability details this affects the package dns packet before it creates buffers with allocunsafe and does not always fill them before forming network packets this can expose internal application memory over unencrypted network when querying crafted invalid domain names publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution dns packet isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree gatsby webpack dev server bonjour multicast dns dns packet isminimumfixversionavailable true minimumfixversion dns packet basebranches vulnerabilityidentifier cve vulnerabilitydetails this affects the package dns packet before it creates buffers with allocunsafe and does not always fill them before forming network packets this can expose internal application memory over unencrypted network when querying crafted invalid domain names vulnerabilityurl
0
201,201
22,946,829,482
IssuesEvent
2022-07-19 01:25:26
Chiencc/Spring5-Login_Prioritize-Sample
https://api.github.com/repos/Chiencc/Spring5-Login_Prioritize-Sample
closed
CVE-2020-5404 (Medium) detected in reactor-netty-0.7.8.RELEASE.jar - autoclosed
security vulnerability
## CVE-2020-5404 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reactor-netty-0.7.8.RELEASE.jar</b></p></summary> <p>Reactive Streams Netty driver</p> <p>Library home page: <a href="https://github.com/reactor/reactor-netty">https://github.com/reactor/reactor-netty</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /reactor/ipc/reactor-netty/0.7.8.RELEASE/reactor-netty-0.7.8.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **reactor-netty-0.7.8.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Chiencc/Spring5-Login_Prioritize-Sample/commit/0c3ecc11668698a0cc14027974dc1381483dcfa8">0c3ecc11668698a0cc14027974dc1381483dcfa8</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects. <p>Publish Date: 2020-03-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5404>CVE-2020-5404</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://pivotal.io/security/cve-2020-5404">https://pivotal.io/security/cve-2020-5404</a></p> <p>Release Date: 2020-03-03</p> <p>Fix Resolution: io.projectreactor.netty:reactor-netty:0.8.16.RELEASE,0.9.5.RELEASE</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2020-5404 (Medium) detected in reactor-netty-0.7.8.RELEASE.jar - autoclosed - ## CVE-2020-5404 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>reactor-netty-0.7.8.RELEASE.jar</b></p></summary> <p>Reactive Streams Netty driver</p> <p>Library home page: <a href="https://github.com/reactor/reactor-netty">https://github.com/reactor/reactor-netty</a></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /reactor/ipc/reactor-netty/0.7.8.RELEASE/reactor-netty-0.7.8.RELEASE.jar</p> <p> Dependency Hierarchy: - :x: **reactor-netty-0.7.8.RELEASE.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Chiencc/Spring5-Login_Prioritize-Sample/commit/0c3ecc11668698a0cc14027974dc1381483dcfa8">0c3ecc11668698a0cc14027974dc1381483dcfa8</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects. <p>Publish Date: 2020-03-03 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-5404>CVE-2020-5404</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://pivotal.io/security/cve-2020-5404">https://pivotal.io/security/cve-2020-5404</a></p> <p>Release Date: 2020-03-03</p> <p>Fix Resolution: io.projectreactor.netty:reactor-netty:0.8.16.RELEASE,0.9.5.RELEASE</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in reactor netty release jar autoclosed cve medium severity vulnerability vulnerable library reactor netty release jar reactive streams netty driver library home page a href path to dependency file pom xml path to vulnerable library reactor ipc reactor netty release reactor netty release jar dependency hierarchy x reactor netty release jar vulnerable library found in head commit a href found in base branch master vulnerability details the httpclient from reactor netty versions x prior to and versions x prior to may be used incorrectly leading to a credentials leak during a redirect to a different domain in order for this to happen the httpclient must have been explicitly configured to follow redirects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution io projectreactor netty reactor netty release release step up your open source security game with whitesource
0
172,933
27,356,144,768
IssuesEvent
2023-02-27 13:00:41
dotnet/project-system
https://api.github.com/repos/dotnet/project-system
closed
Unsupported MyApplication Properties removed from Application.Designer.VB
Feature-Legacy-Application-Designer Triage-Investigate Area-VisualBasic
**Visual Studio Version**: Version 16.8.0 Preview 3.2 **Summary**: There are properties in MyApplication like MinimumSplashScreenDisplayTime that the VS UI does not (yet) support that need to be set manually in Application.Designer.VB, this was also true in Framework. **Steps to Reproduce**: 1. Add Me.MinimumSplashScreenDisplayTime = 5000 to Sub New in Application.Designer.VB 2. Update something (for example IsSingleInstance) in VS UI 3. Rebuild **Expected Behavior**: The line Me.MinimumSplashScreenDisplayTime = 5000 is not modified **Actual Behavior**: The line Me.MinimumSplashScreenDisplayTime = 5000 is deleted **User Impact**: Application works differently under .Net then it did under Framework. MinimumSplashScreenDisplayTime was not supported in Framework UI but VS just left it alone. There are a few other properties that might me an issue for someone but this is the only one that I have seen frequently used.
1.0
Unsupported MyApplication Properties removed from Application.Designer.VB - **Visual Studio Version**: Version 16.8.0 Preview 3.2 **Summary**: There are properties in MyApplication like MinimumSplashScreenDisplayTime that the VS UI does not (yet) support that need to be set manually in Application.Designer.VB, this was also true in Framework. **Steps to Reproduce**: 1. Add Me.MinimumSplashScreenDisplayTime = 5000 to Sub New in Application.Designer.VB 2. Update something (for example IsSingleInstance) in VS UI 3. Rebuild **Expected Behavior**: The line Me.MinimumSplashScreenDisplayTime = 5000 is not modified **Actual Behavior**: The line Me.MinimumSplashScreenDisplayTime = 5000 is deleted **User Impact**: Application works differently under .Net then it did under Framework. MinimumSplashScreenDisplayTime was not supported in Framework UI but VS just left it alone. There are a few other properties that might me an issue for someone but this is the only one that I have seen frequently used.
non_priority
unsupported myapplication properties removed from application designer vb visual studio version version preview summary there are properties in myapplication like minimumsplashscreendisplaytime that the vs ui does not yet support that need to be set manually in application designer vb this was also true in framework steps to reproduce add me minimumsplashscreendisplaytime to sub new in application designer vb update something for example issingleinstance in vs ui rebuild expected behavior the line me minimumsplashscreendisplaytime is not modified actual behavior the line me minimumsplashscreendisplaytime is deleted user impact application works differently under net then it did under framework minimumsplashscreendisplaytime was not supported in framework ui but vs just left it alone there are a few other properties that might me an issue for someone but this is the only one that i have seen frequently used
0
74,002
9,743,326,422
IssuesEvent
2019-06-03 01:01:52
kubernetes/test-infra
https://api.github.com/repos/kubernetes/test-infra
reopened
Update OWNERS documentation to reflect its new home (prow)
area/prow help wanted kind/documentation lifecycle/rotten ¯\_(ツ)_/¯
The [appovers README](https://github.com/kubernetes/test-infra/blob/31a2e95173bd87d91e011d0edfd844b869fa89e7/prow/plugins/approve/approvers/README.md) has a bunch of mungegithub-related points that need to be converted to prow-related once the related mungers referred inside the doc are moved into prow plugins. /assign @cjwagner /area prow /kind documentation
1.0
Update OWNERS documentation to reflect its new home (prow) - The [appovers README](https://github.com/kubernetes/test-infra/blob/31a2e95173bd87d91e011d0edfd844b869fa89e7/prow/plugins/approve/approvers/README.md) has a bunch of mungegithub-related points that need to be converted to prow-related once the related mungers referred inside the doc are moved into prow plugins. /assign @cjwagner /area prow /kind documentation
non_priority
update owners documentation to reflect its new home prow the has a bunch of mungegithub related points that need to be converted to prow related once the related mungers referred inside the doc are moved into prow plugins assign cjwagner area prow kind documentation
0
376,250
26,191,626,423
IssuesEvent
2023-01-03 09:36:14
pymeasure/pymeasure
https://api.github.com/repos/pymeasure/pymeasure
closed
Migrating Prologix / AR488 from 0.10. to 0.11. VI_ERROR_RSRC_NFOUND
documentation diagnosed regression
Hi, I'm having an issue after updating to 0.11, I understand that the implementation of the PrologixAdapter has changed, previously I was creating an adapter with this code: `adapter = PrologixAdapter(port='/dev/cu.usbserial-AC008NYI',baudrate=115200,serial_timeout=1)` now this doesn't work anymore and as far as I understand from the tutorial it should be updated to: `adapter = PrologixAdapter('/dev/cu.usbserial-AC008NYI')` This doesn't work and cannot find a solution, this is the error that I get: `--------------------------------------------------------------------------- VisaIOError Traceback (most recent call last) /var/folders/s_/k_qsdmpn09ng7xgzq1lrkjbm0000gn/T/ipykernel_13441/652802221.py in <module> 6 import math 7 import time ----> 8 adapter = PrologixAdapter('/dev/cu.usbserial-AC008NYI') 9 #adapter = PrologixAdapter(port='/dev/cu.usbserial-AC008NYI',baudrate=115200,serial_timeout=1) 10 sourcemeter = Keithley2000(adapter.gpib(16)) ~/opt/anaconda3/lib/python3.9/site-packages/pymeasure/adapters/prologix.py in __init__(self, resource_name, address, rw_delay, serial_timeout, preprocess_reply, **kwargs) 82 warn("Use 'timeout' in ms instead", FutureWarning) 83 kwargs['timeout'] = serial_timeout ---> 84 super().__init__(resource_name, 85 asrl={ 86 'timeout': 500, ~/opt/anaconda3/lib/python3.9/site-packages/pymeasure/adapters/visa.py in __init__(self, resource_name, visa_library, preprocess_reply, query_delay, log, **kwargs) 106 107 # Clean up kwargs considering the interface type matching resource_name --> 108 if_type = self.manager.resource_info(self.resource_name).interface_type 109 for key in list(kwargs.keys()): # iterate over a copy of the keys as we modify kwargs 110 # Remove all interface-specific kwargs: ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/highlevel.py in resource_info(self, resource_name, extended) 3172 3173 if extended: -> 3174 ret, err = self.visalib.parse_resource_extended(self.session, resource_name) 3175 else: 3176 ret, err = self.visalib.parse_resource(self.session, resource_name) ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/ctwrapper/functions.py in parse_resource_extended(library, session, resource_name) 2075 # [ViSession, ViRsrc, ViPUInt16, ViPUInt16, ViAChar, ViAChar, ViAChar] 2076 # ViRsrc converts from (str, unicode, bytes) to bytes -> 2077 ret = library.viParseRsrcEx( 2078 session, 2079 resource_name, ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/ctwrapper/highlevel.py in _return_handler(self, ret_value, func, arguments) 224 session = None 225 --> 226 return self.handle_return_value(session, ret_value) # type: ignore 227 228 def list_resources( ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/highlevel.py in handle_return_value(self, session, status_code) 249 250 if rv < 0: --> 251 raise errors.VisaIOError(rv) 252 253 if rv in self.issue_warning_on: VisaIOError: VI_ERROR_RSRC_NFOUND (-1073807343): Insufficient location information or the requested device or resource is not present in the system.` Thanks for the help!
1.0
Migrating Prologix / AR488 from 0.10. to 0.11. VI_ERROR_RSRC_NFOUND - Hi, I'm having an issue after updating to 0.11, I understand that the implementation of the PrologixAdapter has changed, previously I was creating an adapter with this code: `adapter = PrologixAdapter(port='/dev/cu.usbserial-AC008NYI',baudrate=115200,serial_timeout=1)` now this doesn't work anymore and as far as I understand from the tutorial it should be updated to: `adapter = PrologixAdapter('/dev/cu.usbserial-AC008NYI')` This doesn't work and cannot find a solution, this is the error that I get: `--------------------------------------------------------------------------- VisaIOError Traceback (most recent call last) /var/folders/s_/k_qsdmpn09ng7xgzq1lrkjbm0000gn/T/ipykernel_13441/652802221.py in <module> 6 import math 7 import time ----> 8 adapter = PrologixAdapter('/dev/cu.usbserial-AC008NYI') 9 #adapter = PrologixAdapter(port='/dev/cu.usbserial-AC008NYI',baudrate=115200,serial_timeout=1) 10 sourcemeter = Keithley2000(adapter.gpib(16)) ~/opt/anaconda3/lib/python3.9/site-packages/pymeasure/adapters/prologix.py in __init__(self, resource_name, address, rw_delay, serial_timeout, preprocess_reply, **kwargs) 82 warn("Use 'timeout' in ms instead", FutureWarning) 83 kwargs['timeout'] = serial_timeout ---> 84 super().__init__(resource_name, 85 asrl={ 86 'timeout': 500, ~/opt/anaconda3/lib/python3.9/site-packages/pymeasure/adapters/visa.py in __init__(self, resource_name, visa_library, preprocess_reply, query_delay, log, **kwargs) 106 107 # Clean up kwargs considering the interface type matching resource_name --> 108 if_type = self.manager.resource_info(self.resource_name).interface_type 109 for key in list(kwargs.keys()): # iterate over a copy of the keys as we modify kwargs 110 # Remove all interface-specific kwargs: ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/highlevel.py in resource_info(self, resource_name, extended) 3172 3173 if extended: -> 3174 ret, err = self.visalib.parse_resource_extended(self.session, resource_name) 3175 else: 3176 ret, err = self.visalib.parse_resource(self.session, resource_name) ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/ctwrapper/functions.py in parse_resource_extended(library, session, resource_name) 2075 # [ViSession, ViRsrc, ViPUInt16, ViPUInt16, ViAChar, ViAChar, ViAChar] 2076 # ViRsrc converts from (str, unicode, bytes) to bytes -> 2077 ret = library.viParseRsrcEx( 2078 session, 2079 resource_name, ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/ctwrapper/highlevel.py in _return_handler(self, ret_value, func, arguments) 224 session = None 225 --> 226 return self.handle_return_value(session, ret_value) # type: ignore 227 228 def list_resources( ~/opt/anaconda3/lib/python3.9/site-packages/pyvisa/highlevel.py in handle_return_value(self, session, status_code) 249 250 if rv < 0: --> 251 raise errors.VisaIOError(rv) 252 253 if rv in self.issue_warning_on: VisaIOError: VI_ERROR_RSRC_NFOUND (-1073807343): Insufficient location information or the requested device or resource is not present in the system.` Thanks for the help!
non_priority
migrating prologix from to vi error rsrc nfound hi i m having an issue after updating to i understand that the implementation of the prologixadapter has changed previously i was creating an adapter with this code adapter prologixadapter port dev cu usbserial baudrate serial timeout now this doesn t work anymore and as far as i understand from the tutorial it should be updated to adapter prologixadapter dev cu usbserial this doesn t work and cannot find a solution this is the error that i get visaioerror traceback most recent call last var folders s k t ipykernel py in import math import time adapter prologixadapter dev cu usbserial adapter prologixadapter port dev cu usbserial baudrate serial timeout sourcemeter adapter gpib opt lib site packages pymeasure adapters prologix py in init self resource name address rw delay serial timeout preprocess reply kwargs warn use timeout in ms instead futurewarning kwargs serial timeout super init resource name asrl timeout opt lib site packages pymeasure adapters visa py in init self resource name visa library preprocess reply query delay log kwargs clean up kwargs considering the interface type matching resource name if type self manager resource info self resource name interface type for key in list kwargs keys iterate over a copy of the keys as we modify kwargs remove all interface specific kwargs opt lib site packages pyvisa highlevel py in resource info self resource name extended if extended ret err self visalib parse resource extended self session resource name else ret err self visalib parse resource self session resource name opt lib site packages pyvisa ctwrapper functions py in parse resource extended library session resource name virsrc converts from str unicode bytes to bytes ret library viparsersrcex session resource name opt lib site packages pyvisa ctwrapper highlevel py in return handler self ret value func arguments session none return self handle return value session ret value type ignore def list resources opt lib site packages pyvisa highlevel py in handle return value self session status code if rv raise errors visaioerror rv if rv in self issue warning on visaioerror vi error rsrc nfound insufficient location information or the requested device or resource is not present in the system thanks for the help
0
327,286
28,051,982,769
IssuesEvent
2023-03-29 06:41:23
ALTA-LapakUMKM-Group-2/LapakUMKM-APITesting
https://api.github.com/repos/ALTA-LapakUMKM-Group-2/LapakUMKM-APITesting
closed
[User-A009] POST Auth Change Password With Blank Old Password
Manual Api Testing
**Given** Post auth change with blank old password **When** User fills in the json data by emptying the old password **Then** Send post update data **And** API Should be 400 Bad Request **And** Validate post update data resource json schema
1.0
[User-A009] POST Auth Change Password With Blank Old Password - **Given** Post auth change with blank old password **When** User fills in the json data by emptying the old password **Then** Send post update data **And** API Should be 400 Bad Request **And** Validate post update data resource json schema
non_priority
post auth change password with blank old password given post auth change with blank old password when user fills in the json data by emptying the old password then send post update data and api should be bad request and validate post update data resource json schema
0
423,253
28,502,756,673
IssuesEvent
2023-04-18 18:42:10
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
Existing l10n.yaml file is mandatory or null check assertion is thrown in AppLocalizations.of
severe: crash framework a: internationalization d: api docs documentation has reproducible steps P3 found in release: 3.7 found in release: 3.8
## Steps to Reproduce Following [the documentation](https://docs.flutter.dev/development/accessibility-and-localization/internationalization) to install internationalization and localization **except not adding** the `l10n.yaml` file results in a null check operator exception when localizations are attempted to be used to set a`MaterialApp.title` property. Otherwise sensible defaults allow translations to work in the rest of the app. None of the default properties (`arb-dir, template-arb-file, or output-localization-file`) of the example `l10n.yaml` seem to have anything to do with using a null check operator versus returning a nullable type. 1. Follow [guide here](https://docs.flutter.dev/development/accessibility-and-localization/internationalization#setting-up) to create a new project (`flutter create test`) and add internationalization. 2. Follow [guide here](https://docs.flutter.dev/development/accessibility-and-localization/internationalization#adding-your-own-localized-messages) to add localizations, but do *not* add a `l10n.yaml` file (Step 3). 3. Add `app_en.arb` localization file (Step 4) as described. 4. Run `flutter gen-l10n` 5. Modify `main.dart` as described by the guide. 6. Call `AppLocalizations.of` in MyHomePage, see `main.dart` code file below. 7. Run app and observe application runs with translated text. 8. Call `AppLocalizations.of` in `MaterialApp.title`, see `main.dart` code file below. 9. Run app and observe application hits an exception of "Null check operator used on a null value" in the `of` method of the `AppLocalizations` class: ``` static AppLocalizations of(BuildContext context) { return Localizations.of<AppLocalizations>(context, AppLocalizations)!; } ``` 10. Add the `l10n.yaml` as described in step 3 of the [localizations guide](https://docs.flutter.dev/development/accessibility-and-localization/internationalization#adding-your-own-localized-messages). 11. Run `flutter gen-l10n` 12. Observe that null check operator has disappeared from the `app_localizations.dart` file. ``` static AppLocalizations? of(BuildContext context) { return Localizations.of<AppLocalizations>(context, AppLocalizations); } ``` 13. Run app and observe application runs without an exception. **Expected results:** Without a `l10n.yaml file` the `AppLocalizations` class file generated should still return a nullable type not throw a null check operator exception. Or a **much stronger** warning should be placed in the documented steps that broken behavior might occur without this file. **Actual results:** Application shows red screen with yellow text of "Null check operator used on a null value" Debug window shows: ``` Exception has occurred. _CastError (Null check operator used on a null value) ``` <details> <summary>Code sample</summary> <!-- Please create a minimal reproducible sample that shows the problem and attach it below between the lines with the backticks. To create it you can use `flutter create bug` command and update the `main.dart` file. Alternatively, you can use https://dartpad.dev/ which is capable of creating and running small Flutter apps. Without this we will unlikely be able to progress on the issue, and because of that we regretfully will have to close it. --> ``` import 'package:flutter/material.dart'; import 'package:flutter_localizations/flutter_localizations.dart'; import 'package:flutter_gen/gen_l10n/app_localizations.dart'; void main() { runApp(const MyApp()); } class MyApp extends StatelessWidget { const MyApp({super.key}); @override Widget build(BuildContext context) { return MaterialApp( title: AppLocalizations.of(context)?.helloWorld ?? '', // BREAKS IF l10n.yaml FILE NOT PROVIDED localizationsDelegates: const [ AppLocalizations.delegate, GlobalMaterialLocalizations.delegate, GlobalWidgetsLocalizations.delegate, GlobalCupertinoLocalizations.delegate, ], supportedLocales: const [ Locale('en'), // English Locale('es'), // Spanish ], home: const MyHomePage(), ); } } class MyHomePage extends StatelessWidget { const MyHomePage({super.key}); @override Widget build(BuildContext context) { return Scaffold( appBar: AppBar( title: Text(AppLocalizations.of(context)?.helloWorld.toUpperCase() ?? ''), ), body: Center( child: Text( AppLocalizations.of(context)?.helloWorld.toLowerCase() ?? '')), ); } } ``` </details> <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. If there is a crash, please include the entirety of the crash log including the backtrace. --> ``` [ +21 ms] ══╡ EXCEPTION CAUGHT BY WIDGETS LIBRARY ╞═══════════════════════════════════════════════════════════ The following _CastError was thrown building MyApp(dirty): Null check operator used on a null value The relevant error-causing widget was: MyApp MyApp:file:///C:/Users/*********/Documents/workspace/test-flutter/test/lib/main.dart:6:16 When the exception was thrown, this was the stack: #0 AppLocalizations.of (package:flutter_gen/gen_l10n/app_localizations.dart:67:73) #1 MyApp.build (package:test/main.dart:16:31) #2 StatelessElement.build (package:flutter/src/widgets/framework.dart:5038:49) #3 ComponentElement.performRebuild (package:flutter/src/widgets/framework.dart:4968:15) #4 Element.rebuild (package:flutter/src/widgets/framework.dart:4690:5) #5 ComponentElement._firstBuild (package:flutter/src/widgets/framework.dart:4950:5) #6 ComponentElement.mount (package:flutter/src/widgets/framework.dart:4944:5) #7 Element.inflateWidget (package:flutter/src/widgets/framework.dart:3953:16) #8 Element.updateChild (package:flutter/src/widgets/framework.dart:3682:18) #9 RenderObjectToWidgetElement._rebuild (package:flutter/src/widgets/binding.dart:1176:16) #10 RenderObjectToWidgetElement.mount (package:flutter/src/widgets/binding.dart:1145:5) #11 RenderObjectToWidgetAdapter.attachToRenderTree.<anonymous closure> (package:flutter/src/widgets/binding.dart:1092:18) #12 BuildOwner.buildScope (package:flutter/src/widgets/framework.dart:2682:19) #13 RenderObjectToWidgetAdapter.attachToRenderTree (package:flutter/src/widgets/binding.dart:1091:13) #14 WidgetsBinding.attachRootWidget (package:flutter/src/widgets/binding.dart:926:7) #15 WidgetsBinding.scheduleAttachRootWidget.<anonymous closure> (package:flutter/src/widgets/binding.dart:906:7) #19 _RawReceivePort._handleMessage (dart:isolate-patch/isolate_patch.dart:192:26) (elided 3 frames from class _Timer and dart:async-patch) ════════════════════════════════════════════════════════════════════════════════════════════════════ ``` <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` flutter analyze Analyzing test... warning - The receiver can't be null, so the null-aware operator '?.' is unnecessary - lib\main.dart:16:42 - invalid_null_aware_operator warning - The receiver can't be null, so the null-aware operator '?.' is unnecessary - lib\main.dart:40:46 - invalid_null_aware_operator warning - The receiver can't be null, so the null-aware operator '?.' is unnecessary - lib\main.dart:44:43 - invalid_null_aware_operator 3 issues found. (ran in 1.3s) ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [√] Flutter (Channel stable, 3.7.1, on Microsoft Windows [Version 10.0.22621.1105], locale en-US) • Flutter version 3.7.1 on channel stable at C:\src\flutter • Upstream repository https://github.com/flutter/flutter.git • Framework revision 7048ed95a5 (9 days ago), 2023-02-01 09:07:31 -0800 • Engine revision 800594f1f4 • Dart version 2.19.1 • DevTools version 2.20.1 [√] Windows Version (Installed version of Windows is version 10 or • Windows (desktop) • windows • windows-x64 • Microsoft Windows [Version 10.0.22621.1105] • Chrome (web) • chrome • web-javascript • Google Chrome 109.0.5414.120 • Edge (web) • edge • web-javascript • Microsoft Edge 107.0.1418.62 [√] HTTP Host Availability • All required HTTP hosts are available • No issues found! ``` </details>
1.0
Existing l10n.yaml file is mandatory or null check assertion is thrown in AppLocalizations.of - ## Steps to Reproduce Following [the documentation](https://docs.flutter.dev/development/accessibility-and-localization/internationalization) to install internationalization and localization **except not adding** the `l10n.yaml` file results in a null check operator exception when localizations are attempted to be used to set a`MaterialApp.title` property. Otherwise sensible defaults allow translations to work in the rest of the app. None of the default properties (`arb-dir, template-arb-file, or output-localization-file`) of the example `l10n.yaml` seem to have anything to do with using a null check operator versus returning a nullable type. 1. Follow [guide here](https://docs.flutter.dev/development/accessibility-and-localization/internationalization#setting-up) to create a new project (`flutter create test`) and add internationalization. 2. Follow [guide here](https://docs.flutter.dev/development/accessibility-and-localization/internationalization#adding-your-own-localized-messages) to add localizations, but do *not* add a `l10n.yaml` file (Step 3). 3. Add `app_en.arb` localization file (Step 4) as described. 4. Run `flutter gen-l10n` 5. Modify `main.dart` as described by the guide. 6. Call `AppLocalizations.of` in MyHomePage, see `main.dart` code file below. 7. Run app and observe application runs with translated text. 8. Call `AppLocalizations.of` in `MaterialApp.title`, see `main.dart` code file below. 9. Run app and observe application hits an exception of "Null check operator used on a null value" in the `of` method of the `AppLocalizations` class: ``` static AppLocalizations of(BuildContext context) { return Localizations.of<AppLocalizations>(context, AppLocalizations)!; } ``` 10. Add the `l10n.yaml` as described in step 3 of the [localizations guide](https://docs.flutter.dev/development/accessibility-and-localization/internationalization#adding-your-own-localized-messages). 11. Run `flutter gen-l10n` 12. Observe that null check operator has disappeared from the `app_localizations.dart` file. ``` static AppLocalizations? of(BuildContext context) { return Localizations.of<AppLocalizations>(context, AppLocalizations); } ``` 13. Run app and observe application runs without an exception. **Expected results:** Without a `l10n.yaml file` the `AppLocalizations` class file generated should still return a nullable type not throw a null check operator exception. Or a **much stronger** warning should be placed in the documented steps that broken behavior might occur without this file. **Actual results:** Application shows red screen with yellow text of "Null check operator used on a null value" Debug window shows: ``` Exception has occurred. _CastError (Null check operator used on a null value) ``` <details> <summary>Code sample</summary> <!-- Please create a minimal reproducible sample that shows the problem and attach it below between the lines with the backticks. To create it you can use `flutter create bug` command and update the `main.dart` file. Alternatively, you can use https://dartpad.dev/ which is capable of creating and running small Flutter apps. Without this we will unlikely be able to progress on the issue, and because of that we regretfully will have to close it. --> ``` import 'package:flutter/material.dart'; import 'package:flutter_localizations/flutter_localizations.dart'; import 'package:flutter_gen/gen_l10n/app_localizations.dart'; void main() { runApp(const MyApp()); } class MyApp extends StatelessWidget { const MyApp({super.key}); @override Widget build(BuildContext context) { return MaterialApp( title: AppLocalizations.of(context)?.helloWorld ?? '', // BREAKS IF l10n.yaml FILE NOT PROVIDED localizationsDelegates: const [ AppLocalizations.delegate, GlobalMaterialLocalizations.delegate, GlobalWidgetsLocalizations.delegate, GlobalCupertinoLocalizations.delegate, ], supportedLocales: const [ Locale('en'), // English Locale('es'), // Spanish ], home: const MyHomePage(), ); } } class MyHomePage extends StatelessWidget { const MyHomePage({super.key}); @override Widget build(BuildContext context) { return Scaffold( appBar: AppBar( title: Text(AppLocalizations.of(context)?.helloWorld.toUpperCase() ?? ''), ), body: Center( child: Text( AppLocalizations.of(context)?.helloWorld.toLowerCase() ?? '')), ); } } ``` </details> <details> <summary>Logs</summary> <!-- Run your application with `flutter run --verbose` and attach all the log output below between the lines with the backticks. If there is an exception, please see if the error message includes enough information to explain how to solve the issue. If there is a crash, please include the entirety of the crash log including the backtrace. --> ``` [ +21 ms] ══╡ EXCEPTION CAUGHT BY WIDGETS LIBRARY ╞═══════════════════════════════════════════════════════════ The following _CastError was thrown building MyApp(dirty): Null check operator used on a null value The relevant error-causing widget was: MyApp MyApp:file:///C:/Users/*********/Documents/workspace/test-flutter/test/lib/main.dart:6:16 When the exception was thrown, this was the stack: #0 AppLocalizations.of (package:flutter_gen/gen_l10n/app_localizations.dart:67:73) #1 MyApp.build (package:test/main.dart:16:31) #2 StatelessElement.build (package:flutter/src/widgets/framework.dart:5038:49) #3 ComponentElement.performRebuild (package:flutter/src/widgets/framework.dart:4968:15) #4 Element.rebuild (package:flutter/src/widgets/framework.dart:4690:5) #5 ComponentElement._firstBuild (package:flutter/src/widgets/framework.dart:4950:5) #6 ComponentElement.mount (package:flutter/src/widgets/framework.dart:4944:5) #7 Element.inflateWidget (package:flutter/src/widgets/framework.dart:3953:16) #8 Element.updateChild (package:flutter/src/widgets/framework.dart:3682:18) #9 RenderObjectToWidgetElement._rebuild (package:flutter/src/widgets/binding.dart:1176:16) #10 RenderObjectToWidgetElement.mount (package:flutter/src/widgets/binding.dart:1145:5) #11 RenderObjectToWidgetAdapter.attachToRenderTree.<anonymous closure> (package:flutter/src/widgets/binding.dart:1092:18) #12 BuildOwner.buildScope (package:flutter/src/widgets/framework.dart:2682:19) #13 RenderObjectToWidgetAdapter.attachToRenderTree (package:flutter/src/widgets/binding.dart:1091:13) #14 WidgetsBinding.attachRootWidget (package:flutter/src/widgets/binding.dart:926:7) #15 WidgetsBinding.scheduleAttachRootWidget.<anonymous closure> (package:flutter/src/widgets/binding.dart:906:7) #19 _RawReceivePort._handleMessage (dart:isolate-patch/isolate_patch.dart:192:26) (elided 3 frames from class _Timer and dart:async-patch) ════════════════════════════════════════════════════════════════════════════════════════════════════ ``` <!-- Run `flutter analyze` and attach any output of that command below. If there are any analysis errors, try resolving them before filing this issue. --> ``` flutter analyze Analyzing test... warning - The receiver can't be null, so the null-aware operator '?.' is unnecessary - lib\main.dart:16:42 - invalid_null_aware_operator warning - The receiver can't be null, so the null-aware operator '?.' is unnecessary - lib\main.dart:40:46 - invalid_null_aware_operator warning - The receiver can't be null, so the null-aware operator '?.' is unnecessary - lib\main.dart:44:43 - invalid_null_aware_operator 3 issues found. (ran in 1.3s) ``` <!-- Finally, paste the output of running `flutter doctor -v` here. --> ``` [√] Flutter (Channel stable, 3.7.1, on Microsoft Windows [Version 10.0.22621.1105], locale en-US) • Flutter version 3.7.1 on channel stable at C:\src\flutter • Upstream repository https://github.com/flutter/flutter.git • Framework revision 7048ed95a5 (9 days ago), 2023-02-01 09:07:31 -0800 • Engine revision 800594f1f4 • Dart version 2.19.1 • DevTools version 2.20.1 [√] Windows Version (Installed version of Windows is version 10 or • Windows (desktop) • windows • windows-x64 • Microsoft Windows [Version 10.0.22621.1105] • Chrome (web) • chrome • web-javascript • Google Chrome 109.0.5414.120 • Edge (web) • edge • web-javascript • Microsoft Edge 107.0.1418.62 [√] HTTP Host Availability • All required HTTP hosts are available • No issues found! ``` </details>
non_priority
existing yaml file is mandatory or null check assertion is thrown in applocalizations of steps to reproduce following to install internationalization and localization except not adding the yaml file results in a null check operator exception when localizations are attempted to be used to set a materialapp title property otherwise sensible defaults allow translations to work in the rest of the app none of the default properties arb dir template arb file or output localization file of the example yaml seem to have anything to do with using a null check operator versus returning a nullable type follow to create a new project flutter create test and add internationalization follow to add localizations but do not add a yaml file step add app en arb localization file step as described run flutter gen modify main dart as described by the guide call applocalizations of in myhomepage see main dart code file below run app and observe application runs with translated text call applocalizations of in materialapp title see main dart code file below run app and observe application hits an exception of null check operator used on a null value in the of method of the applocalizations class static applocalizations of buildcontext context return localizations of context applocalizations add the yaml as described in step of the run flutter gen observe that null check operator has disappeared from the app localizations dart file static applocalizations of buildcontext context return localizations of context applocalizations run app and observe application runs without an exception expected results without a yaml file the applocalizations class file generated should still return a nullable type not throw a null check operator exception or a much stronger warning should be placed in the documented steps that broken behavior might occur without this file actual results application shows red screen with yellow text of null check operator used on a null value debug window shows exception has occurred casterror null check operator used on a null value code sample please create a minimal reproducible sample that shows the problem and attach it below between the lines with the backticks to create it you can use flutter create bug command and update the main dart file alternatively you can use which is capable of creating and running small flutter apps without this we will unlikely be able to progress on the issue and because of that we regretfully will have to close it import package flutter material dart import package flutter localizations flutter localizations dart import package flutter gen gen app localizations dart void main runapp const myapp class myapp extends statelesswidget const myapp super key override widget build buildcontext context return materialapp title applocalizations of context helloworld breaks if yaml file not provided localizationsdelegates const applocalizations delegate globalmateriallocalizations delegate globalwidgetslocalizations delegate globalcupertinolocalizations delegate supportedlocales const locale en english locale es spanish home const myhomepage class myhomepage extends statelesswidget const myhomepage super key override widget build buildcontext context return scaffold appbar appbar title text applocalizations of context helloworld touppercase body center child text applocalizations of context helloworld tolowercase logs run your application with flutter run verbose and attach all the log output below between the lines with the backticks if there is an exception please see if the error message includes enough information to explain how to solve the issue if there is a crash please include the entirety of the crash log including the backtrace ══╡ exception caught by widgets library ╞═══════════════════════════════════════════════════════════ the following casterror was thrown building myapp dirty null check operator used on a null value the relevant error causing widget was myapp myapp file c users documents workspace test flutter test lib main dart when the exception was thrown this was the stack applocalizations of package flutter gen gen app localizations dart myapp build package test main dart statelesselement build package flutter src widgets framework dart componentelement performrebuild package flutter src widgets framework dart element rebuild package flutter src widgets framework dart componentelement firstbuild package flutter src widgets framework dart componentelement mount package flutter src widgets framework dart element inflatewidget package flutter src widgets framework dart element updatechild package flutter src widgets framework dart renderobjecttowidgetelement rebuild package flutter src widgets binding dart renderobjecttowidgetelement mount package flutter src widgets binding dart renderobjecttowidgetadapter attachtorendertree package flutter src widgets binding dart buildowner buildscope package flutter src widgets framework dart renderobjecttowidgetadapter attachtorendertree package flutter src widgets binding dart widgetsbinding attachrootwidget package flutter src widgets binding dart widgetsbinding scheduleattachrootwidget package flutter src widgets binding dart rawreceiveport handlemessage dart isolate patch isolate patch dart elided frames from class timer and dart async patch ════════════════════════════════════════════════════════════════════════════════════════════════════ run flutter analyze and attach any output of that command below if there are any analysis errors try resolving them before filing this issue flutter analyze analyzing test warning the receiver can t be null so the null aware operator is unnecessary lib main dart invalid null aware operator warning the receiver can t be null so the null aware operator is unnecessary lib main dart invalid null aware operator warning the receiver can t be null so the null aware operator is unnecessary lib main dart invalid null aware operator issues found ran in flutter channel stable on microsoft windows version locale en us • flutter version on channel stable at c src flutter • upstream repository • framework revision days ago • engine revision • dart version • devtools version windows version installed version of windows is version or • windows desktop • windows • windows • microsoft windows • chrome web • chrome • web javascript • google chrome • edge web • edge • web javascript • microsoft edge http host availability • all required http hosts are available • no issues found
0
182,319
30,830,347,584
IssuesEvent
2023-08-02 00:51:09
elementor/elementor
https://api.github.com/repos/elementor/elementor
closed
✅ 🐞 Bug Report: The Justified option in the Nested Tabs widget does not work as expected if direction is set to left or right
bug status/merged component/design type/layout 🚀 shipped mod* component/nested/tabs
### Prerequisites - [X] I have searched for similar issues in both open and closed tickets and cannot find a duplicate. - [X] The issue still exists against the latest stable version of Elementor. ### Description If the Direction option is left or right in the tabs widget, Justified will not work as expected. Please see the image below. ![n-tabs](https://github.com/elementor/elementor/assets/88034902/7d8148e8-ba1e-4e32-9a0c-11117d4bcd48) As you can see in the image above, Justified works well in the bottom tab widget. But in the top tab widget, the Justified option doesn't work as expected and doesn't fill the empty space. ### Steps to reproduce 1. Add the Tabs widget. 2. Set Direction to right or left. 3. After that, set the Justify option to Justified. It will not work as expected. ### Isolating the problem - [X] This bug happens with only Elementor plugin active (and Elementor Pro). - [X] This bug happens with a Blank WordPress theme active ([Hello theme](https://wordpress.org/themes/hello-elementor/)). - [X] I can reproduce this bug consistently following the steps above. ### System Info <details> <summary>System Info</summary> ````txt == Server Environment == Operating System: WINNT Software: Apache/2.4.38 (Win32) OpenSSL/1.1.1a PHP/7.3.2 MySQL version: mariadb.org binary distribution v5.6.42-84.2 PHP Version: 7.3.2 PHP Memory Limit: 128M PHP Max Input Vars: 1000 PHP Max Post Size: 64M GD Installed: Yes ZIP Installed: Yes Write Permissions: All right Elementor Library: Connected == WordPress Environment == Version: 6.2 Site URL: http://localhost:80/elementor Home URL: http://localhost:80/elementor WP Multisite: No Max Upload Size: 64 MB Memory limit: 40M Max Memory limit: 256M Permalink Structure: /%year%/%monthnum%/%day%/%postname%/ Language: en-US Timezone: Europe/Berlin Admin Email: [REDACTED] Debug Mode: Inactive == Theme == Name: Hello Elementor Version: 2.7.1 Author: Elementor Team Child Theme: No == User == Role: administrator WP Profile lang: en_US User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 == Active Plugins == Elementor Version: 3.13.0 Author: Elementor.com Elementor Pro Version: 3.13.0 Author: Elementor.com == Features == Custom Fonts: 2 Custom Icons: 0 == Integrations == == Elementor Experiments == Optimized DOM Output: Inactive Improved Asset Loading: Inactive Improved CSS Loading: Inactive Inline Font Icons: Inactive Accessibility Improvements: Inactive Additional Custom Breakpoints: Inactive admin_menu_rearrangement: Inactive by default Flexbox Container: Active Upgrade Swiper Library: Inactive Grid Container: Inactive by default Default to New Theme Builder: Inactive Hello Theme Header & Footer: Inactive Editor Top Bar: Active Landing Pages: Inactive Nested Elements: Active Lazy Load Background Images: Inactive Page Transitions: Inactive Notes: Inactive Loop: Active Form Submissions: Active by default Scroll Snap: Inactive Menu: Active == Log == Log: showing 20 of 252023-04-23 12:42:48 [info] elementor::elementor_updater Started 2023-04-23 12:42:48 [info] Elementor/Upgrades - _on_each_version Start 2023-04-23 12:42:48 [info] Elementor/Upgrades - _on_each_version Finished 2023-04-23 12:42:48 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor', 'from' => '3.12.1', 'to' => '3.12.2', )] 2023-04-23 16:55:55 [info] elementor-pro::elementor_pro_updater Started 2023-04-23 16:55:55 [info] Elementor Pro/Upgrades - _on_each_version Start 2023-04-23 16:55:55 [info] Elementor Pro/Upgrades - _on_each_version Finished 2023-04-23 16:55:55 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.2', 'to' => '3.12.3', )] 2023-05-09 02:13:55 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor', 'from' => '3.12.2', 'to' => '3.13.0', )] 2023-05-09 02:13:57 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.3', 'to' => '3.13.0', )] 2023-05-09 02:13:58 [info] elementor::elementor_updater Started 2023-05-09 02:13:58 [info] Elementor/Upgrades - _on_each_version Start 2023-05-09 02:13:58 [info] Elementor/Upgrades - _on_each_version Finished 2023-05-09 02:13:58 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor', 'from' => '3.12.2', 'to' => '3.13.0', )] 2023-05-09 02:13:59 [info] elementor-pro::elementor_pro_updater Started 2023-05-09 02:13:59 [info] Elementor Pro/Upgrades - _on_each_version Start 2023-05-09 02:13:59 [info] Elementor Pro/Upgrades - _on_each_version Finished 2023-05-09 02:13:59 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.3', 'to' => '3.13.0', )] 2023-05-09 02:14:00 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor', 'from' => '3.12.2', 'to' => '3.13.0', )] 2023-05-09 02:14:01 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.3', 'to' => '3.13.0', )] JS: showing 11 of 11JS: 2023-04-12 15:46:39 [error X 2][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/editor.min.js?ver=3.12.1:3:594206] Cannot read properties of null (reading 'id') JS: 2023-04-13 09:19:21 [error X 7][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view1351") has already been destroyed and cannot be used. JS: 2023-04-14 07:42:58 [error X 4][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view1356") has already been destroyed and cannot be used. JS: 2023-04-14 08:57:25 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view4056") has already been destroyed and cannot be used. JS: 2023-04-14 09:26:20 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/editor.min.js?ver=3.12.1:3:410136] Cannot read properties of null (reading 'history') JS: 2023-04-14 09:27:18 [error X 2][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/editor.min.js?ver=3.12.1:3:1081267] Cannot read properties of null (reading 'getBoundingClientRect') JS: 2023-04-14 13:45:59 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view2041") has already been destroyed and cannot be used. JS: 2023-04-14 18:33:15 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view14527") has already been destroyed and cannot be used. JS: 2023-04-15 15:45:29 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view1519") has already been destroyed and cannot be used. JS: 2023-04-16 21:21:24 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view7212") has already been destroyed and cannot be used. JS: 2023-04-22 10:57:41 [error X 6][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/df16c9d56464dd4f0800.bundle.min.js:2:7826] Cannot read properties of null (reading 'dataset') PHP: showing 6 of 6PHP: 2023-04-12 20:25:15 [error X 1][C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\theme-builder\classes\conditions-manager.php::295] Uncaught Error: Call to a member function update_meta() on bool in C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\theme-builder\classes\conditions-manager.php:295 Stack trace: #0 C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\theme-builder\classes\conditions-manager.php(168): ElementorPro\Modules\ThemeBuilder\Classes\Conditions_Manager->save_conditions(NULL, Array) #1 [internal function]: ElementorPro\Modules\ThemeBuilder\Classes\Conditions_Manager->ajax_save_theme_template_conditions(Array, Object(Elementor\Core\Common\Modules\Ajax\Module)) #2 C:\xampp\htdocs\elementor\wp-content\plugins\elementor\core\common\modules\ajax\module.php(175): call_user_func(Array, Array, Object(Elementor\Core\Common\Modules\Ajax\Module)) #3 C:\xampp\htdocs\elementor\wp-includes\class-wp-hook.php(308): Elementor\Core\Common\Modules\Ajax\Module->handle_ajax_request('') #4 C:\xampp\htdocs\elementor\wp-includes\class-wp-hook.php(332): WP_Hook->apply_filters('', Array) #5 C:\xampp\htdocs\elemen [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-04-17 01:49:20 [notice X 8][C:\xampp\htdocs\elementor\wp-content\plugins\elementor\core\common\modules\ajax\module.php::175] Undefined index: data [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-05-02 03:35:48 [notice X 65][C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\woocommerce\module.php::381] Undefined offset: 1 [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-05-05 16:15:36 [notice X 1][C:\xampp\htdocs\elementor\wp-content\plugins\elementor\app\modules\import-export\module.php::695] Trying to get property 'label' of non-object [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-05-05 16:15:51 [notice X 2][C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php::150] Undefined index: condition_type [array ( 'trace' => ' #0: C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php(150): Elementor\Core\Logger\Manager -> rest_error_handler() #1: ElementorPro\Core\App\Modules\SiteEditor\Data\Endpoints\Templates -> normalize_template_json_item() #2: C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php(120): class type array_map() #3: C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php(59): ElementorPro\Core\App\Modules\SiteEditor\Data\Endpoints\Templates -> normalize_templates_json() #4: C:\xampp\htdocs\elementor\wp-content\plugins\elementor\data\base\endpoint.php(158): ElementorPro\Core\App\Modules\SiteEditor\Data\Endpoints\Templates -> get_items() ', )] PHP: 2023-05-09 16:28:31 [error X 4][C:\xampp\htdocs\elementor\wp-content\plugins\elementor\data\v2\manager.php::8] Maximum execution time of 30 seconds exceeded [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] == Elementor - Compatibility Tag == Elementor Pro: Compatible == Elementor Pro - Compatibility Tag == ```` </details>
1.0
✅ 🐞 Bug Report: The Justified option in the Nested Tabs widget does not work as expected if direction is set to left or right - ### Prerequisites - [X] I have searched for similar issues in both open and closed tickets and cannot find a duplicate. - [X] The issue still exists against the latest stable version of Elementor. ### Description If the Direction option is left or right in the tabs widget, Justified will not work as expected. Please see the image below. ![n-tabs](https://github.com/elementor/elementor/assets/88034902/7d8148e8-ba1e-4e32-9a0c-11117d4bcd48) As you can see in the image above, Justified works well in the bottom tab widget. But in the top tab widget, the Justified option doesn't work as expected and doesn't fill the empty space. ### Steps to reproduce 1. Add the Tabs widget. 2. Set Direction to right or left. 3. After that, set the Justify option to Justified. It will not work as expected. ### Isolating the problem - [X] This bug happens with only Elementor plugin active (and Elementor Pro). - [X] This bug happens with a Blank WordPress theme active ([Hello theme](https://wordpress.org/themes/hello-elementor/)). - [X] I can reproduce this bug consistently following the steps above. ### System Info <details> <summary>System Info</summary> ````txt == Server Environment == Operating System: WINNT Software: Apache/2.4.38 (Win32) OpenSSL/1.1.1a PHP/7.3.2 MySQL version: mariadb.org binary distribution v5.6.42-84.2 PHP Version: 7.3.2 PHP Memory Limit: 128M PHP Max Input Vars: 1000 PHP Max Post Size: 64M GD Installed: Yes ZIP Installed: Yes Write Permissions: All right Elementor Library: Connected == WordPress Environment == Version: 6.2 Site URL: http://localhost:80/elementor Home URL: http://localhost:80/elementor WP Multisite: No Max Upload Size: 64 MB Memory limit: 40M Max Memory limit: 256M Permalink Structure: /%year%/%monthnum%/%day%/%postname%/ Language: en-US Timezone: Europe/Berlin Admin Email: [REDACTED] Debug Mode: Inactive == Theme == Name: Hello Elementor Version: 2.7.1 Author: Elementor Team Child Theme: No == User == Role: administrator WP Profile lang: en_US User Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.0.0 Safari/537.36 == Active Plugins == Elementor Version: 3.13.0 Author: Elementor.com Elementor Pro Version: 3.13.0 Author: Elementor.com == Features == Custom Fonts: 2 Custom Icons: 0 == Integrations == == Elementor Experiments == Optimized DOM Output: Inactive Improved Asset Loading: Inactive Improved CSS Loading: Inactive Inline Font Icons: Inactive Accessibility Improvements: Inactive Additional Custom Breakpoints: Inactive admin_menu_rearrangement: Inactive by default Flexbox Container: Active Upgrade Swiper Library: Inactive Grid Container: Inactive by default Default to New Theme Builder: Inactive Hello Theme Header & Footer: Inactive Editor Top Bar: Active Landing Pages: Inactive Nested Elements: Active Lazy Load Background Images: Inactive Page Transitions: Inactive Notes: Inactive Loop: Active Form Submissions: Active by default Scroll Snap: Inactive Menu: Active == Log == Log: showing 20 of 252023-04-23 12:42:48 [info] elementor::elementor_updater Started 2023-04-23 12:42:48 [info] Elementor/Upgrades - _on_each_version Start 2023-04-23 12:42:48 [info] Elementor/Upgrades - _on_each_version Finished 2023-04-23 12:42:48 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor', 'from' => '3.12.1', 'to' => '3.12.2', )] 2023-04-23 16:55:55 [info] elementor-pro::elementor_pro_updater Started 2023-04-23 16:55:55 [info] Elementor Pro/Upgrades - _on_each_version Start 2023-04-23 16:55:55 [info] Elementor Pro/Upgrades - _on_each_version Finished 2023-04-23 16:55:55 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.2', 'to' => '3.12.3', )] 2023-05-09 02:13:55 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor', 'from' => '3.12.2', 'to' => '3.13.0', )] 2023-05-09 02:13:57 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.3', 'to' => '3.13.0', )] 2023-05-09 02:13:58 [info] elementor::elementor_updater Started 2023-05-09 02:13:58 [info] Elementor/Upgrades - _on_each_version Start 2023-05-09 02:13:58 [info] Elementor/Upgrades - _on_each_version Finished 2023-05-09 02:13:58 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor', 'from' => '3.12.2', 'to' => '3.13.0', )] 2023-05-09 02:13:59 [info] elementor-pro::elementor_pro_updater Started 2023-05-09 02:13:59 [info] Elementor Pro/Upgrades - _on_each_version Start 2023-05-09 02:13:59 [info] Elementor Pro/Upgrades - _on_each_version Finished 2023-05-09 02:13:59 [info] Elementor data updater process has been completed. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.3', 'to' => '3.13.0', )] 2023-05-09 02:14:00 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor', 'from' => '3.12.2', 'to' => '3.13.0', )] 2023-05-09 02:14:01 [info] Elementor data updater process has been queued. [array ( 'plugin' => 'Elementor Pro', 'from' => '3.12.3', 'to' => '3.13.0', )] JS: showing 11 of 11JS: 2023-04-12 15:46:39 [error X 2][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/editor.min.js?ver=3.12.1:3:594206] Cannot read properties of null (reading 'id') JS: 2023-04-13 09:19:21 [error X 7][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view1351") has already been destroyed and cannot be used. JS: 2023-04-14 07:42:58 [error X 4][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view1356") has already been destroyed and cannot be used. JS: 2023-04-14 08:57:25 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view4056") has already been destroyed and cannot be used. JS: 2023-04-14 09:26:20 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/editor.min.js?ver=3.12.1:3:410136] Cannot read properties of null (reading 'history') JS: 2023-04-14 09:27:18 [error X 2][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/editor.min.js?ver=3.12.1:3:1081267] Cannot read properties of null (reading 'getBoundingClientRect') JS: 2023-04-14 13:45:59 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view2041") has already been destroyed and cannot be used. JS: 2023-04-14 18:33:15 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view14527") has already been destroyed and cannot be used. JS: 2023-04-15 15:45:29 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view1519") has already been destroyed and cannot be used. JS: 2023-04-16 21:21:24 [error X 1][http://localhost:85/elementor/wp-content/plugins/elementor/assets/lib/backbone/backbone.marionette.min.js?ver=2.4.5.e1:24:19952] View (cid: "view7212") has already been destroyed and cannot be used. JS: 2023-04-22 10:57:41 [error X 6][http://localhost:85/elementor/wp-content/plugins/elementor/assets/js/df16c9d56464dd4f0800.bundle.min.js:2:7826] Cannot read properties of null (reading 'dataset') PHP: showing 6 of 6PHP: 2023-04-12 20:25:15 [error X 1][C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\theme-builder\classes\conditions-manager.php::295] Uncaught Error: Call to a member function update_meta() on bool in C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\theme-builder\classes\conditions-manager.php:295 Stack trace: #0 C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\theme-builder\classes\conditions-manager.php(168): ElementorPro\Modules\ThemeBuilder\Classes\Conditions_Manager->save_conditions(NULL, Array) #1 [internal function]: ElementorPro\Modules\ThemeBuilder\Classes\Conditions_Manager->ajax_save_theme_template_conditions(Array, Object(Elementor\Core\Common\Modules\Ajax\Module)) #2 C:\xampp\htdocs\elementor\wp-content\plugins\elementor\core\common\modules\ajax\module.php(175): call_user_func(Array, Array, Object(Elementor\Core\Common\Modules\Ajax\Module)) #3 C:\xampp\htdocs\elementor\wp-includes\class-wp-hook.php(308): Elementor\Core\Common\Modules\Ajax\Module->handle_ajax_request('') #4 C:\xampp\htdocs\elementor\wp-includes\class-wp-hook.php(332): WP_Hook->apply_filters('', Array) #5 C:\xampp\htdocs\elemen [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-04-17 01:49:20 [notice X 8][C:\xampp\htdocs\elementor\wp-content\plugins\elementor\core\common\modules\ajax\module.php::175] Undefined index: data [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-05-02 03:35:48 [notice X 65][C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\modules\woocommerce\module.php::381] Undefined offset: 1 [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-05-05 16:15:36 [notice X 1][C:\xampp\htdocs\elementor\wp-content\plugins\elementor\app\modules\import-export\module.php::695] Trying to get property 'label' of non-object [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] PHP: 2023-05-05 16:15:51 [notice X 2][C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php::150] Undefined index: condition_type [array ( 'trace' => ' #0: C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php(150): Elementor\Core\Logger\Manager -> rest_error_handler() #1: ElementorPro\Core\App\Modules\SiteEditor\Data\Endpoints\Templates -> normalize_template_json_item() #2: C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php(120): class type array_map() #3: C:\xampp\htdocs\elementor\wp-content\plugins\elementor-pro\core\app\modules\site-editor\data\endpoints\templates.php(59): ElementorPro\Core\App\Modules\SiteEditor\Data\Endpoints\Templates -> normalize_templates_json() #4: C:\xampp\htdocs\elementor\wp-content\plugins\elementor\data\base\endpoint.php(158): ElementorPro\Core\App\Modules\SiteEditor\Data\Endpoints\Templates -> get_items() ', )] PHP: 2023-05-09 16:28:31 [error X 4][C:\xampp\htdocs\elementor\wp-content\plugins\elementor\data\v2\manager.php::8] Maximum execution time of 30 seconds exceeded [array ( 'trace' => ' #0: Elementor\Core\Logger\Manager -> shutdown() ', )] == Elementor - Compatibility Tag == Elementor Pro: Compatible == Elementor Pro - Compatibility Tag == ```` </details>
non_priority
✅ 🐞 bug report the justified option in the nested tabs widget does not work as expected if direction is set to left or right prerequisites i have searched for similar issues in both open and closed tickets and cannot find a duplicate the issue still exists against the latest stable version of elementor description if the direction option is left or right in the tabs widget justified will not work as expected please see the image below as you can see in the image above justified works well in the bottom tab widget but in the top tab widget the justified option doesn t work as expected and doesn t fill the empty space steps to reproduce add the tabs widget set direction to right or left after that set the justify option to justified it will not work as expected isolating the problem this bug happens with only elementor plugin active and elementor pro this bug happens with a blank wordpress theme active i can reproduce this bug consistently following the steps above system info system info txt server environment operating system winnt software apache openssl php mysql version mariadb org binary distribution php version php memory limit php max input vars php max post size gd installed yes zip installed yes write permissions all right elementor library connected wordpress environment version site url home url wp multisite no max upload size mb memory limit max memory limit permalink structure year monthnum day postname language en us timezone europe berlin admin email debug mode inactive theme name hello elementor version author elementor team child theme no user role administrator wp profile lang en us user agent mozilla windows nt applewebkit khtml like gecko chrome safari active plugins elementor version author elementor com elementor pro version author elementor com features custom fonts custom icons integrations elementor experiments optimized dom output inactive improved asset loading inactive improved css loading inactive inline font icons inactive accessibility improvements inactive additional custom breakpoints inactive admin menu rearrangement inactive by default flexbox container active upgrade swiper library inactive grid container inactive by default default to new theme builder inactive hello theme header footer inactive editor top bar active landing pages inactive nested elements active lazy load background images inactive page transitions inactive notes inactive loop active form submissions active by default scroll snap inactive menu active log log showing of elementor elementor updater started elementor upgrades on each version start elementor upgrades on each version finished elementor data updater process has been completed array plugin elementor from to elementor pro elementor pro updater started elementor pro upgrades on each version start elementor pro upgrades on each version finished elementor data updater process has been completed array plugin elementor pro from to elementor data updater process has been queued array plugin elementor from to elementor data updater process has been queued array plugin elementor pro from to elementor elementor updater started elementor upgrades on each version start elementor upgrades on each version finished elementor data updater process has been completed array plugin elementor from to elementor pro elementor pro updater started elementor pro upgrades on each version start elementor pro upgrades on each version finished elementor data updater process has been completed array plugin elementor pro from to elementor data updater process has been queued array plugin elementor from to elementor data updater process has been queued array plugin elementor pro from to js showing of cannot read properties of null reading id js view cid has already been destroyed and cannot be used js view cid has already been destroyed and cannot be used js view cid has already been destroyed and cannot be used js cannot read properties of null reading history js cannot read properties of null reading getboundingclientrect js view cid has already been destroyed and cannot be used js view cid has already been destroyed and cannot be used js view cid has already been destroyed and cannot be used js view cid has already been destroyed and cannot be used js cannot read properties of null reading dataset php showing of uncaught error call to a member function update meta on bool in c xampp htdocs elementor wp content plugins elementor pro modules theme builder classes conditions manager php stack trace c xampp htdocs elementor wp content plugins elementor pro modules theme builder classes conditions manager php elementorpro modules themebuilder classes conditions manager save conditions null array elementorpro modules themebuilder classes conditions manager ajax save theme template conditions array object elementor core common modules ajax module c xampp htdocs elementor wp content plugins elementor core common modules ajax module php call user func array array object elementor core common modules ajax module c xampp htdocs elementor wp includes class wp hook php elementor core common modules ajax module handle ajax request c xampp htdocs elementor wp includes class wp hook php wp hook apply filters array c xampp htdocs elemen array trace elementor core logger manager shutdown php undefined index data array trace elementor core logger manager shutdown php undefined offset array trace elementor core logger manager shutdown php trying to get property label of non object array trace elementor core logger manager shutdown php undefined index condition type array trace c xampp htdocs elementor wp content plugins elementor pro core app modules site editor data endpoints templates php elementor core logger manager rest error handler elementorpro core app modules siteeditor data endpoints templates normalize template json item c xampp htdocs elementor wp content plugins elementor pro core app modules site editor data endpoints templates php class type array map c xampp htdocs elementor wp content plugins elementor pro core app modules site editor data endpoints templates php elementorpro core app modules siteeditor data endpoints templates normalize templates json c xampp htdocs elementor wp content plugins elementor data base endpoint php elementorpro core app modules siteeditor data endpoints templates get items php maximum execution time of seconds exceeded array trace elementor core logger manager shutdown elementor compatibility tag elementor pro compatible elementor pro compatibility tag
0
181,344
14,860,593,040
IssuesEvent
2021-01-18 20:50:45
aws-samples/aws-scalable-big-blue-button-example
https://api.github.com/repos/aws-samples/aws-scalable-big-blue-button-example
closed
Error: Missing service linked role for ECS
documentation
Default configuration install. Error occurred because missing service linked role for ECS. Problem was resolved by running command: aws iam create-service-linked-role --aws-service-name ecs.amazonaws.com --profile <profile> Maybe this should be included in the pre-requisites?
1.0
Error: Missing service linked role for ECS - Default configuration install. Error occurred because missing service linked role for ECS. Problem was resolved by running command: aws iam create-service-linked-role --aws-service-name ecs.amazonaws.com --profile <profile> Maybe this should be included in the pre-requisites?
non_priority
error missing service linked role for ecs default configuration install error occurred because missing service linked role for ecs problem was resolved by running command aws iam create service linked role aws service name ecs amazonaws com profile maybe this should be included in the pre requisites
0
28,560
8,178,735,625
IssuesEvent
2018-08-28 14:33:39
TheLegendOfMataNui/game-issues
https://api.github.com/repos/TheLegendOfMataNui/game-issues
closed
Talking to Whenua causes the platforms in CLF1 to stick out early
Build: "Beta" 10-23-01 Level-1 Onua Mechanics Resolved
In Onua's level, the map CLF1 has a button you are supposed to push that creates a path to continue the level. However, talking to Whenua beforehand causes these platforms to extend before the button is pressed. It's unknown why this happens.
1.0
Talking to Whenua causes the platforms in CLF1 to stick out early - In Onua's level, the map CLF1 has a button you are supposed to push that creates a path to continue the level. However, talking to Whenua beforehand causes these platforms to extend before the button is pressed. It's unknown why this happens.
non_priority
talking to whenua causes the platforms in to stick out early in onua s level the map has a button you are supposed to push that creates a path to continue the level however talking to whenua beforehand causes these platforms to extend before the button is pressed it s unknown why this happens
0
190,601
22,106,278,764
IssuesEvent
2022-06-01 17:17:10
snowflakedb/snowflake-jdbc
https://api.github.com/repos/snowflakedb/snowflake-jdbc
closed
SNOW-605937: WS-2019-0379 (Medium) detected in commons-codec-1.10.jar - autoclosed
security vulnerability
## WS-2019-0379 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary> <p>The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.</p> <p>Path to dependency file: /tmp/ws-ua_20220531221049_RPTIJN/archiveExtraction_WWPJCL/ZVNYCE/20220531221049/snowflake-jdbc_depth_0/dependencies/arrow-vector-8.0.0/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml</p> <p>Path to vulnerable library: /sitory/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p> <p> Dependency Hierarchy: - :x: **commons-codec-1.10.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation. <p>Publish Date: 2019-05-20 <p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p> <p>Release Date: 2019-05-20</p> <p>Fix Resolution: 1.13</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-codec","packageName":"commons-codec","packageVersion":"1.10","packageFilePaths":["/tmp/ws-ua_20220531221049_RPTIJN/archiveExtraction_WWPJCL/ZVNYCE/20220531221049/snowflake-jdbc_depth_0/dependencies/arrow-vector-8.0.0/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"commons-codec:commons-codec:1.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.13","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2019-0379","vulnerabilityDetails":"Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.","vulnerabilityUrl":"https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
True
SNOW-605937: WS-2019-0379 (Medium) detected in commons-codec-1.10.jar - autoclosed - ## WS-2019-0379 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary> <p>The Apache Commons Codec package contains simple encoder and decoders for various formats such as Base64 and Hexadecimal. In addition to these widely used encoders and decoders, the codec package also maintains a collection of phonetic encoding utilities.</p> <p>Path to dependency file: /tmp/ws-ua_20220531221049_RPTIJN/archiveExtraction_WWPJCL/ZVNYCE/20220531221049/snowflake-jdbc_depth_0/dependencies/arrow-vector-8.0.0/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml</p> <p>Path to vulnerable library: /sitory/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p> <p> Dependency Hierarchy: - :x: **commons-codec-1.10.jar** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation. <p>Publish Date: 2019-05-20 <p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p> <p>Release Date: 2019-05-20</p> <p>Fix Resolution: 1.13</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"commons-codec","packageName":"commons-codec","packageVersion":"1.10","packageFilePaths":["/tmp/ws-ua_20220531221049_RPTIJN/archiveExtraction_WWPJCL/ZVNYCE/20220531221049/snowflake-jdbc_depth_0/dependencies/arrow-vector-8.0.0/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"commons-codec:commons-codec:1.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.13","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"WS-2019-0379","vulnerabilityDetails":"Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.","vulnerabilityUrl":"https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> -->
non_priority
snow ws medium detected in commons codec jar autoclosed ws medium severity vulnerability vulnerable library commons codec jar the apache commons codec package contains simple encoder and decoders for various formats such as and hexadecimal in addition to these widely used encoders and decoders the codec package also maintains a collection of phonetic encoding utilities path to dependency file tmp ws ua rptijn archiveextraction wwpjcl zvnyce snowflake jdbc depth dependencies arrow vector meta inf maven org apache arrow arrow vector pom xml path to vulnerable library sitory commons codec commons codec commons codec jar dependency hierarchy x commons codec jar vulnerable library found in base branch master vulnerability details apache commons codec before version “commons codec ” is vulnerable to information disclosure due to improper input validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree commons codec commons codec isminimumfixversionavailable true minimumfixversion isbinary false basebranches vulnerabilityidentifier ws vulnerabilitydetails apache commons codec before version “commons codec ” is vulnerable to information disclosure due to improper input validation vulnerabilityurl
0
44,529
11,457,558,023
IssuesEvent
2020-02-07 00:08:27
ArduPilot/ardupilot
https://api.github.com/repos/ArduPilot/ardupilot
reopened
WAF: command line switch --default-parameters does not work
BUG BuildSystem ChibiOS
### Bug report **Issue details** If you invoke the command line argument `--default-parameters='file_path.param'` when running waf, it has no effect on the binary. The specified parameter file not loaded, and the defaults.parm file in the hwdef is loaded instead. I can't actually find where these command line switches are executed to fix it myself. I suspect this is incredibly easy fix, just not sure where it is. **Version** Master **Platform** [X] All [ ] AntennaTracker [ ] Copter [ ] Plane [ ] Rover [ ] Submarine **Airframe type** N/A **Hardware type** N/A **Logs** N/A
1.0
WAF: command line switch --default-parameters does not work - ### Bug report **Issue details** If you invoke the command line argument `--default-parameters='file_path.param'` when running waf, it has no effect on the binary. The specified parameter file not loaded, and the defaults.parm file in the hwdef is loaded instead. I can't actually find where these command line switches are executed to fix it myself. I suspect this is incredibly easy fix, just not sure where it is. **Version** Master **Platform** [X] All [ ] AntennaTracker [ ] Copter [ ] Plane [ ] Rover [ ] Submarine **Airframe type** N/A **Hardware type** N/A **Logs** N/A
non_priority
waf command line switch default parameters does not work bug report issue details if you invoke the command line argument default parameters file path param when running waf it has no effect on the binary the specified parameter file not loaded and the defaults parm file in the hwdef is loaded instead i can t actually find where these command line switches are executed to fix it myself i suspect this is incredibly easy fix just not sure where it is version master platform all antennatracker copter plane rover submarine airframe type n a hardware type n a logs n a
0
38,468
6,672,115,701
IssuesEvent
2017-10-04 10:12:08
encode/django-rest-framework
https://api.github.com/repos/encode/django-rest-framework
closed
Views with swappable serializers are failing for docs
Documentation Interactive API Documentation
## Checklist - [x] I have verified that that issue exists against the `master` branch of Django REST framework. - [x] I have searched for similar issues in both open and closed tickets and cannot find a duplicate. - [x] This is not a usage question. (Those should be directed to the [discussion group](https://groups.google.com/forum/#!forum/django-rest-framework) instead.) - [x] This cannot be dealt with as a third party library. (We prefer new functionality to be [in the form of third party libraries](http://www.django-rest-framework.org/topics/third-party-resources/#about-third-party-packages) where possible.) - [x] I have reduced the issue to the simplest possible case. - [ ] I have included a failing test as a pull request. (If you are unable to do so we can still accept the issue.) ## Steps to reproduce For me the only logical way to create an endpoint with nested data was to use a nested serializer on GET, but a flat serializer on POST/PATCH/PUT actions. This is easily achieved by doing (from http://stackoverflow.com/a/21325719/3849359 ): ``` class SwappableSerializerMixin(object): def get_serializer_class(self): try: return self.serializer_classes[self.request.method] except AttributeError as e: logger.debug('%(cls)s does not have the required serializer_classes' 'property' % {'cls': self.__class__.__name__}) raise AttributeError except KeyError: logger.debug('request method %(method)s is not listed' ' in %(cls)s serializer_classes' % {'cls': self.__class__.__name__, 'method': self.request.method}) # required if you don't include all the methods (option, etc) in your serializer_class return super(SwappableSerializerMixin, self).get_serializer_class() ``` However, for the docs this obviously fails, as self.request is None. ## Expected behavior Determine the serializer based on other params for the docs. ## Actual behavior AttributeError is raised, because self.request is None.
2.0
Views with swappable serializers are failing for docs - ## Checklist - [x] I have verified that that issue exists against the `master` branch of Django REST framework. - [x] I have searched for similar issues in both open and closed tickets and cannot find a duplicate. - [x] This is not a usage question. (Those should be directed to the [discussion group](https://groups.google.com/forum/#!forum/django-rest-framework) instead.) - [x] This cannot be dealt with as a third party library. (We prefer new functionality to be [in the form of third party libraries](http://www.django-rest-framework.org/topics/third-party-resources/#about-third-party-packages) where possible.) - [x] I have reduced the issue to the simplest possible case. - [ ] I have included a failing test as a pull request. (If you are unable to do so we can still accept the issue.) ## Steps to reproduce For me the only logical way to create an endpoint with nested data was to use a nested serializer on GET, but a flat serializer on POST/PATCH/PUT actions. This is easily achieved by doing (from http://stackoverflow.com/a/21325719/3849359 ): ``` class SwappableSerializerMixin(object): def get_serializer_class(self): try: return self.serializer_classes[self.request.method] except AttributeError as e: logger.debug('%(cls)s does not have the required serializer_classes' 'property' % {'cls': self.__class__.__name__}) raise AttributeError except KeyError: logger.debug('request method %(method)s is not listed' ' in %(cls)s serializer_classes' % {'cls': self.__class__.__name__, 'method': self.request.method}) # required if you don't include all the methods (option, etc) in your serializer_class return super(SwappableSerializerMixin, self).get_serializer_class() ``` However, for the docs this obviously fails, as self.request is None. ## Expected behavior Determine the serializer based on other params for the docs. ## Actual behavior AttributeError is raised, because self.request is None.
non_priority
views with swappable serializers are failing for docs checklist i have verified that that issue exists against the master branch of django rest framework i have searched for similar issues in both open and closed tickets and cannot find a duplicate this is not a usage question those should be directed to the instead this cannot be dealt with as a third party library we prefer new functionality to be where possible i have reduced the issue to the simplest possible case i have included a failing test as a pull request if you are unable to do so we can still accept the issue steps to reproduce for me the only logical way to create an endpoint with nested data was to use a nested serializer on get but a flat serializer on post patch put actions this is easily achieved by doing from class swappableserializermixin object def get serializer class self try return self serializer classes except attributeerror as e logger debug cls s does not have the required serializer classes property cls self class name raise attributeerror except keyerror logger debug request method method s is not listed in cls s serializer classes cls self class name method self request method required if you don t include all the methods option etc in your serializer class return super swappableserializermixin self get serializer class however for the docs this obviously fails as self request is none expected behavior determine the serializer based on other params for the docs actual behavior attributeerror is raised because self request is none
0
24,333
3,966,062,374
IssuesEvent
2016-05-03 11:15:40
bridgedotnet/Bridge
https://api.github.com/repos/bridgedotnet/Bridge
closed
ToEnumerable extension method results in bracket mismatch in JavaScript
defect in progress
### Expected ```javascript var x = Bridge.Array.toEnumerable(Bridge.Linq.Enumerable.from([1, 2, 3]).toArray()); ``` and no JavaScript errors ### Actual ```javascript var x = (Bridge.Array.toEnumerable(Bridge.Linq.Enumerable.from([1, 2, 3]).toArray()); ``` with a redundant opening bracket without a closing one which results in a JavaScript error: ```javascript Uncaught SyntaxError: Unexpected token ; ``` ### Steps To Reproduce [Live](http://live.bridge.net/#23a2abc7aebe2560e62af5f180b44b2e) ```csharp public class App { [Ready] public static void Main() { var x = new[] { 1, 2, 3}.ToArray().ToEnumerable(); } } ```
1.0
ToEnumerable extension method results in bracket mismatch in JavaScript - ### Expected ```javascript var x = Bridge.Array.toEnumerable(Bridge.Linq.Enumerable.from([1, 2, 3]).toArray()); ``` and no JavaScript errors ### Actual ```javascript var x = (Bridge.Array.toEnumerable(Bridge.Linq.Enumerable.from([1, 2, 3]).toArray()); ``` with a redundant opening bracket without a closing one which results in a JavaScript error: ```javascript Uncaught SyntaxError: Unexpected token ; ``` ### Steps To Reproduce [Live](http://live.bridge.net/#23a2abc7aebe2560e62af5f180b44b2e) ```csharp public class App { [Ready] public static void Main() { var x = new[] { 1, 2, 3}.ToArray().ToEnumerable(); } } ```
non_priority
toenumerable extension method results in bracket mismatch in javascript expected javascript var x bridge array toenumerable bridge linq enumerable from toarray and no javascript errors actual javascript var x bridge array toenumerable bridge linq enumerable from toarray with a redundant opening bracket without a closing one which results in a javascript error javascript uncaught syntaxerror unexpected token steps to reproduce csharp public class app public static void main var x new toarray toenumerable
0
403,927
27,442,062,196
IssuesEvent
2023-03-02 11:45:12
damar-wicaksono/uqtestfuns
https://api.github.com/repos/damar-wicaksono/uqtestfuns
closed
Update the docs on probabilistic input
documentation
While PR #118 adds the documentation for each of the available univariate distribution types, the docs is still missing the following: - [x] Creating an instance of `UnivDist` class - [x] Creating an instance of `ProbInput` class - [x] Some preliminaries and notational convention of the relevant probability concepts
1.0
Update the docs on probabilistic input - While PR #118 adds the documentation for each of the available univariate distribution types, the docs is still missing the following: - [x] Creating an instance of `UnivDist` class - [x] Creating an instance of `ProbInput` class - [x] Some preliminaries and notational convention of the relevant probability concepts
non_priority
update the docs on probabilistic input while pr adds the documentation for each of the available univariate distribution types the docs is still missing the following creating an instance of univdist class creating an instance of probinput class some preliminaries and notational convention of the relevant probability concepts
0
37,838
8,368,663,315
IssuesEvent
2018-10-04 15:16:51
remkop/picocli
https://api.github.com/repos/remkop/picocli
closed
Add module picocli-codegen
codegen
Related to #410: New module to generate the `-H:ReflectionConfigurationFiles=<file>` file from a `CommandSpec` or a class with `@Command` annotations. https://github.com/oracle/graal/blob/master/substratevm/REFLECTION.md
1.0
Add module picocli-codegen - Related to #410: New module to generate the `-H:ReflectionConfigurationFiles=<file>` file from a `CommandSpec` or a class with `@Command` annotations. https://github.com/oracle/graal/blob/master/substratevm/REFLECTION.md
non_priority
add module picocli codegen related to new module to generate the h reflectionconfigurationfiles file from a commandspec or a class with command annotations
0
38,395
19,187,815,590
IssuesEvent
2021-12-05 14:00:45
jordanopensource/contributions-web
https://api.github.com/repos/jordanopensource/contributions-web
closed
Some image elements do not have explicit width and height
performance
**Describe the bug** Some images do not have explicit width and height, affecting the performance. **To Reproduce** Steps to reproduce the behavior: 1. Go to the home page and check the html element of the images. 2. Check the size of the image, they are not explicit. **Expected behavior** Set an explicit width and height on image elements to reduce layout shifts and improve CLS. **Screenshots** ![image](https://user-images.githubusercontent.com/7326249/144219455-22320258-539f-4898-b150-faa2229a890f.png)
True
Some image elements do not have explicit width and height - **Describe the bug** Some images do not have explicit width and height, affecting the performance. **To Reproduce** Steps to reproduce the behavior: 1. Go to the home page and check the html element of the images. 2. Check the size of the image, they are not explicit. **Expected behavior** Set an explicit width and height on image elements to reduce layout shifts and improve CLS. **Screenshots** ![image](https://user-images.githubusercontent.com/7326249/144219455-22320258-539f-4898-b150-faa2229a890f.png)
non_priority
some image elements do not have explicit width and height describe the bug some images do not have explicit width and height affecting the performance to reproduce steps to reproduce the behavior go to the home page and check the html element of the images check the size of the image they are not explicit expected behavior set an explicit width and height on image elements to reduce layout shifts and improve cls screenshots
0
9,304
12,312,590,776
IssuesEvent
2020-05-12 14:08:52
dotnet/runtime
https://api.github.com/repos/dotnet/runtime
closed
System.Diagnostics.Process.ProcessName returning incorrect information on Linux with .NET 5
area-System.Diagnostics.Process os-linux untriaged
Moving PowerShell to .NET 5 via branch https://github.com/SteveL-MSFT/PowerShell/tree/dotnet-5 We have tests that expect the `pwsh` process to have a ProcessName of `pwsh`, but on Linux, the name is actually `ConsoleHost mai` (looks to be cut off). Works correctly on Windows and macOS. Note that `[System.AppDomain]::CurrentDomain.FriendlyName` returns `pwsh` as expected.
1.0
System.Diagnostics.Process.ProcessName returning incorrect information on Linux with .NET 5 - Moving PowerShell to .NET 5 via branch https://github.com/SteveL-MSFT/PowerShell/tree/dotnet-5 We have tests that expect the `pwsh` process to have a ProcessName of `pwsh`, but on Linux, the name is actually `ConsoleHost mai` (looks to be cut off). Works correctly on Windows and macOS. Note that `[System.AppDomain]::CurrentDomain.FriendlyName` returns `pwsh` as expected.
non_priority
system diagnostics process processname returning incorrect information on linux with net moving powershell to net via branch we have tests that expect the pwsh process to have a processname of pwsh but on linux the name is actually consolehost mai looks to be cut off works correctly on windows and macos note that currentdomain friendlyname returns pwsh as expected
0
134,357
12,601,124,099
IssuesEvent
2020-06-11 09:19:11
TechXpertz/TechXpertz
https://api.github.com/repos/TechXpertz/TechXpertz
closed
Create High-Fidelity Prototype
documentation
Using prototyping tools like Figma (https://www.figma.com/), create a high-fidelity prototype so that users can visualise how the end product looks like.
1.0
Create High-Fidelity Prototype - Using prototyping tools like Figma (https://www.figma.com/), create a high-fidelity prototype so that users can visualise how the end product looks like.
non_priority
create high fidelity prototype using prototyping tools like figma create a high fidelity prototype so that users can visualise how the end product looks like
0
250,508
27,094,995,032
IssuesEvent
2023-02-15 01:33:45
opentok/insights-dashboard-sample
https://api.github.com/repos/opentok/insights-dashboard-sample
reopened
minimist-1.2.5.tgz: 1 vulnerabilities (highest severity is: 9.8)
security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-1.2.5.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/opentok/insights-dashboard-sample/commit/7f1b16462576aa26c3583688661bd85b83d15df1">7f1b16462576aa26c3583688661bd85b83d15df1</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (minimist version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-44906](https://www.mend.io/vulnerability-database/CVE-2021-44906) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | minimist-1.2.5.tgz | Direct | 1.2.6 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44906</summary> ### Vulnerable Library - <b>minimist-1.2.5.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - :x: **minimist-1.2.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/opentok/insights-dashboard-sample/commit/7f1b16462576aa26c3583688661bd85b83d15df1">7f1b16462576aa26c3583688661bd85b83d15df1</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-44906>CVE-2021-44906</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: 1.2.6</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
minimist-1.2.5.tgz: 1 vulnerabilities (highest severity is: 9.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimist-1.2.5.tgz</b></p></summary> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/opentok/insights-dashboard-sample/commit/7f1b16462576aa26c3583688661bd85b83d15df1">7f1b16462576aa26c3583688661bd85b83d15df1</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (minimist version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-44906](https://www.mend.io/vulnerability-database/CVE-2021-44906) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 9.8 | minimist-1.2.5.tgz | Direct | 1.2.6 | &#9989; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-44906</summary> ### Vulnerable Library - <b>minimist-1.2.5.tgz</b></p> <p>parse argument options</p> <p>Library home page: <a href="https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz">https://registry.npmjs.org/minimist/-/minimist-1.2.5.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/minimist/package.json</p> <p> Dependency Hierarchy: - :x: **minimist-1.2.5.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/opentok/insights-dashboard-sample/commit/7f1b16462576aa26c3583688661bd85b83d15df1">7f1b16462576aa26c3583688661bd85b83d15df1</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Minimist <=1.2.5 is vulnerable to Prototype Pollution via file index.js, function setKey() (lines 69-95). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-44906>CVE-2021-44906</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Release Date: 2022-03-17</p> <p>Fix Resolution: 1.2.6</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
minimist tgz vulnerabilities highest severity is vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules minimist package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in minimist version remediation available high minimist tgz direct details cve vulnerable library minimist tgz parse argument options library home page a href path to dependency file package json path to vulnerable library node modules minimist package json dependency hierarchy x minimist tgz vulnerable library found in head commit a href found in base branch main vulnerability details minimist is vulnerable to prototype pollution via file index js function setkey lines publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
3,590
3,490,000,919
IssuesEvent
2016-01-04 06:23:09
Elgg/Elgg
https://api.github.com/repos/Elgg/Elgg
closed
Logging fails in non-page requests
bug dev usability important
Really two different bugs: 1. When log to screen is off, warnings during cache requests end up with `$display == true` in Elgg\Logger::process. I.e. it echoes them, but thankfully it seems that output buffer is discarded so it doesn't break anything. 2. When log to screen in on, messages are dumped into the ElggLogCache for screen output, but that output never occurs. The messages never escape the cache.
True
Logging fails in non-page requests - Really two different bugs: 1. When log to screen is off, warnings during cache requests end up with `$display == true` in Elgg\Logger::process. I.e. it echoes them, but thankfully it seems that output buffer is discarded so it doesn't break anything. 2. When log to screen in on, messages are dumped into the ElggLogCache for screen output, but that output never occurs. The messages never escape the cache.
non_priority
logging fails in non page requests really two different bugs when log to screen is off warnings during cache requests end up with display true in elgg logger process i e it echoes them but thankfully it seems that output buffer is discarded so it doesn t break anything when log to screen in on messages are dumped into the elgglogcache for screen output but that output never occurs the messages never escape the cache
0
260,205
27,772,435,217
IssuesEvent
2023-03-16 15:13:17
lukebrogan-mend/WebGoat
https://api.github.com/repos/lukebrogan-mend/WebGoat
opened
xstream-1.4.4.jar: 35 vulnerabilities (highest severity is: 9.9)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.4.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (xstream version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-21345](https://www.mend.io/vulnerability-database/CVE-2021-21345) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.9 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21344](https://www.mend.io/vulnerability-database/CVE-2021-21344) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2013-7285](https://www.mend.io/vulnerability-database/CVE-2013-7285) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.10-java7 | &#9989; | | [CVE-2021-21350](https://www.mend.io/vulnerability-database/CVE-2021-21350) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21347](https://www.mend.io/vulnerability-database/CVE-2021-21347) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21346](https://www.mend.io/vulnerability-database/CVE-2021-21346) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21342](https://www.mend.io/vulnerability-database/CVE-2021-21342) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.1 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21351](https://www.mend.io/vulnerability-database/CVE-2021-21351) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.1 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-39139](https://www.mend.io/vulnerability-database/CVE-2021-39139) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2020-26217](https://www.mend.io/vulnerability-database/CVE-2020-26217) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.4.jar | Direct | 1.4.13-java7 | &#9989; | | [CVE-2021-29505](https://www.mend.io/vulnerability-database/CVE-2021-29505) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.4.jar | Direct | 1.4.17 | &#9989; | | [CVE-2021-21349](https://www.mend.io/vulnerability-database/CVE-2021-21349) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.6 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-39150](https://www.mend.io/vulnerability-database/CVE-2021-39150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39152](https://www.mend.io/vulnerability-database/CVE-2021-39152) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39151](https://www.mend.io/vulnerability-database/CVE-2021-39151) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39154](https://www.mend.io/vulnerability-database/CVE-2021-39154) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39153](https://www.mend.io/vulnerability-database/CVE-2021-39153) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39141](https://www.mend.io/vulnerability-database/CVE-2021-39141) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39145](https://www.mend.io/vulnerability-database/CVE-2021-39145) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39144](https://www.mend.io/vulnerability-database/CVE-2021-39144) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39147](https://www.mend.io/vulnerability-database/CVE-2021-39147) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39146](https://www.mend.io/vulnerability-database/CVE-2021-39146) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39149](https://www.mend.io/vulnerability-database/CVE-2021-39149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39148](https://www.mend.io/vulnerability-database/CVE-2021-39148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2020-26258](https://www.mend.io/vulnerability-database/CVE-2020-26258) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | xstream-1.4.4.jar | Direct | 1.4.14-jdk7 | &#9989; | | [CVE-2021-21343](https://www.mend.io/vulnerability-database/CVE-2021-21343) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21341](https://www.mend.io/vulnerability-database/CVE-2021-21341) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2022-41966](https://www.mend.io/vulnerability-database/CVE-2022-41966) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.12-java7 | &#9989; | | [CVE-2017-7957](https://www.mend.io/vulnerability-database/CVE-2017-7957) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.10 | &#9989; | | [CVE-2016-3674](https://www.mend.io/vulnerability-database/CVE-2016-3674) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.9 | &#9989; | | [CVE-2021-43859](https://www.mend.io/vulnerability-database/CVE-2021-43859) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | com.thoughtworks.xstream:xstream:1.4.19 | &#9989; | | [CVE-2021-21348](https://www.mend.io/vulnerability-database/CVE-2021-21348) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2022-40151](https://www.mend.io/vulnerability-database/CVE-2022-40151) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | com.thoughtworks.xstream:xstream:1.4.20 | &#9989; | | [CVE-2020-26259](https://www.mend.io/vulnerability-database/CVE-2020-26259) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | xstream-1.4.4.jar | Direct | 1.4.14-jdk7 | &#9989; | | [CVE-2021-39140](https://www.mend.io/vulnerability-database/CVE-2021-39140) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.3 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | ## Details > Partial details (24 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21345</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21345>CVE-2021-21345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4">https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21344</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21344>CVE-2021-21344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3">https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2013-7285</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. <p>Publish Date: 2019-05-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-7285>CVE-2013-7285</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285</a></p> <p>Release Date: 2019-05-15</p> <p>Fix Resolution: 1.4.10-java7</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21350</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21350>CVE-2021-21350</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq">https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21347</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21347>CVE-2021-21347</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f">https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21346</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21346>CVE-2021-21346</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr">https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21342</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21342>CVE-2021-21342</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m">https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21351</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21351>CVE-2021-21351</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c">https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39139</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39139>CVE-2021-39139</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44">https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26217</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14. <p>Publish Date: 2020-11-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-26217>CVE-2020-26217</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2">https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2</a></p> <p>Release Date: 2020-11-16</p> <p>Fix Resolution: 1.4.13-java7</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-29505</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17. <p>Publish Date: 2021-05-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29505>CVE-2021-29505</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-7chv-rrw6-w6fc">https://github.com/advisories/GHSA-7chv-rrw6-w6fc</a></p> <p>Release Date: 2021-05-28</p> <p>Fix Resolution: 1.4.17</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21349</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21349>CVE-2021-21349</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv">https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39150</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39150>CVE-2021-39150</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4">https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39152</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39152>CVE-2021-39152</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2">https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39151</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39151>CVE-2021-39151</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4">https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39154</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39154>CVE-2021-39154</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68">https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39153</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39153>CVE-2021-39153</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39141</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39141>CVE-2021-39141</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2">https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39145</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39145>CVE-2021-39145</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v">https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39144</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39144>CVE-2021-39144</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh">https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39147</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39147>CVE-2021-39147</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc">https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39146</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39146>CVE-2021-39146</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f">https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39149</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39149>CVE-2021-39149</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x">https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39148</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39148>CVE-2021-39148</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2">https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
True
xstream-1.4.4.jar: 35 vulnerabilities (highest severity is: 9.9) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.4.jar</b></p></summary> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (xstream version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-21345](https://www.mend.io/vulnerability-database/CVE-2021-21345) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.9 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21344](https://www.mend.io/vulnerability-database/CVE-2021-21344) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2013-7285](https://www.mend.io/vulnerability-database/CVE-2013-7285) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.10-java7 | &#9989; | | [CVE-2021-21350](https://www.mend.io/vulnerability-database/CVE-2021-21350) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21347](https://www.mend.io/vulnerability-database/CVE-2021-21347) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21346](https://www.mend.io/vulnerability-database/CVE-2021-21346) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.8 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21342](https://www.mend.io/vulnerability-database/CVE-2021-21342) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.1 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21351](https://www.mend.io/vulnerability-database/CVE-2021-21351) | <img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> Critical | 9.1 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-39139](https://www.mend.io/vulnerability-database/CVE-2021-39139) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2020-26217](https://www.mend.io/vulnerability-database/CVE-2020-26217) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.4.jar | Direct | 1.4.13-java7 | &#9989; | | [CVE-2021-29505](https://www.mend.io/vulnerability-database/CVE-2021-29505) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.8 | xstream-1.4.4.jar | Direct | 1.4.17 | &#9989; | | [CVE-2021-21349](https://www.mend.io/vulnerability-database/CVE-2021-21349) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.6 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-39150](https://www.mend.io/vulnerability-database/CVE-2021-39150) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39152](https://www.mend.io/vulnerability-database/CVE-2021-39152) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39151](https://www.mend.io/vulnerability-database/CVE-2021-39151) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39154](https://www.mend.io/vulnerability-database/CVE-2021-39154) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39153](https://www.mend.io/vulnerability-database/CVE-2021-39153) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39141](https://www.mend.io/vulnerability-database/CVE-2021-39141) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39145](https://www.mend.io/vulnerability-database/CVE-2021-39145) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39144](https://www.mend.io/vulnerability-database/CVE-2021-39144) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39147](https://www.mend.io/vulnerability-database/CVE-2021-39147) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39146](https://www.mend.io/vulnerability-database/CVE-2021-39146) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39149](https://www.mend.io/vulnerability-database/CVE-2021-39149) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2021-39148](https://www.mend.io/vulnerability-database/CVE-2021-39148) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.5 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | | [CVE-2020-26258](https://www.mend.io/vulnerability-database/CVE-2020-26258) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.7 | xstream-1.4.4.jar | Direct | 1.4.14-jdk7 | &#9989; | | [CVE-2021-21343](https://www.mend.io/vulnerability-database/CVE-2021-21343) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2021-21341](https://www.mend.io/vulnerability-database/CVE-2021-21341) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2022-41966](https://www.mend.io/vulnerability-database/CVE-2022-41966) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.12-java7 | &#9989; | | [CVE-2017-7957](https://www.mend.io/vulnerability-database/CVE-2017-7957) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.10 | &#9989; | | [CVE-2016-3674](https://www.mend.io/vulnerability-database/CVE-2016-3674) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.9 | &#9989; | | [CVE-2021-43859](https://www.mend.io/vulnerability-database/CVE-2021-43859) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | com.thoughtworks.xstream:xstream:1.4.19 | &#9989; | | [CVE-2021-21348](https://www.mend.io/vulnerability-database/CVE-2021-21348) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | 1.4.16 | &#9989; | | [CVE-2022-40151](https://www.mend.io/vulnerability-database/CVE-2022-40151) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | xstream-1.4.4.jar | Direct | com.thoughtworks.xstream:xstream:1.4.20 | &#9989; | | [CVE-2020-26259](https://www.mend.io/vulnerability-database/CVE-2020-26259) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.8 | xstream-1.4.4.jar | Direct | 1.4.14-jdk7 | &#9989; | | [CVE-2021-39140](https://www.mend.io/vulnerability-database/CVE-2021-39140) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.3 | xstream-1.4.4.jar | Direct | 1.4.18 | &#9989; | ## Details > Partial details (24 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.<br> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21345</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21345>CVE-2021-21345</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.9</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4">https://github.com/x-stream/xstream/security/advisories/GHSA-hwpc-8xqv-jvj4</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21344</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21344>CVE-2021-21344</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3">https://github.com/x-stream/xstream/security/advisories/GHSA-59jw-jqf4-3wq3</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2013-7285</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> Xstream API versions up to 1.4.6 and version 1.4.10, if the security framework has not been initialized, may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling XML or any supported format. e.g. JSON. <p>Publish Date: 2019-05-15 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2013-7285>CVE-2013-7285</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-7285</a></p> <p>Release Date: 2019-05-15</p> <p>Fix Resolution: 1.4.10-java7</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21350</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21350>CVE-2021-21350</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq">https://github.com/x-stream/xstream/security/advisories/GHSA-43gc-mjxg-gvrq</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21347</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21347>CVE-2021-21347</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f">https://github.com/x-stream/xstream/security/advisories/GHSA-qpfq-ph7r-qv6f</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21346</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21346>CVE-2021-21346</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr">https://github.com/x-stream/xstream/security/advisories/GHSA-4hrm-m67v-5cxr</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21342</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21342>CVE-2021-21342</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m">https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png' width=19 height=20> CVE-2021-21351</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21351>CVE-2021-21351</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>9.1</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: High - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c">https://github.com/x-stream/xstream/security/advisories/GHSA-hrcp-8f3q-4w2c</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39139</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. A user is only affected if using the version out of the box with JDK 1.7u21 or below. However, this scenario can be adjusted easily to an external Xalan that works regardless of the version of the Java runtime. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39139>CVE-2021-39139</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44">https://github.com/x-stream/xstream/security/advisories/GHSA-64xx-cq4q-mf44</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26217</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream before version 1.4.14 is vulnerable to Remote Code Execution.The vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream. Only users who rely on blocklists are affected. Anyone using XStream's Security Framework allowlist is not affected. The linked advisory provides code workarounds for users who cannot upgrade. The issue is fixed in version 1.4.14. <p>Publish Date: 2020-11-16 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-26217>CVE-2020-26217</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2">https://github.com/x-stream/xstream/security/advisories/GHSA-mw36-7c6c-q4q2</a></p> <p>Release Date: 2020-11-16</p> <p>Fix Resolution: 1.4.13-java7</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-29505</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is software for serializing Java objects to XML and back again. A vulnerability in XStream versions prior to 1.4.17 may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types is affected. The vulnerability is patched in version 1.4.17. <p>Publish Date: 2021-05-28 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29505>CVE-2021-29505</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.8</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/advisories/GHSA-7chv-rrw6-w6fc">https://github.com/advisories/GHSA-7chv-rrw6-w6fc</a></p> <p>Release Date: 2021-05-28</p> <p>Fix Resolution: 1.4.17</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-21349</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-21349>CVE-2021-21349</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.6</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv">https://github.com/x-stream/xstream/security/advisories/GHSA-f6hm-88x3-mfjv</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: 1.4.16</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39150</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39150>CVE-2021-39150</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4">https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39152</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39152>CVE-2021-39152</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2">https://github.com/x-stream/xstream/security/advisories/GHSA-xw4p-crpj-vjx2</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39151</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39151>CVE-2021-39151</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4">https://github.com/x-stream/xstream/security/advisories/GHSA-hph2-m3g5-xxv4</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39154</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39154>CVE-2021-39154</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68">https://github.com/x-stream/xstream/security/advisories/GHSA-6w62-hx7r-mw68</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39153</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream, if using the version out of the box with Java runtime version 14 to 8 or with JavaFX installed. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39153>CVE-2021-39153</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-39153</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39141</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39141>CVE-2021-39141</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2">https://github.com/x-stream/xstream/security/advisories/GHSA-g5w6-mrj7-75h2</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39145</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39145>CVE-2021-39145</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v">https://github.com/x-stream/xstream/security/advisories/GHSA-8jrj-525p-826v</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39144</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39144>CVE-2021-39144</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh">https://github.com/x-stream/xstream/security/advisories/GHSA-j9h8-phrw-h4fh</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39147</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39147>CVE-2021-39147</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc">https://github.com/x-stream/xstream/security/advisories/GHSA-h7v4-7xg3-hxcc</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39146</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39146>CVE-2021-39146</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f">https://github.com/x-stream/xstream/security/advisories/GHSA-p8pq-r894-fm8f</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39149</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39149>CVE-2021-39149</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x">https://github.com/x-stream/xstream/security/advisories/GHSA-3ccq-5vw3-2p6x</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details><details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2021-39148</summary> ### Vulnerable Library - <b>xstream-1.4.4.jar</b></p> <p></p> <p>Path to dependency file: /pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.4/xstream-1.4.4.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.4.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/lukebrogan-mend/WebGoat/commit/cbf2e153d93a9abba89b7ee8e6d18c298f3a767f">cbf2e153d93a9abba89b7ee8e6d18c298f3a767f</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> XStream is a simple library to serialize objects to XML and back again. In affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. XStream 1.4.18 uses no longer a blacklist by default, since it cannot be secured for general purpose. <p>Publish Date: 2021-08-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-39148>CVE-2021-39148</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>8.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2">https://github.com/x-stream/xstream/security/advisories/GHSA-qrx8-8545-4wg2</a></p> <p>Release Date: 2021-08-23</p> <p>Fix Resolution: 1.4.18</p> </p> <p></p> :rescue_worker_helmet: Automatic Remediation is available for this issue </details> *** <p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p>
non_priority
xstream jar vulnerabilities highest severity is vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in xstream version remediation available critical xstream jar direct critical xstream jar direct critical xstream jar direct critical xstream jar direct critical xstream jar direct critical xstream jar direct critical xstream jar direct critical xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct high xstream jar direct com thoughtworks xstream xstream high xstream jar direct high xstream jar direct com thoughtworks xstream xstream medium xstream jar direct medium xstream jar direct details partial details vulnerabilities are displayed below due to a content size limitation in github to view information on the remaining vulnerabilities navigate to the mend application cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker who has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream api versions up to and version if the security framework has not been initialized may allow a remote attacker to run arbitrary shell commands by manipulating the processed input stream when unmarshaling xml or any supported format e g json publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to execute arbitrary code only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects xstream creates therefore new instances based on these type information an attacker can manipulate the processed input stream and replace or inject objects that result in a server side forgery request no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream a user is only affected if using the version out of the box with jdk or below however this scenario can be adjusted easily to an external xalan that works regardless of the version of the java runtime no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream before version is vulnerable to remote code execution the vulnerability may allow a remote attacker to run arbitrary shell commands only by manipulating the processed input stream only users who rely on blocklists are affected anyone using xstream s security framework allowlist is not affected the linked advisory provides code workarounds for users who cannot upgrade the issue is fixed in version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is software for serializing java objects to xml and back again a vulnerability in xstream versions prior to may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream no user who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types is affected the vulnerability is patched in version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability which may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a java runtime version to no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a java runtime version to no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream if using the version out of the box with java runtime version to or with javafx installed no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker has sufficient rights to execute commands of the host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue cve vulnerable library xstream jar path to dependency file pom xml path to vulnerable library home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a simple library to serialize objects to xml and back again in affected versions this vulnerability may allow a remote attacker to load and execute arbitrary code from a remote host only by manipulating the processed input stream no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types xstream uses no longer a blacklist by default since it cannot be secured for general purpose publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required low user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue
0
389,604
26,824,443,729
IssuesEvent
2023-02-02 11:51:29
TaemHam/SNS-Clone-Coding
https://api.github.com/repos/TaemHam/SNS-Clone-Coding
closed
대규모 트래픽을 고려해 현 Architecture의 문제점 찾기
documentation
* 코드가 최적화가 되어 있는가? * DB IO가 중복되어 있지 않은가? * 기능간의 강한 결합성이 존재하는가?
1.0
대규모 트래픽을 고려해 현 Architecture의 문제점 찾기 - * 코드가 최적화가 되어 있는가? * DB IO가 중복되어 있지 않은가? * 기능간의 강한 결합성이 존재하는가?
non_priority
대규모 트래픽을 고려해 현 architecture의 문제점 찾기 코드가 최적화가 되어 있는가 db io가 중복되어 있지 않은가 기능간의 강한 결합성이 존재하는가
0
432,707
30,292,822,243
IssuesEvent
2023-07-09 13:43:22
Kani-Maki-Gang/bld
https://api.github.com/repos/Kani-Maki-Gang/bld
closed
Update documentation for v0.2
documentation
When all items for version 0.2 are completed the documentation should be updated.
1.0
Update documentation for v0.2 - When all items for version 0.2 are completed the documentation should be updated.
non_priority
update documentation for when all items for version are completed the documentation should be updated
0