Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
844
labels
stringlengths
4
721
body
stringlengths
1
261k
index
stringclasses
12 values
text_combine
stringlengths
96
261k
label
stringclasses
2 values
text
stringlengths
96
248k
binary_label
int64
0
1
115,174
9,782,457,194
IssuesEvent
2019-06-07 23:47:58
jruby/jruby
https://api.github.com/repos/jruby/jruby
opened
Inadequate testing of JMX features
beginner help wanted java integration tests
We don't have any tests that confirm the JMX endpoints we expose are working. As an example, the remote backtrace generation broke in JRuby 9.2.7.0 when we fixed how exception backtraces are created. I have fixed that in d2875a427a, but without tests obviously this and the rest of our mbeans are at risk of regressing again. This would be a good one for external contributors. You can use Ruby to access JMX directly, or use @enebo's jmx gem for a nicer interface.
1.0
Inadequate testing of JMX features - We don't have any tests that confirm the JMX endpoints we expose are working. As an example, the remote backtrace generation broke in JRuby 9.2.7.0 when we fixed how exception backtraces are created. I have fixed that in d2875a427a, but without tests obviously this and the rest of our mbeans are at risk of regressing again. This would be a good one for external contributors. You can use Ruby to access JMX directly, or use @enebo's jmx gem for a nicer interface.
non_priority
inadequate testing of jmx features we don t have any tests that confirm the jmx endpoints we expose are working as an example the remote backtrace generation broke in jruby when we fixed how exception backtraces are created i have fixed that in but without tests obviously this and the rest of our mbeans are at risk of regressing again this would be a good one for external contributors you can use ruby to access jmx directly or use enebo s jmx gem for a nicer interface
0
377,730
26,267,792,027
IssuesEvent
2023-01-06 14:12:55
ynikitenko/yarsync
https://api.github.com/repos/ynikitenko/yarsync
closed
improve github-pages
documentation help wanted
- center the top button "View On GitHub" vertically, - create navigation between pages? - use hacker theme instead of midnight? Decide on its readability first. At the moment [fonts are unreadable](https://github.com/pages-themes/hacker/issues/112). Green sections look awesome, but maybe white is less distracting and better for reading a manual? - can't link to document sections (including manual and inter-manual links), - can't copy code with a click (as it is done on GitHub); not essential, but nice to have, - add an arrow "to the top of the page" at the bottom? - manual still looks a bit better in the terminal.
1.0
improve github-pages - - center the top button "View On GitHub" vertically, - create navigation between pages? - use hacker theme instead of midnight? Decide on its readability first. At the moment [fonts are unreadable](https://github.com/pages-themes/hacker/issues/112). Green sections look awesome, but maybe white is less distracting and better for reading a manual? - can't link to document sections (including manual and inter-manual links), - can't copy code with a click (as it is done on GitHub); not essential, but nice to have, - add an arrow "to the top of the page" at the bottom? - manual still looks a bit better in the terminal.
non_priority
improve github pages center the top button view on github vertically create navigation between pages use hacker theme instead of midnight decide on its readability first at the moment green sections look awesome but maybe white is less distracting and better for reading a manual can t link to document sections including manual and inter manual links can t copy code with a click as it is done on github not essential but nice to have add an arrow to the top of the page at the bottom manual still looks a bit better in the terminal
0
150,719
23,702,275,602
IssuesEvent
2022-08-29 20:13:56
practice-uffs/programa
https://api.github.com/repos/practice-uffs/programa
opened
Postar novo membro nas redes sociais
ajuda:con-design ajuda:ger-aux
Criar imagem base como a feita para os demais bolsistas. Revisar texto de apresentação [(linha 59)](https://docs.google.com/spreadsheets/d/15kGGrER8UTGQhPIvGm2jHhs3pEO6f7gqISZgRyqpMKE/edit#gid=745178717)
1.0
Postar novo membro nas redes sociais - Criar imagem base como a feita para os demais bolsistas. Revisar texto de apresentação [(linha 59)](https://docs.google.com/spreadsheets/d/15kGGrER8UTGQhPIvGm2jHhs3pEO6f7gqISZgRyqpMKE/edit#gid=745178717)
non_priority
postar novo membro nas redes sociais criar imagem base como a feita para os demais bolsistas revisar texto de apresentação
0
317,619
23,680,847,472
IssuesEvent
2022-08-28 19:28:27
orbita-center/react-dadata-box
https://api.github.com/repos/orbita-center/react-dadata-box
closed
SpecificQueryModeResponse generic into docs
documentation
SpecificQueryModeResponse generic into docs for **customActions** & **type** sync
1.0
SpecificQueryModeResponse generic into docs - SpecificQueryModeResponse generic into docs for **customActions** & **type** sync
non_priority
specificquerymoderesponse generic into docs specificquerymoderesponse generic into docs for customactions type sync
0
26,004
19,560,311,598
IssuesEvent
2022-01-03 15:23:02
hzi-braunschweig/SORMAS-Project
https://api.github.com/repos/hzi-braunschweig/SORMAS-Project
closed
CentralInfraSyncFacade::syncAll should run in its own DB transaction
infrastructure change s2s
### Feature Description The `syncAll` function of `CentralInfraSyncFacade` which pulls all infra data types we currently have. ### Problem Description The function is currently not executed in a dedicated transactio. This means that if `loadAndStoreContinents` and `loadAndStoreSubcontinents` succeed, but `loadAndStoreCountries` does not as e.g., a country references a non existent subcontinent, nothing should end up in the DB as the provided data from central is clearly wrong. ### Proposed Change Open a transaction and rollback on any Exception. Commit the whole infra only if everything is correct.
1.0
CentralInfraSyncFacade::syncAll should run in its own DB transaction - ### Feature Description The `syncAll` function of `CentralInfraSyncFacade` which pulls all infra data types we currently have. ### Problem Description The function is currently not executed in a dedicated transactio. This means that if `loadAndStoreContinents` and `loadAndStoreSubcontinents` succeed, but `loadAndStoreCountries` does not as e.g., a country references a non existent subcontinent, nothing should end up in the DB as the provided data from central is clearly wrong. ### Proposed Change Open a transaction and rollback on any Exception. Commit the whole infra only if everything is correct.
non_priority
centralinfrasyncfacade syncall should run in its own db transaction feature description the syncall function of centralinfrasyncfacade which pulls all infra data types we currently have problem description the function is currently not executed in a dedicated transactio this means that if loadandstorecontinents and loadandstoresubcontinents succeed but loadandstorecountries does not as e g a country references a non existent subcontinent nothing should end up in the db as the provided data from central is clearly wrong proposed change open a transaction and rollback on any exception commit the whole infra only if everything is correct
0
61,628
14,632,130,183
IssuesEvent
2020-12-23 21:33:50
Cacti/cacti
https://api.github.com/repos/Cacti/cacti
closed
In a recent audit of core Cacti code, there were a few stored XSS issues that can be exposed.
SECURITY resolved
# Describe the bug There are a few places in the current code where an attacker, once having gained access to the Cacti database through a SQL injection, could modify data in tables to possibly expose an stored XSS bug in Cacti. ## Expected behavior Cacti should never allow things like this to happen.
True
In a recent audit of core Cacti code, there were a few stored XSS issues that can be exposed. - # Describe the bug There are a few places in the current code where an attacker, once having gained access to the Cacti database through a SQL injection, could modify data in tables to possibly expose an stored XSS bug in Cacti. ## Expected behavior Cacti should never allow things like this to happen.
non_priority
in a recent audit of core cacti code there were a few stored xss issues that can be exposed describe the bug there are a few places in the current code where an attacker once having gained access to the cacti database through a sql injection could modify data in tables to possibly expose an stored xss bug in cacti expected behavior cacti should never allow things like this to happen
0
38,454
15,701,836,875
IssuesEvent
2021-03-26 11:46:37
MicrosoftDocs/azure-docs
https://api.github.com/repos/MicrosoftDocs/azure-docs
closed
Need to know the ETA of one bug | command terminated with exit status=52 | DNS record propagated
Pri2 container-service/svc cxp product-bug triaged
When stopping and then starting the AKS cluster, we encounter the issue as below. ++++++++++++++ Agents are unable to resolve Kubernetes API server name. It's likely custom DNS server is not correctly configured, please see https://aka.ms/aks/private-cluster#hub-and-spoke-with-custom-dns for more information. Details: VMSSAgentPoolReconciler retry failed: {   "Category": "InternalError",   "SubCode": "LookupNoSuchHost",   "Dependency": "Microsoft.Compute/VirtualMachineScaleSet",   "OriginError": {    "code": "VMExtensionProvisioningError",    "message": "VM has reported a failure when processing extension 'vmssCSE'. Error message: \"Enable failed: failed to execute command: command terminated with exit status=52 ..... ++++++++++++++ After raising the MS support ticket, this is one known issue. It’s because when we stop AKS cluster, the cluster FQDN will be removed from Azure DNS record. Next time, when we start the cluster, it needs some time to add the FQDN record. So we need to know the ETA of this bug. We are going to take this upto production , so please fix this ASAP. Thank you for your help! --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: f07b13b8-6b8b-57f9-7fb3-361329af08be * Version Independent ID: d3c6ae95-654f-be23-5dcd-3c3146d5cf63 * Content: [Start and Stop an Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/start-stop-cluster) * Content Source: [articles/aks/start-stop-cluster.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/start-stop-cluster.md) * Service: **container-service** * GitHub Login: @palma21 * Microsoft Alias: **mlearned**
1.0
Need to know the ETA of one bug | command terminated with exit status=52 | DNS record propagated - When stopping and then starting the AKS cluster, we encounter the issue as below. ++++++++++++++ Agents are unable to resolve Kubernetes API server name. It's likely custom DNS server is not correctly configured, please see https://aka.ms/aks/private-cluster#hub-and-spoke-with-custom-dns for more information. Details: VMSSAgentPoolReconciler retry failed: {   "Category": "InternalError",   "SubCode": "LookupNoSuchHost",   "Dependency": "Microsoft.Compute/VirtualMachineScaleSet",   "OriginError": {    "code": "VMExtensionProvisioningError",    "message": "VM has reported a failure when processing extension 'vmssCSE'. Error message: \"Enable failed: failed to execute command: command terminated with exit status=52 ..... ++++++++++++++ After raising the MS support ticket, this is one known issue. It’s because when we stop AKS cluster, the cluster FQDN will be removed from Azure DNS record. Next time, when we start the cluster, it needs some time to add the FQDN record. So we need to know the ETA of this bug. We are going to take this upto production , so please fix this ASAP. Thank you for your help! --- #### Document Details ⚠ *Do not edit this section. It is required for docs.microsoft.com ➟ GitHub issue linking.* * ID: f07b13b8-6b8b-57f9-7fb3-361329af08be * Version Independent ID: d3c6ae95-654f-be23-5dcd-3c3146d5cf63 * Content: [Start and Stop an Azure Kubernetes Service (AKS) - Azure Kubernetes Service](https://docs.microsoft.com/en-us/azure/aks/start-stop-cluster) * Content Source: [articles/aks/start-stop-cluster.md](https://github.com/MicrosoftDocs/azure-docs/blob/master/articles/aks/start-stop-cluster.md) * Service: **container-service** * GitHub Login: @palma21 * Microsoft Alias: **mlearned**
non_priority
need to know the eta of one bug command terminated with exit status dns record propagated when stopping and then starting the aks cluster we encounter the issue as below agents are unable to resolve kubernetes api server name  it s likely custom dns server is not correctly configured  please see   for more information  details  vmssagentpoolreconciler retry failed      category   internalerror    subcode   lookupnosuchhost    dependency   microsoft compute virtualmachinescaleset    originerror       code   vmextensionprovisioningerror     message   vm has reported a failure when processing extension  vmsscse  error message   enable failed  failed to execute command  command terminated with exit status after raising the ms support ticket this is one known issue it’s because when we stop aks cluster the cluster fqdn will be removed from azure dns record next time when we start the cluster it needs some time to add the fqdn record so we need to know the eta of this bug we are going to take this upto production so please fix this asap thank you for your help document details ⚠ do not edit this section it is required for docs microsoft com ➟ github issue linking id version independent id content content source service container service github login microsoft alias mlearned
0
79,470
9,906,349,018
IssuesEvent
2019-06-27 13:41:30
unitsofmeasurement/indriya
https://api.github.com/repos/unitsofmeasurement/indriya
closed
Move AbstractConverter to function
design task
I know this is a slightly bigger step, but as a new redefined `MultiplyConverter` interface also got defined (in place of the earlier class) in the function package, and `AbstractUnitFormat` etc. are in the format package, it is consequent here.
1.0
Move AbstractConverter to function - I know this is a slightly bigger step, but as a new redefined `MultiplyConverter` interface also got defined (in place of the earlier class) in the function package, and `AbstractUnitFormat` etc. are in the format package, it is consequent here.
non_priority
move abstractconverter to function i know this is a slightly bigger step but as a new redefined multiplyconverter interface also got defined in place of the earlier class in the function package and abstractunitformat etc are in the format package it is consequent here
0
1,064
3,023,679,036
IssuesEvent
2015-08-01 19:15:28
Py64/Wolves
https://api.github.com/repos/Py64/Wolves
opened
Improve registration process
doing major security-high
- Sending activation mails - If user exists, cancel - Check is email fine
True
Improve registration process - - Sending activation mails - If user exists, cancel - Check is email fine
non_priority
improve registration process sending activation mails if user exists cancel check is email fine
0
38,713
6,690,058,897
IssuesEvent
2017-10-09 07:23:29
Sylius/Sylius
https://api.github.com/repos/Sylius/Sylius
closed
Custom shipping calculators - Outdated documentation
Documentation
In custom shipping calculators (http://docs.sylius.org/en/latest/bundles/SyliusShippingBundle/custom_calculators.html#configurable-calculators), code samples are outdated : - `DHLCalculator` class should implements `Sylius\Component\Shipping\Calculator\CalculatorInterface` instead of extending old `Sylius\Bundle\ShippingBundle\Calculator\Calculator` class - `DHLCalculator` class should implements `getType()` method - use declaration of `ShippingSubjectInterface` should be : `use Sylius\Component\Shipping\Model\ShipmentInterface`
1.0
Custom shipping calculators - Outdated documentation - In custom shipping calculators (http://docs.sylius.org/en/latest/bundles/SyliusShippingBundle/custom_calculators.html#configurable-calculators), code samples are outdated : - `DHLCalculator` class should implements `Sylius\Component\Shipping\Calculator\CalculatorInterface` instead of extending old `Sylius\Bundle\ShippingBundle\Calculator\Calculator` class - `DHLCalculator` class should implements `getType()` method - use declaration of `ShippingSubjectInterface` should be : `use Sylius\Component\Shipping\Model\ShipmentInterface`
non_priority
custom shipping calculators outdated documentation in custom shipping calculators code samples are outdated dhlcalculator class should implements sylius component shipping calculator calculatorinterface instead of extending old sylius bundle shippingbundle calculator calculator class dhlcalculator class should implements gettype method use declaration of shippingsubjectinterface should be use sylius component shipping model shipmentinterface
0
97,021
8,640,320,522
IssuesEvent
2018-11-24 04:03:54
Fourdee/DietPi
https://api.github.com/repos/Fourdee/DietPi
closed
DietPi-Software | Pi-hole: Add support for blocking page
Feature Request :factory: Testing/testers required :arrow_down_small:
- At webserver conf level? - Also outstanding issue with service not starting during boot, workaround has been applied to v6.13.
2.0
DietPi-Software | Pi-hole: Add support for blocking page - - At webserver conf level? - Also outstanding issue with service not starting during boot, workaround has been applied to v6.13.
non_priority
dietpi software pi hole add support for blocking page at webserver conf level also outstanding issue with service not starting during boot workaround has been applied to
0
30,524
24,894,587,879
IssuesEvent
2022-10-28 14:45:24
DMPRoadmap/roadmap
https://api.github.com/repos/DMPRoadmap/roadmap
opened
Upgrade Rails to 7.x
infrastructure effort-large need-to-slice
We will eventually need to upgrade to 7.x. Was pointed to this helpful guide (wish I had known about it earlier) https://www.fastruby.io/blog/rails/upgrades/upgrade-rails-6-1-to-7-0.html
1.0
Upgrade Rails to 7.x - We will eventually need to upgrade to 7.x. Was pointed to this helpful guide (wish I had known about it earlier) https://www.fastruby.io/blog/rails/upgrades/upgrade-rails-6-1-to-7-0.html
non_priority
upgrade rails to x we will eventually need to upgrade to x was pointed to this helpful guide wish i had known about it earlier
0
40,419
5,290,607,925
IssuesEvent
2017-02-08 20:19:54
ansible/ansible
https://api.github.com/repos/ansible/ansible
closed
Wrong Shippable test on type(x).__name__ print
affects_2.3 bug_report test
<!--- Verify first that your issue/request is not already reported on GitHub. Also test if the latest release, and master branch are affected too. --> ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Name of the module/plugin/task/feature --> shippable ##### ANSIBLE VERSION <!--- Paste verbatim output from “ansible --version” between quotes below --> ``` devel ``` ##### CONFIGURATION <!--- Mention any settings you have changed/added/removed in ansible.cfg (or using the ANSIBLE_* environment variables). --> ##### OS / ENVIRONMENT <!--- Mention the OS you are running Ansible from, and the OS you are managing, or say “N/A” for anything that is not platform-specific. --> ##### SUMMARY <!--- Explain the problem briefly --> Shippable failed to detect type(x) usage correctly. When using type(x).__name__ to retrieve a type, it thinks we are trying to test which type is this. here is the incorrect build https://app.shippable.com/runs/589add9b6ee43c0f00b55fe3/1/console ##### STEPS TO REPRODUCE <!--- For bugs, show exactly how to reproduce the problem, using a minimal test-case. For new features, show how the feature would be used. --> <!--- Paste example playbooks or commands between quotes below --> ``` self.module.fail_json(msg='TSIG update error (%s): %s' % (type(e).__name__, str(e))) ``` <!--- You can also paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- What did you expect to happen when running the steps above? --> working test ##### ACTUAL RESULTS <!--- What actually happened? If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes below --> ``` ERROR: Type comparison using type() found on line 197. Use isinstance() instead ```
1.0
Wrong Shippable test on type(x).__name__ print - <!--- Verify first that your issue/request is not already reported on GitHub. Also test if the latest release, and master branch are affected too. --> ##### ISSUE TYPE - Bug Report ##### COMPONENT NAME <!--- Name of the module/plugin/task/feature --> shippable ##### ANSIBLE VERSION <!--- Paste verbatim output from “ansible --version” between quotes below --> ``` devel ``` ##### CONFIGURATION <!--- Mention any settings you have changed/added/removed in ansible.cfg (or using the ANSIBLE_* environment variables). --> ##### OS / ENVIRONMENT <!--- Mention the OS you are running Ansible from, and the OS you are managing, or say “N/A” for anything that is not platform-specific. --> ##### SUMMARY <!--- Explain the problem briefly --> Shippable failed to detect type(x) usage correctly. When using type(x).__name__ to retrieve a type, it thinks we are trying to test which type is this. here is the incorrect build https://app.shippable.com/runs/589add9b6ee43c0f00b55fe3/1/console ##### STEPS TO REPRODUCE <!--- For bugs, show exactly how to reproduce the problem, using a minimal test-case. For new features, show how the feature would be used. --> <!--- Paste example playbooks or commands between quotes below --> ``` self.module.fail_json(msg='TSIG update error (%s): %s' % (type(e).__name__, str(e))) ``` <!--- You can also paste gist.github.com links for larger files --> ##### EXPECTED RESULTS <!--- What did you expect to happen when running the steps above? --> working test ##### ACTUAL RESULTS <!--- What actually happened? If possible run with extra verbosity (-vvvv) --> <!--- Paste verbatim command output between quotes below --> ``` ERROR: Type comparison using type() found on line 197. Use isinstance() instead ```
non_priority
wrong shippable test on type x name print verify first that your issue request is not already reported on github also test if the latest release and master branch are affected too issue type bug report component name shippable ansible version devel configuration mention any settings you have changed added removed in ansible cfg or using the ansible environment variables os environment mention the os you are running ansible from and the os you are managing or say “n a” for anything that is not platform specific summary shippable failed to detect type x usage correctly when using type x name to retrieve a type it thinks we are trying to test which type is this here is the incorrect build steps to reproduce for bugs show exactly how to reproduce the problem using a minimal test case for new features show how the feature would be used self module fail json msg tsig update error s s type e name str e expected results working test actual results error type comparison using type found on line use isinstance instead
0
33,129
12,190,112,921
IssuesEvent
2020-04-29 08:45:03
lgmorand/aks-checklist
https://api.github.com/repos/lgmorand/aks-checklist
closed
CVE-2018-20822 (Medium) detected in node-sass-v4.13.1, node-sass-4.13.1.tgz
security vulnerability
## CVE-2018-20822 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.13.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.13.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/aks-checklist/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/aks-checklist/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - gulp-sass-4.0.2.tgz (Root Library) - :x: **node-sass-4.13.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/lgmorand/aks-checklist/commit/76621f749e31b0ae992056310004183337207c77">76621f749e31b0ae992056310004183337207c77</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp). <p>Publish Date: 2019-04-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20822>CVE-2018-20822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-20822 (Medium) detected in node-sass-v4.13.1, node-sass-4.13.1.tgz - ## CVE-2018-20822 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.13.1.tgz</b></p></summary> <p> <details><summary><b>node-sass-4.13.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.13.1.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/aks-checklist/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/aks-checklist/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - gulp-sass-4.0.2.tgz (Root Library) - :x: **node-sass-4.13.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/lgmorand/aks-checklist/commit/76621f749e31b0ae992056310004183337207c77">76621f749e31b0ae992056310004183337207c77</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> LibSass 3.5.4 allows attackers to cause a denial-of-service (uncontrolled recursion in Sass::Complex_Selector::perform in ast.hpp and Sass::Inspect::operator in inspect.cpp). <p>Publish Date: 2019-04-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20822>CVE-2018-20822</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20822</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in node sass node sass tgz cve medium severity vulnerability vulnerable libraries node sass tgz node sass tgz wrapper around libsass library home page a href path to dependency file tmp ws scm aks checklist package json path to vulnerable library tmp ws scm aks checklist node modules node sass package json dependency hierarchy gulp sass tgz root library x node sass tgz vulnerable library found in head commit a href vulnerability details libsass allows attackers to cause a denial of service uncontrolled recursion in sass complex selector perform in ast hpp and sass inspect operator in inspect cpp publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass step up your open source security game with whitesource
0
149,446
23,477,142,204
IssuesEvent
2022-08-17 07:18:18
jupyterlab/jupyterlab
https://api.github.com/repos/jupyterlab/jupyterlab
closed
Future of ui-components package: drop Blueprint; should we use Material-UI?
status:Needs Discussion tag:Design System CSS
Refs: #6828 #6890 There's currently an ongoing discussion about the future of the `ui-components` package in Jupyterlab core: - There's no particular reason to keep the Blueprint dependency around. We should refactor out the sparse use of it in `ui-components` and drop the dep - This should be easy, and it will be an API breaking change, so it should maybe go in for 2.0 - Should we replace Blueprint with Material-UI? - Pro: - Does a lot of nice stuff that would be too much work to do on our own - Really nice dialog boxes - Con: - Does a lot of complex stuff that we don't need - May be counterproductive for accessibility stuff
1.0
Future of ui-components package: drop Blueprint; should we use Material-UI? - Refs: #6828 #6890 There's currently an ongoing discussion about the future of the `ui-components` package in Jupyterlab core: - There's no particular reason to keep the Blueprint dependency around. We should refactor out the sparse use of it in `ui-components` and drop the dep - This should be easy, and it will be an API breaking change, so it should maybe go in for 2.0 - Should we replace Blueprint with Material-UI? - Pro: - Does a lot of nice stuff that would be too much work to do on our own - Really nice dialog boxes - Con: - Does a lot of complex stuff that we don't need - May be counterproductive for accessibility stuff
non_priority
future of ui components package drop blueprint should we use material ui refs there s currently an ongoing discussion about the future of the ui components package in jupyterlab core there s no particular reason to keep the blueprint dependency around we should refactor out the sparse use of it in ui components and drop the dep this should be easy and it will be an api breaking change so it should maybe go in for should we replace blueprint with material ui pro does a lot of nice stuff that would be too much work to do on our own really nice dialog boxes con does a lot of complex stuff that we don t need may be counterproductive for accessibility stuff
0
317,448
27,238,103,567
IssuesEvent
2023-02-21 17:52:37
Azure/azure-sdk-tools
https://api.github.com/repos/Azure/azure-sdk-tools
closed
[test-proxy] Consider using microsoft/reverse-proxy
Test-Proxy
https://github.com/microsoft/reverse-proxy is "a toolkit for developing high-performance HTTP reverse proxy applications". It might be worth investigating this project, to see if it could makes sense to implement test-proxy on top of reverse-proxy.
1.0
[test-proxy] Consider using microsoft/reverse-proxy - https://github.com/microsoft/reverse-proxy is "a toolkit for developing high-performance HTTP reverse proxy applications". It might be worth investigating this project, to see if it could makes sense to implement test-proxy on top of reverse-proxy.
non_priority
consider using microsoft reverse proxy is a toolkit for developing high performance http reverse proxy applications it might be worth investigating this project to see if it could makes sense to implement test proxy on top of reverse proxy
0
54,981
6,886,021,385
IssuesEvent
2017-11-21 17:57:02
cs340tabyu/cs340Fall2017
https://api.github.com/repos/cs340tabyu/cs340Fall2017
opened
Large click space for certain routes
P4: Aesthetic or Design Flaw The Fun Team
Not a huge problem, but I noticed if you click on the edges of the map it acts are though you're trying to claim one of the nearby routes. Maybe you designed it that way, but it felt a little weird
1.0
Large click space for certain routes - Not a huge problem, but I noticed if you click on the edges of the map it acts are though you're trying to claim one of the nearby routes. Maybe you designed it that way, but it felt a little weird
non_priority
large click space for certain routes not a huge problem but i noticed if you click on the edges of the map it acts are though you re trying to claim one of the nearby routes maybe you designed it that way but it felt a little weird
0
196,808
15,610,590,071
IssuesEvent
2021-03-19 13:22:42
thelastinuit/toad
https://api.github.com/repos/thelastinuit/toad
closed
Update Readme
documentation
## Expected Behavior It should be helpful to developers who want to use it or modify it. ## Current Behavior README says nothing of value about this demo project. ## Possible Solution Update Readme with: - Steps on how to install it - Steps on how to run it
1.0
Update Readme - ## Expected Behavior It should be helpful to developers who want to use it or modify it. ## Current Behavior README says nothing of value about this demo project. ## Possible Solution Update Readme with: - Steps on how to install it - Steps on how to run it
non_priority
update readme expected behavior it should be helpful to developers who want to use it or modify it current behavior readme says nothing of value about this demo project possible solution update readme with steps on how to install it steps on how to run it
0
329,950
24,239,553,708
IssuesEvent
2022-09-27 04:51:10
easystats/easystats
https://api.github.com/repos/easystats/easystats
opened
Include reference to publication in `DESCRIPTION`
Core Packages :package: Documentation :books:
Of course, only if there is a publication corresponding to the package you are maintaining: [Like so](https://cran.r-project.org/web/packages/brms/index.html): <img width="679" alt="Screenshot 2022-09-27 at 06 48 15" src="https://user-images.githubusercontent.com/11330453/192434636-d97ae01c-f848-4f19-a1b8-3cb74e57efa8.png"> # Progress tracker - [ ] insight - [ ] bayestestR - [ ] effectsize - [ ] parameters - [ ] performance - [ ] correlation - [ ] see - [ ] datawizard
1.0
Include reference to publication in `DESCRIPTION` - Of course, only if there is a publication corresponding to the package you are maintaining: [Like so](https://cran.r-project.org/web/packages/brms/index.html): <img width="679" alt="Screenshot 2022-09-27 at 06 48 15" src="https://user-images.githubusercontent.com/11330453/192434636-d97ae01c-f848-4f19-a1b8-3cb74e57efa8.png"> # Progress tracker - [ ] insight - [ ] bayestestR - [ ] effectsize - [ ] parameters - [ ] performance - [ ] correlation - [ ] see - [ ] datawizard
non_priority
include reference to publication in description of course only if there is a publication corresponding to the package you are maintaining img width alt screenshot at src progress tracker insight bayestestr effectsize parameters performance correlation see datawizard
0
223,158
17,105,412,474
IssuesEvent
2021-07-09 16:55:27
thcheetah777/alien
https://api.github.com/repos/thcheetah777/alien
closed
Organize main files into folders
documentation help wanted no coding simple
## Steps: - [x] Organize world.js by scenes - [ ] Organize script.js by main scene class and config in another file
1.0
Organize main files into folders - ## Steps: - [x] Organize world.js by scenes - [ ] Organize script.js by main scene class and config in another file
non_priority
organize main files into folders steps organize world js by scenes organize script js by main scene class and config in another file
0
323,589
23,955,827,313
IssuesEvent
2022-09-12 14:53:19
tardis-sn/tardis
https://api.github.com/repos/tardis-sn/tardis
opened
Produce more in-depth documentation of the gamma-ray transport
documentation nebular
Gamma-ray transport needs more documentation to describe how it works and why it works as it does, ideally with paper references.
1.0
Produce more in-depth documentation of the gamma-ray transport - Gamma-ray transport needs more documentation to describe how it works and why it works as it does, ideally with paper references.
non_priority
produce more in depth documentation of the gamma ray transport gamma ray transport needs more documentation to describe how it works and why it works as it does ideally with paper references
0
81,016
7,763,367,051
IssuesEvent
2018-06-01 16:18:42
TheDMSGroup/mautic-extended-field
https://api.github.com/repos/TheDMSGroup/mautic-extended-field
closed
Installation prefix not implemented
bug needs testing
Hi guys, There is an option to create table prefix during Mautic installation . It seems your plugin does not support this and sql queries do not work properly (tables are missing) . I'm putting the error message we got: [2018-05-17 17:10:23] mautic.CRITICAL: Uncaught PHP Exception Doctrine\DBAL\Exception\TableNotFoundException: "An exception occurred while executing ' SELECT COUNT(l.id) as count FROM mtc_leads l LEFT JOIN mtc_users u ON u.id = l.owner_id LEFT JOIN lead_fields_leads_string_xref string129 ON (l.id = string129.lead_id) AND (string129.lead_field_id = 129)' : SQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist" at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/AbstractMySQLDriver.php line 53 {"exception":"[object] (Doctrine\\DBAL\\Exception\\TableNotFoundException(code: 0): An exception occurred while executing 'SELECT COUNT(l.id) as count FROM mtc_leads l LEFT JOIN mtc_users u ON u.id = l.owner_id LEFT JOIN lead_fields_leads_string_xref string129 ON (l.id = string129.lead_id) AND (string129.lead_field_id = 129)':\n\nSQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/AbstractMySQLDriver.php:53, Doctrine\\DBAL\\Driver\\PDOException(code: 42S02): SQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/PDOConnection.php:106, PDOException(code: 42S02): SQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/PDOConnection.php:104)"} [] Br - PS
1.0
Installation prefix not implemented - Hi guys, There is an option to create table prefix during Mautic installation . It seems your plugin does not support this and sql queries do not work properly (tables are missing) . I'm putting the error message we got: [2018-05-17 17:10:23] mautic.CRITICAL: Uncaught PHP Exception Doctrine\DBAL\Exception\TableNotFoundException: "An exception occurred while executing ' SELECT COUNT(l.id) as count FROM mtc_leads l LEFT JOIN mtc_users u ON u.id = l.owner_id LEFT JOIN lead_fields_leads_string_xref string129 ON (l.id = string129.lead_id) AND (string129.lead_field_id = 129)' : SQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist" at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/AbstractMySQLDriver.php line 53 {"exception":"[object] (Doctrine\\DBAL\\Exception\\TableNotFoundException(code: 0): An exception occurred while executing 'SELECT COUNT(l.id) as count FROM mtc_leads l LEFT JOIN mtc_users u ON u.id = l.owner_id LEFT JOIN lead_fields_leads_string_xref string129 ON (l.id = string129.lead_id) AND (string129.lead_field_id = 129)':\n\nSQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/AbstractMySQLDriver.php:53, Doctrine\\DBAL\\Driver\\PDOException(code: 42S02): SQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/PDOConnection.php:106, PDOException(code: 42S02): SQLSTATE[42S02]: Base table or view not found: 1146 Table 'mautic.lead_fields_leads_string_xref' doesn't exist at /home/webhosts/XLCD.com/html/mautic/vendor/doctrine/dbal/lib/Doctrine/DBAL/Driver/PDOConnection.php:104)"} [] Br - PS
non_priority
installation prefix not implemented hi guys there is an option to create table prefix during mautic installation it seems your plugin does not support this and sql queries do not work properly tables are missing i m putting the error message we got mautic critical uncaught php exception doctrine dbal exception tablenotfoundexception an exception occurred while executing select count l id as count from mtc leads l left join mtc users u on u id l owner id left join lead fields leads string xref on l id lead id and lead field id sqlstate base table or view not found table mautic lead fields leads string xref doesn t exist at home webhosts xlcd com html mautic vendor doctrine dbal lib doctrine dbal driver abstractmysqldriver php line exception doctrine dbal exception tablenotfoundexception code an exception occurred while executing select count l id as count from mtc leads l left join mtc users u on u id l owner id left join lead fields leads string xref on l id lead id and lead field id n nsqlstate base table or view not found table mautic lead fields leads string xref doesn t exist at home webhosts xlcd com html mautic vendor doctrine dbal lib doctrine dbal driver abstractmysqldriver php doctrine dbal driver pdoexception code sqlstate base table or view not found table mautic lead fields leads string xref doesn t exist at home webhosts xlcd com html mautic vendor doctrine dbal lib doctrine dbal driver pdoconnection php pdoexception code sqlstate base table or view not found table mautic lead fields leads string xref doesn t exist at home webhosts xlcd com html mautic vendor doctrine dbal lib doctrine dbal driver pdoconnection php br ps
0
44,640
23,719,805,948
IssuesEvent
2022-08-30 14:31:45
simdjson/simdjson
https://api.github.com/repos/simdjson/simdjson
opened
Optimize to_bitmask() for ARM
performance
The current to_bitmask() implementation in ARM is expensive. In simdutf, we reengineered the code to use a faster function... https://github.com/simdutf/simdutf/blob/c0cb6dddb12256a261bb249255660b79c1fe67a2/src/simdutf/arm64/simd.h#L210-L212 Reference: https://community.arm.com/arm-community-blogs/b/infrastructure-solutions-blog/posts/porting-x86-vector-bitmask-optimizations-to-arm-neon We should investigate this optimization. Credit to Nathan Kurz for the pointer.
True
Optimize to_bitmask() for ARM - The current to_bitmask() implementation in ARM is expensive. In simdutf, we reengineered the code to use a faster function... https://github.com/simdutf/simdutf/blob/c0cb6dddb12256a261bb249255660b79c1fe67a2/src/simdutf/arm64/simd.h#L210-L212 Reference: https://community.arm.com/arm-community-blogs/b/infrastructure-solutions-blog/posts/porting-x86-vector-bitmask-optimizations-to-arm-neon We should investigate this optimization. Credit to Nathan Kurz for the pointer.
non_priority
optimize to bitmask for arm the current to bitmask implementation in arm is expensive in simdutf we reengineered the code to use a faster function reference we should investigate this optimization credit to nathan kurz for the pointer
0
162,321
12,643,453,279
IssuesEvent
2020-06-16 09:50:01
jpmorganchase/nbcelltests
https://api.github.com/repos/jpmorganchase/nbcelltests
opened
Certain cell failures are not detected
bug cell tests
Inherited from nbval. E.g. test for bad magics is currently marked "known fail": https://github.com/jpmorganchase/nbcelltests/blob/f6d206118ee336efd74049ff8c72fd827be1c739/nbcelltests/tests/test_test.py#L475-L481 (note: typo in above method name - "does _not_") There might be other cases too, haven't investigated.
1.0
Certain cell failures are not detected - Inherited from nbval. E.g. test for bad magics is currently marked "known fail": https://github.com/jpmorganchase/nbcelltests/blob/f6d206118ee336efd74049ff8c72fd827be1c739/nbcelltests/tests/test_test.py#L475-L481 (note: typo in above method name - "does _not_") There might be other cases too, haven't investigated.
non_priority
certain cell failures are not detected inherited from nbval e g test for bad magics is currently marked known fail note typo in above method name does not there might be other cases too haven t investigated
0
90,297
18,106,355,277
IssuesEvent
2021-09-22 19:33:47
UBC-Thunderbots/Software
https://api.github.com/repos/UBC-Thunderbots/Software
closed
DynamicParameters: Separate const parameters from dynamic parameters
Difficulty - 7 Code Quality
### Description of the task Currently we have `c_params` which get generated from `constant` parameters in a config definition yaml file, and we have `cpp_params` that are generated from both `const` and `non-const` parameters in the yaml file. Marking a dynamic parameter as `const` is something that we realized will never happen, and it saves us a great deal of complexity if they were entirely separate concepts. This ticket involves separating all the `constant parameters` from the ` dynamic parameters` and having separate files for both. RFC of new parameter system for context: https://docs.google.com/document/d/1-QD8_7TZiq6CNRSMeSmyg0ChrSVfvxwt_e6eLqiqRDA/edit <!-- What does this work depend on? What interface will this work use or create? What are the main components of the task? Where does this work fit in the larger project? It is important to define this task sufficiently so that an untrained team member can take it on and know where to start. Feel free to link to resources or other team member which could guide the assignee to complete the task --> ### Acceptance criteria The goal of this ticket is to: <!-- Checkbox list that outlines what needs to be done in order for this task to be considered "complete". Specify any implementation requirements such as data structures, functionalities, testing requirements, documentation, etc. --> - [ ] Pull out all `const` parameters into their own seperate files, so each config yaml only exclusively has dynamic parameters, or const parameters, never both. - [ ] Figure out folder/file structure for const vs dynamic parameters (i.e how do we know a config file contains const parameters or dynamic parameters) - [ ] Update the schema to reject `const` keyword (should be implicit from point above, which file is const and which file dynamic) - [ ] Rename `c_params` to `constant_parameters` and `cpp_parameters` to `dynamic_parameters` ### Blocked By #1298 <!-- List all other issues that need to be completed before this one, ex: - #123 - #374 -->
1.0
DynamicParameters: Separate const parameters from dynamic parameters - ### Description of the task Currently we have `c_params` which get generated from `constant` parameters in a config definition yaml file, and we have `cpp_params` that are generated from both `const` and `non-const` parameters in the yaml file. Marking a dynamic parameter as `const` is something that we realized will never happen, and it saves us a great deal of complexity if they were entirely separate concepts. This ticket involves separating all the `constant parameters` from the ` dynamic parameters` and having separate files for both. RFC of new parameter system for context: https://docs.google.com/document/d/1-QD8_7TZiq6CNRSMeSmyg0ChrSVfvxwt_e6eLqiqRDA/edit <!-- What does this work depend on? What interface will this work use or create? What are the main components of the task? Where does this work fit in the larger project? It is important to define this task sufficiently so that an untrained team member can take it on and know where to start. Feel free to link to resources or other team member which could guide the assignee to complete the task --> ### Acceptance criteria The goal of this ticket is to: <!-- Checkbox list that outlines what needs to be done in order for this task to be considered "complete". Specify any implementation requirements such as data structures, functionalities, testing requirements, documentation, etc. --> - [ ] Pull out all `const` parameters into their own seperate files, so each config yaml only exclusively has dynamic parameters, or const parameters, never both. - [ ] Figure out folder/file structure for const vs dynamic parameters (i.e how do we know a config file contains const parameters or dynamic parameters) - [ ] Update the schema to reject `const` keyword (should be implicit from point above, which file is const and which file dynamic) - [ ] Rename `c_params` to `constant_parameters` and `cpp_parameters` to `dynamic_parameters` ### Blocked By #1298 <!-- List all other issues that need to be completed before this one, ex: - #123 - #374 -->
non_priority
dynamicparameters separate const parameters from dynamic parameters description of the task currently we have c params which get generated from constant parameters in a config definition yaml file and we have cpp params that are generated from both const and non const parameters in the yaml file marking a dynamic parameter as const is something that we realized will never happen and it saves us a great deal of complexity if they were entirely separate concepts this ticket involves separating all the constant parameters from the dynamic parameters and having separate files for both rfc of new parameter system for context what does this work depend on what interface will this work use or create what are the main components of the task where does this work fit in the larger project it is important to define this task sufficiently so that an untrained team member can take it on and know where to start feel free to link to resources or other team member which could guide the assignee to complete the task acceptance criteria the goal of this ticket is to checkbox list that outlines what needs to be done in order for this task to be considered complete specify any implementation requirements such as data structures functionalities testing requirements documentation etc pull out all const parameters into their own seperate files so each config yaml only exclusively has dynamic parameters or const parameters never both figure out folder file structure for const vs dynamic parameters i e how do we know a config file contains const parameters or dynamic parameters update the schema to reject const keyword should be implicit from point above which file is const and which file dynamic rename c params to constant parameters and cpp parameters to dynamic parameters blocked by list all other issues that need to be completed before this one ex
0
63,032
12,278,520,118
IssuesEvent
2020-05-08 10:08:16
fac19/snake
https://api.github.com/repos/fac19/snake
opened
Good place for an explanatory comment?
code review documentation
The onKeyDown function is really interesting - I notice you plan to mention it in the presentation, which I'm looking forward to because tbh I don't get it. It might also be good to include an explanatory comment for yourself six months down the line.
1.0
Good place for an explanatory comment? - The onKeyDown function is really interesting - I notice you plan to mention it in the presentation, which I'm looking forward to because tbh I don't get it. It might also be good to include an explanatory comment for yourself six months down the line.
non_priority
good place for an explanatory comment the onkeydown function is really interesting i notice you plan to mention it in the presentation which i m looking forward to because tbh i don t get it it might also be good to include an explanatory comment for yourself six months down the line
0
209,305
16,190,527,729
IssuesEvent
2021-05-04 07:49:06
pmndrs/react-spring.io
https://api.github.com/repos/pmndrs/react-spring.io
closed
Add some guides
documentation enhancement help wanted
Everyone is encouraged to help out with these tasks: - [ ] Add a "guide directory" page - [ ] Write a short guide for getting started with each target platform (eg: web, zdog, three) - [ ] Convert solved questions from https://github.com/react-spring/react-spring/issues into guided implementations - [ ] Write a short guide about how you fixed a broken animation while learning `react-spring` It would be great if the guides used [`react-live`](https://github.com/FormidableLabs/react-live)!
1.0
Add some guides - Everyone is encouraged to help out with these tasks: - [ ] Add a "guide directory" page - [ ] Write a short guide for getting started with each target platform (eg: web, zdog, three) - [ ] Convert solved questions from https://github.com/react-spring/react-spring/issues into guided implementations - [ ] Write a short guide about how you fixed a broken animation while learning `react-spring` It would be great if the guides used [`react-live`](https://github.com/FormidableLabs/react-live)!
non_priority
add some guides everyone is encouraged to help out with these tasks add a guide directory page write a short guide for getting started with each target platform eg web zdog three convert solved questions from into guided implementations write a short guide about how you fixed a broken animation while learning react spring it would be great if the guides used
0
100,193
12,508,382,180
IssuesEvent
2020-06-02 15:28:33
revelry-foundation/nightingale
https://api.github.com/repos/revelry-foundation/nightingale
opened
Landing Page - Hero Image - Stock Purchase
@done approve @done write @skipped estimate design
## Background We're using an image from Getty for the hero of the landing page, that seems to meet with everyone's approval. (see attachment below) We need to purchase this prior to launch. Pricing is below. Recommended resolution is the MEDIUM size. <img width="350" alt="Screen Shot 2020-06-02 at 10 27 44" src="https://user-images.githubusercontent.com/45366606/83538707-c63dcd00-a4bb-11ea-99af-0f2c0961f21f.png"> ## Scenario: Homepage Hero Stock Photo Given I am someone with the financial authority to make the decision, - [ ] When I pick up this ticket, - [ ] Then I purchase the image at the recommended resolution, - [ ] And I upload the original file to [the project GDrive folder](https://drive.google.com/open?id=1g5I0ZstVfwZM4dBLOR-dfJsU9TwXpHyO), - [ ] And I let @westonmcwhorter and @vegasgeek know that I have done so.
1.0
Landing Page - Hero Image - Stock Purchase - ## Background We're using an image from Getty for the hero of the landing page, that seems to meet with everyone's approval. (see attachment below) We need to purchase this prior to launch. Pricing is below. Recommended resolution is the MEDIUM size. <img width="350" alt="Screen Shot 2020-06-02 at 10 27 44" src="https://user-images.githubusercontent.com/45366606/83538707-c63dcd00-a4bb-11ea-99af-0f2c0961f21f.png"> ## Scenario: Homepage Hero Stock Photo Given I am someone with the financial authority to make the decision, - [ ] When I pick up this ticket, - [ ] Then I purchase the image at the recommended resolution, - [ ] And I upload the original file to [the project GDrive folder](https://drive.google.com/open?id=1g5I0ZstVfwZM4dBLOR-dfJsU9TwXpHyO), - [ ] And I let @westonmcwhorter and @vegasgeek know that I have done so.
non_priority
landing page hero image stock purchase background we re using an image from getty for the hero of the landing page that seems to meet with everyone s approval see attachment below we need to purchase this prior to launch pricing is below recommended resolution is the medium size img width alt screen shot at src scenario homepage hero stock photo given i am someone with the financial authority to make the decision when i pick up this ticket then i purchase the image at the recommended resolution and i upload the original file to and i let westonmcwhorter and vegasgeek know that i have done so
0
81,776
10,179,859,877
IssuesEvent
2019-08-09 08:52:11
LiskHQ/lisk-hub
https://api.github.com/repos/LiskHQ/lisk-hub
closed
Align app loader animation to design
Unplanned severity: medium stretch goals type: design
## Current behaviour App loading screen (the one before splash screen) was not updated to the latest design ![Screenshot 2019-08-02 at 11 25 23](https://user-images.githubusercontent.com/1254342/62360078-603d8d80-b518-11e9-818c-7e85b87432b7.png) ## Expected behaviour App loading screen should be updated to the latest design provided by design team. The animation should be something like https://codepen.io/kenchen/pen/tgBiE
1.0
Align app loader animation to design - ## Current behaviour App loading screen (the one before splash screen) was not updated to the latest design ![Screenshot 2019-08-02 at 11 25 23](https://user-images.githubusercontent.com/1254342/62360078-603d8d80-b518-11e9-818c-7e85b87432b7.png) ## Expected behaviour App loading screen should be updated to the latest design provided by design team. The animation should be something like https://codepen.io/kenchen/pen/tgBiE
non_priority
align app loader animation to design current behaviour app loading screen the one before splash screen was not updated to the latest design expected behaviour app loading screen should be updated to the latest design provided by design team the animation should be something like
0
249,321
26,911,338,134
IssuesEvent
2023-02-07 00:12:20
Enterprise-CMCS/macpro-appian-connector
https://api.github.com/repos/Enterprise-CMCS/macpro-appian-connector
closed
SecurityHub Finding - SNS.1 SNS topics should be encrypted at-rest using AWS KMS
security-hub us-east-1 MEDIUM master
************************************************************** __This issue was generated from Security Hub data and is managed through automation.__ Please do not edit the title or body of this issue, or remove the security-hub tag. All other edits/comments are welcome. Finding Title: SNS.1 SNS topics should be encrypted at-rest using AWS KMS ************************************************************** ## Type of Issue: - [x] Security Hub Finding ## Title: SNS.1 SNS topics should be encrypted at-rest using AWS KMS ## Description This control checks whether an Amazon SNS topic is encrypted at rest using AWS KMS. ## Remediation https://docs.aws.amazon.com/console/securityhub/SNS.1/remediation For directions on how to fix this issue, consult the AWS Security Hub Foundational Security Best Practices documentation. ## AC: - All findings of this type are resolved or suppressed, indicated by a Workflow Status of Resolved or Suppressed. (Note: this ticket will automatically close when the AC is met.)
True
SecurityHub Finding - SNS.1 SNS topics should be encrypted at-rest using AWS KMS - ************************************************************** __This issue was generated from Security Hub data and is managed through automation.__ Please do not edit the title or body of this issue, or remove the security-hub tag. All other edits/comments are welcome. Finding Title: SNS.1 SNS topics should be encrypted at-rest using AWS KMS ************************************************************** ## Type of Issue: - [x] Security Hub Finding ## Title: SNS.1 SNS topics should be encrypted at-rest using AWS KMS ## Description This control checks whether an Amazon SNS topic is encrypted at rest using AWS KMS. ## Remediation https://docs.aws.amazon.com/console/securityhub/SNS.1/remediation For directions on how to fix this issue, consult the AWS Security Hub Foundational Security Best Practices documentation. ## AC: - All findings of this type are resolved or suppressed, indicated by a Workflow Status of Resolved or Suppressed. (Note: this ticket will automatically close when the AC is met.)
non_priority
securityhub finding sns sns topics should be encrypted at rest using aws kms this issue was generated from security hub data and is managed through automation please do not edit the title or body of this issue or remove the security hub tag all other edits comments are welcome finding title sns sns topics should be encrypted at rest using aws kms type of issue security hub finding title sns sns topics should be encrypted at rest using aws kms description this control checks whether an amazon sns topic is encrypted at rest using aws kms remediation for directions on how to fix this issue consult the aws security hub foundational security best practices documentation ac all findings of this type are resolved or suppressed indicated by a workflow status of resolved or suppressed note this ticket will automatically close when the ac is met
0
111,436
14,079,628,442
IssuesEvent
2020-11-04 15:06:50
laurent22/joplin
https://api.github.com/repos/laurent22/joplin
closed
Markdown export, exports also name of Note - Makes it non MD compliant
as designed
## Environment Joplin version: Joplin for Desktop Copyright © 2016-2020 Laurent Cozic Joplin 1.2.6 (prod, win32) Client ID: 92e2017594e141ffb762ac52e679bb96 Sync Version: 2 Profile Version: 34 Keychain Supported: Yes Revision: f5f117cb (master) Platform: Windows 10 - 10.0.18363.0 OS specifics: ## Steps to reproduce 1. Create a new note and save it 2. press File -> Export all -> MD Markdown 3. The output includes the note name as the first list of the file. <!-- Issues without reproduction steps are likely to stall. --> ## Describe what you expected to happen I would expect that the note name in the markdown file either is: a. Not in the export at all b. Always exported as H1 in top of the file ## Logfile <!-- Please attach a debug log. Issues without a debug log are likely to stall. For information on how to collect a log file: https://joplinapp.org/debugging/ -->
1.0
Markdown export, exports also name of Note - Makes it non MD compliant - ## Environment Joplin version: Joplin for Desktop Copyright © 2016-2020 Laurent Cozic Joplin 1.2.6 (prod, win32) Client ID: 92e2017594e141ffb762ac52e679bb96 Sync Version: 2 Profile Version: 34 Keychain Supported: Yes Revision: f5f117cb (master) Platform: Windows 10 - 10.0.18363.0 OS specifics: ## Steps to reproduce 1. Create a new note and save it 2. press File -> Export all -> MD Markdown 3. The output includes the note name as the first list of the file. <!-- Issues without reproduction steps are likely to stall. --> ## Describe what you expected to happen I would expect that the note name in the markdown file either is: a. Not in the export at all b. Always exported as H1 in top of the file ## Logfile <!-- Please attach a debug log. Issues without a debug log are likely to stall. For information on how to collect a log file: https://joplinapp.org/debugging/ -->
non_priority
markdown export exports also name of note makes it non md compliant environment joplin version joplin for desktop copyright © laurent cozic joplin prod client id sync version profile version keychain supported yes revision master platform windows os specifics steps to reproduce create a new note and save it press file export all md markdown the output includes the note name as the first list of the file issues without reproduction steps are likely to stall describe what you expected to happen i would expect that the note name in the markdown file either is a not in the export at all b always exported as in top of the file logfile please attach a debug log issues without a debug log are likely to stall for information on how to collect a log file
0
357,999
25,176,598,749
IssuesEvent
2022-11-11 09:49:03
jeyvia/pe
https://api.github.com/repos/jeyvia/pe
opened
DG Design & Implementation missing documentations
severity.High type.DocumentationBug
Design & Implementation only includes: 1. Save/Withdraw/Deposite feature 2. Add/Remove personal currency feature It is missing: 1. Account feature 2. List feature 3. Transfer feature 4. Info about currencies feature 5. Currency conversion feature 6. balance feature 7. help feature and many more features that lack both the documentation and diagrams to aid developers' understanding. <!--session: 1668153587820-285a8579-6045-4dce-b5bb-f6e6da1d6dfd--> <!--Version: Web v3.4.4-->
1.0
DG Design & Implementation missing documentations - Design & Implementation only includes: 1. Save/Withdraw/Deposite feature 2. Add/Remove personal currency feature It is missing: 1. Account feature 2. List feature 3. Transfer feature 4. Info about currencies feature 5. Currency conversion feature 6. balance feature 7. help feature and many more features that lack both the documentation and diagrams to aid developers' understanding. <!--session: 1668153587820-285a8579-6045-4dce-b5bb-f6e6da1d6dfd--> <!--Version: Web v3.4.4-->
non_priority
dg design implementation missing documentations design implementation only includes save withdraw deposite feature add remove personal currency feature it is missing account feature list feature transfer feature info about currencies feature currency conversion feature balance feature help feature and many more features that lack both the documentation and diagrams to aid developers understanding
0
184,260
21,784,841,544
IssuesEvent
2022-05-14 01:30:56
Thezone1975/tabliss
https://api.github.com/repos/Thezone1975/tabliss
closed
WS-2020-0218 (High) detected in merge-1.2.0.tgz - autoclosed
security vulnerability
## WS-2020-0218 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-1.2.0.tgz</b></p></summary> <p>Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge/-/merge-1.2.0.tgz">https://registry.npmjs.org/merge/-/merge-1.2.0.tgz</a></p> <p>Path to dependency file: /tabliss/package.json</p> <p>Path to vulnerable library: tabliss/node_modules/merge/package.json</p> <p> Dependency Hierarchy: - jest-23.1.0.tgz (Root Library) - jest-cli-23.6.0.tgz - jest-haste-map-23.6.0.tgz - sane-2.5.2.tgz - exec-sh-0.2.1.tgz - :x: **merge-1.2.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Prototype Pollution vulnerability was found in merge before 2.1.0 via the merge.recursive function. It can be tricked into adding or modifying properties of the Object prototype. These properties will be present on all objects. <p>Publish Date: 2020-10-09 <p>URL: <a href=https://github.com/yeikos/js.merge/pull/38>WS-2020-0218</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/yeikos/js.merge/pull/38">https://github.com/yeikos/js.merge/pull/38</a></p> <p>Release Date: 2020-10-09</p> <p>Fix Resolution: merge - 2.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2020-0218 (High) detected in merge-1.2.0.tgz - autoclosed - ## WS-2020-0218 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>merge-1.2.0.tgz</b></p></summary> <p>Merge multiple objects into one, optionally creating a new cloned object. Similar to the jQuery.extend but more flexible. Works in Node.js and the browser.</p> <p>Library home page: <a href="https://registry.npmjs.org/merge/-/merge-1.2.0.tgz">https://registry.npmjs.org/merge/-/merge-1.2.0.tgz</a></p> <p>Path to dependency file: /tabliss/package.json</p> <p>Path to vulnerable library: tabliss/node_modules/merge/package.json</p> <p> Dependency Hierarchy: - jest-23.1.0.tgz (Root Library) - jest-cli-23.6.0.tgz - jest-haste-map-23.6.0.tgz - sane-2.5.2.tgz - exec-sh-0.2.1.tgz - :x: **merge-1.2.0.tgz** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A Prototype Pollution vulnerability was found in merge before 2.1.0 via the merge.recursive function. It can be tricked into adding or modifying properties of the Object prototype. These properties will be present on all objects. <p>Publish Date: 2020-10-09 <p>URL: <a href=https://github.com/yeikos/js.merge/pull/38>WS-2020-0218</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/yeikos/js.merge/pull/38">https://github.com/yeikos/js.merge/pull/38</a></p> <p>Release Date: 2020-10-09</p> <p>Fix Resolution: merge - 2.1.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in merge tgz autoclosed ws high severity vulnerability vulnerable library merge tgz merge multiple objects into one optionally creating a new cloned object similar to the jquery extend but more flexible works in node js and the browser library home page a href path to dependency file tabliss package json path to vulnerable library tabliss node modules merge package json dependency hierarchy jest tgz root library jest cli tgz jest haste map tgz sane tgz exec sh tgz x merge tgz vulnerable library vulnerability details a prototype pollution vulnerability was found in merge before via the merge recursive function it can be tricked into adding or modifying properties of the object prototype these properties will be present on all objects publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution merge step up your open source security game with whitesource
0
256,849
19,473,291,678
IssuesEvent
2021-12-24 07:09:55
appsmithorg/appsmith
https://api.github.com/repos/appsmithorg/appsmith
opened
Missing Document Viewer widget documentation
Documentation
@Pranay105 added the documentation for the document viewer widget here. https://www.notion.so/appsmith/Document-Viewer-1a36c9ff38b3440eb3d47ac41341bd90 Please review this and let me know
1.0
Missing Document Viewer widget documentation - @Pranay105 added the documentation for the document viewer widget here. https://www.notion.so/appsmith/Document-Viewer-1a36c9ff38b3440eb3d47ac41341bd90 Please review this and let me know
non_priority
missing document viewer widget documentation added the documentation for the document viewer widget here please review this and let me know
0
104,756
9,008,205,469
IssuesEvent
2019-02-05 02:36:03
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
closed
roachtest: synctest failed
C-test-failure O-robot
SHA: https://github.com/cockroachdb/cockroach/commits/407932a95f3ad53d61481e5a7493fc4ed468faa9 Parameters: To repro, try: ``` # Don't forget to check out a clean suitable branch and experiment with the # stress invocation until the desired results present themselves. For example, # using stress instead of stressrace and passing the '-p' stressflag which # controls concurrency. ./scripts/gceworker.sh start && ./scripts/gceworker.sh mosh cd ~/go/src/github.com/cockroachdb/cockroach && \ stdbuf -oL -eL \ make stressrace TESTS=synctest PKG=roachtest TESTTIMEOUT=5m STRESSFLAGS='-maxtime 20m -timeout 10m' 2>&1 | tee /tmp/stress.log ``` Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=1117776&tab=buildLog ``` The test failed on master: test.go:743,cluster.go:1226,synctest.go:64: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-1117776-synctest:1 -- sudo charybdefs {store-dir}/faulty -oallow_other,modules=subdir,subdir={store-dir}/real && chmod 777 {store-dir}/{real,faulty} returned: stderr: stdout: sudo: charybdefs: command not found Error: exit status 1 : exit status 1 ```
1.0
roachtest: synctest failed - SHA: https://github.com/cockroachdb/cockroach/commits/407932a95f3ad53d61481e5a7493fc4ed468faa9 Parameters: To repro, try: ``` # Don't forget to check out a clean suitable branch and experiment with the # stress invocation until the desired results present themselves. For example, # using stress instead of stressrace and passing the '-p' stressflag which # controls concurrency. ./scripts/gceworker.sh start && ./scripts/gceworker.sh mosh cd ~/go/src/github.com/cockroachdb/cockroach && \ stdbuf -oL -eL \ make stressrace TESTS=synctest PKG=roachtest TESTTIMEOUT=5m STRESSFLAGS='-maxtime 20m -timeout 10m' 2>&1 | tee /tmp/stress.log ``` Failed test: https://teamcity.cockroachdb.com/viewLog.html?buildId=1117776&tab=buildLog ``` The test failed on master: test.go:743,cluster.go:1226,synctest.go:64: /home/agent/work/.go/src/github.com/cockroachdb/cockroach/bin/roachprod run teamcity-1117776-synctest:1 -- sudo charybdefs {store-dir}/faulty -oallow_other,modules=subdir,subdir={store-dir}/real && chmod 777 {store-dir}/{real,faulty} returned: stderr: stdout: sudo: charybdefs: command not found Error: exit status 1 : exit status 1 ```
non_priority
roachtest synctest failed sha parameters to repro try don t forget to check out a clean suitable branch and experiment with the stress invocation until the desired results present themselves for example using stress instead of stressrace and passing the p stressflag which controls concurrency scripts gceworker sh start scripts gceworker sh mosh cd go src github com cockroachdb cockroach stdbuf ol el make stressrace tests synctest pkg roachtest testtimeout stressflags maxtime timeout tee tmp stress log failed test the test failed on master test go cluster go synctest go home agent work go src github com cockroachdb cockroach bin roachprod run teamcity synctest sudo charybdefs store dir faulty oallow other modules subdir subdir store dir real chmod store dir real faulty returned stderr stdout sudo charybdefs command not found error exit status exit status
0
55,219
13,994,746,644
IssuesEvent
2020-10-28 01:30:43
GooseWSS/apollo
https://api.github.com/repos/GooseWSS/apollo
opened
CVE-2019-6286 (Medium) detected in node-sass-4.14.1.tgz, node-sassv4.13.1
security vulnerability
## CVE-2019-6286 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b>, <b>node-sassv4.13.1</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: apollo/modules/dreamview/frontend/package.json</p> <p>Path to vulnerable library: apollo/modules/dreamview/frontend/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/GooseWSS/apollo/commit/3daafad25ab3c7a29a0227f78bfc97114f368242">3daafad25ab3c7a29a0227f78bfc97114f368242</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693. <p>Publish Date: 2019-01-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6286>CVE-2019-6286</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6286">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6286</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.14.1","isTransitiveDependency":false,"dependencyTree":"node-sass:4.14.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"LibSass - 3.6.0"}],"vulnerabilityIdentifier":"CVE-2019-6286","vulnerabilityDetails":"In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6286","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2019-6286 (Medium) detected in node-sass-4.14.1.tgz, node-sassv4.13.1 - ## CVE-2019-6286 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-sass-4.14.1.tgz</b>, <b>node-sassv4.13.1</b></p></summary> <p> <details><summary><b>node-sass-4.14.1.tgz</b></p></summary> <p>Wrapper around libsass</p> <p>Library home page: <a href="https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz">https://registry.npmjs.org/node-sass/-/node-sass-4.14.1.tgz</a></p> <p>Path to dependency file: apollo/modules/dreamview/frontend/package.json</p> <p>Path to vulnerable library: apollo/modules/dreamview/frontend/node_modules/node-sass/package.json</p> <p> Dependency Hierarchy: - :x: **node-sass-4.14.1.tgz** (Vulnerable Library) </details> <p>Found in HEAD commit: <a href="https://github.com/GooseWSS/apollo/commit/3daafad25ab3c7a29a0227f78bfc97114f368242">3daafad25ab3c7a29a0227f78bfc97114f368242</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693. <p>Publish Date: 2019-01-14 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6286>CVE-2019-6286</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6286">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6286</a></p> <p>Release Date: 2019-08-06</p> <p>Fix Resolution: LibSass - 3.6.0</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"node-sass","packageVersion":"4.14.1","isTransitiveDependency":false,"dependencyTree":"node-sass:4.14.1","isMinimumFixVersionAvailable":true,"minimumFixVersion":"LibSass - 3.6.0"}],"vulnerabilityIdentifier":"CVE-2019-6286","vulnerabilityDetails":"In LibSass 3.5.5, a heap-based buffer over-read exists in Sass::Prelexer::skip_over_scopes in prelexer.hpp when called from Sass::Parser::parse_import(), a similar issue to CVE-2018-11693.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-6286","cvss3Severity":"medium","cvss3Score":"6.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"Required","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve medium detected in node sass tgz node cve medium severity vulnerability vulnerable libraries node sass tgz node node sass tgz wrapper around libsass library home page a href path to dependency file apollo modules dreamview frontend package json path to vulnerable library apollo modules dreamview frontend node modules node sass package json dependency hierarchy x node sass tgz vulnerable library found in head commit a href found in base branch master vulnerability details in libsass a heap based buffer over read exists in sass prelexer skip over scopes in prelexer hpp when called from sass parser parse import a similar issue to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution libsass rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails in libsass a heap based buffer over read exists in sass prelexer skip over scopes in prelexer hpp when called from sass parser parse import a similar issue to cve vulnerabilityurl
0
367,812
25,763,443,472
IssuesEvent
2022-12-08 22:49:50
mlte-team/mlte
https://api.github.com/repos/mlte-team/mlte
opened
Develop a Roadmap for Integrations
documentation question
We want to expand MLTE to integrate with various third-party libraries for ML. We should develop a roadmap for integration that prioritizes specific functionality in specific libraries.
1.0
Develop a Roadmap for Integrations - We want to expand MLTE to integrate with various third-party libraries for ML. We should develop a roadmap for integration that prioritizes specific functionality in specific libraries.
non_priority
develop a roadmap for integrations we want to expand mlte to integrate with various third party libraries for ml we should develop a roadmap for integration that prioritizes specific functionality in specific libraries
0
42,612
11,171,239,272
IssuesEvent
2019-12-28 18:01:38
markstory/asset_compress
https://api.github.com/repos/markstory/asset_compress
closed
build command throws error with CakePHP 4.0.0
defect
see https://travis-ci.org/foodcoopshop/foodcoopshop/jobs/629496999 `$ bin/cake asset_compress build` Exception: Too few arguments to function Cake\Console\Shell::out(), 0 passed in /home/travis/build/foodcoopshop/foodcoopshop/vendor/markstory/asset_compress/src/Shell/AssetCompressShell.php on line 51 and at least 1 expected In [/home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/Shell.php, line 709] 2019-12-26 00:16:17 Error: [ArgumentCountError] Too few arguments to function Cake\Console\Shell::out(), 0 passed in /home/travis/build/foodcoopshop/foodcoopshop/vendor/markstory/asset_compress/src/Shell/AssetCompressShell.php on line 51 and at least 1 expected in /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/Shell.php on line 709 Stack Trace: - /home/travis/build/foodcoopshop/foodcoopshop/vendor/markstory/asset_compress/src/Shell/AssetCompressShell.php:51 - /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/Shell.php:500 - /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/CommandRunner.php:354 - /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/CommandRunner.php:168 - /home/travis/build/foodcoopshop/foodcoopshop/bin/cake.php:12
1.0
build command throws error with CakePHP 4.0.0 - see https://travis-ci.org/foodcoopshop/foodcoopshop/jobs/629496999 `$ bin/cake asset_compress build` Exception: Too few arguments to function Cake\Console\Shell::out(), 0 passed in /home/travis/build/foodcoopshop/foodcoopshop/vendor/markstory/asset_compress/src/Shell/AssetCompressShell.php on line 51 and at least 1 expected In [/home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/Shell.php, line 709] 2019-12-26 00:16:17 Error: [ArgumentCountError] Too few arguments to function Cake\Console\Shell::out(), 0 passed in /home/travis/build/foodcoopshop/foodcoopshop/vendor/markstory/asset_compress/src/Shell/AssetCompressShell.php on line 51 and at least 1 expected in /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/Shell.php on line 709 Stack Trace: - /home/travis/build/foodcoopshop/foodcoopshop/vendor/markstory/asset_compress/src/Shell/AssetCompressShell.php:51 - /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/Shell.php:500 - /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/CommandRunner.php:354 - /home/travis/build/foodcoopshop/foodcoopshop/vendor/cakephp/cakephp/src/Console/CommandRunner.php:168 - /home/travis/build/foodcoopshop/foodcoopshop/bin/cake.php:12
non_priority
build command throws error with cakephp see bin cake asset compress build exception too few arguments to function cake console shell out passed in home travis build foodcoopshop foodcoopshop vendor markstory asset compress src shell assetcompressshell php on line and at least expected in error too few arguments to function cake console shell out passed in home travis build foodcoopshop foodcoopshop vendor markstory asset compress src shell assetcompressshell php on line and at least expected in home travis build foodcoopshop foodcoopshop vendor cakephp cakephp src console shell php on line stack trace home travis build foodcoopshop foodcoopshop vendor markstory asset compress src shell assetcompressshell php home travis build foodcoopshop foodcoopshop vendor cakephp cakephp src console shell php home travis build foodcoopshop foodcoopshop vendor cakephp cakephp src console commandrunner php home travis build foodcoopshop foodcoopshop vendor cakephp cakephp src console commandrunner php home travis build foodcoopshop foodcoopshop bin cake php
0
192,680
14,625,874,810
IssuesEvent
2020-12-23 09:20:54
eclipse/che
https://api.github.com/repos/eclipse/che
closed
Git SSH flow E2E UI tests failed on 'Generate a SSH key' step
area/qe e2e-test/failure kind/bug severity/P1
### Describe the bug Git SSH flow E2E UI tests failed on 'Generate a SSH key' step because workspace wasn't ready at the time: https://codeready-workspaces-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/basic-MultiUser-Che-check-e2e-tests-against-k8s/2343/ ``` ▼ TopMenu.selectOption "View" ▼ TopMenu.clickOnTopMenuButton "View" ▼ Ide.closeAllNotifications ▼ NotificationCenter.open ▼ NotificationCenter.clickIconOnStatusBar ▼ NotificationCenter.waitOpening ▼ NotificationCenter.closeAll ▼ NotificationCenter.clickCloseAllNotificationsButton ▼ NotificationCenter.waitClearNotificationsList ▼ TopMenu.clickOnSubmenuItem "Find Command..." ▼ QuickOpenContainer.typeAndSelectSuggestion ▼ QuickOpenContainer.clickOnContainerItem "SSH: generate key pair..." ▼ QuickOpenContainer.waitContainer 1) Generate a SSH key 1 passing (1m) 1 failing 1) Git with ssh workflow Generate a SSH key: TimeoutError: Exceeded maximum clicking attempts, the 'By(css selector, div[aria-label="SSH: generate key pair..., picker"])' element is not clickable at DriverHelper.waitAndClick (/tmp/e2e/utils/DriverHelper.ts:291:15) at <anonymous> at process._tickCallback (internal/process/next_tick.js:188:7) ``` ### Che version <!-- (if workspace is running, version can be obtained with help/about menu) --> - [ ] latest - [x] nightly - [ ] other: please specify ### Steps to reproduce Tests scenario https://github.com/eclipse/che/blob/master/tests/e2e/tests/e2e/GitSsh.spec.ts ### Expected behavior <!-- A clear and concise description of what you expected to happen. --> ### Runtime - [ ] kubernetes (include output of `kubectl version`) - [ ] Openshift (include output of `oc version`) - [x] minikube (include output of `minikube version` and `kubectl version`) - [ ] minishift (include output of `minishift version` and `oc version`) - [ ] docker-desktop + K8S (include output of `docker version` and `kubectl version`) - [ ] other: (please specify) ### Screenshots ![Screenshot from 2020-10-07 10-13-29](https://user-images.githubusercontent.com/1197777/95299167-eaeceb80-0885-11eb-83db-a3e60076e0ef.png) ### Screencast https://youtu.be/hsII-Al_-Ys ### Installation method - [x] chectl * provide a full command that was used to deploy Eclipse Che (including the output) * provide an output of `chectl version` command - [ ] OperatorHub - [ ] I don't know ### Environment - [ ] my computer - [ ] Windows - [ ] Linux - [ ] macOS - [ ] Cloud - [ ] Amazon - [ ] Azure - [ ] GCE - [ ] other (please specify) - [ ] other: please specify ### Eclipse Che Logs <!-- https://www.eclipse.org/che/docs/che-7/collecting-logs-using-chectl --> ### Additional context <!-- Add any other context about the problem here. -->
1.0
Git SSH flow E2E UI tests failed on 'Generate a SSH key' step - ### Describe the bug Git SSH flow E2E UI tests failed on 'Generate a SSH key' step because workspace wasn't ready at the time: https://codeready-workspaces-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/basic-MultiUser-Che-check-e2e-tests-against-k8s/2343/ ``` ▼ TopMenu.selectOption "View" ▼ TopMenu.clickOnTopMenuButton "View" ▼ Ide.closeAllNotifications ▼ NotificationCenter.open ▼ NotificationCenter.clickIconOnStatusBar ▼ NotificationCenter.waitOpening ▼ NotificationCenter.closeAll ▼ NotificationCenter.clickCloseAllNotificationsButton ▼ NotificationCenter.waitClearNotificationsList ▼ TopMenu.clickOnSubmenuItem "Find Command..." ▼ QuickOpenContainer.typeAndSelectSuggestion ▼ QuickOpenContainer.clickOnContainerItem "SSH: generate key pair..." ▼ QuickOpenContainer.waitContainer 1) Generate a SSH key 1 passing (1m) 1 failing 1) Git with ssh workflow Generate a SSH key: TimeoutError: Exceeded maximum clicking attempts, the 'By(css selector, div[aria-label="SSH: generate key pair..., picker"])' element is not clickable at DriverHelper.waitAndClick (/tmp/e2e/utils/DriverHelper.ts:291:15) at <anonymous> at process._tickCallback (internal/process/next_tick.js:188:7) ``` ### Che version <!-- (if workspace is running, version can be obtained with help/about menu) --> - [ ] latest - [x] nightly - [ ] other: please specify ### Steps to reproduce Tests scenario https://github.com/eclipse/che/blob/master/tests/e2e/tests/e2e/GitSsh.spec.ts ### Expected behavior <!-- A clear and concise description of what you expected to happen. --> ### Runtime - [ ] kubernetes (include output of `kubectl version`) - [ ] Openshift (include output of `oc version`) - [x] minikube (include output of `minikube version` and `kubectl version`) - [ ] minishift (include output of `minishift version` and `oc version`) - [ ] docker-desktop + K8S (include output of `docker version` and `kubectl version`) - [ ] other: (please specify) ### Screenshots ![Screenshot from 2020-10-07 10-13-29](https://user-images.githubusercontent.com/1197777/95299167-eaeceb80-0885-11eb-83db-a3e60076e0ef.png) ### Screencast https://youtu.be/hsII-Al_-Ys ### Installation method - [x] chectl * provide a full command that was used to deploy Eclipse Che (including the output) * provide an output of `chectl version` command - [ ] OperatorHub - [ ] I don't know ### Environment - [ ] my computer - [ ] Windows - [ ] Linux - [ ] macOS - [ ] Cloud - [ ] Amazon - [ ] Azure - [ ] GCE - [ ] other (please specify) - [ ] other: please specify ### Eclipse Che Logs <!-- https://www.eclipse.org/che/docs/che-7/collecting-logs-using-chectl --> ### Additional context <!-- Add any other context about the problem here. -->
non_priority
git ssh flow ui tests failed on generate a ssh key step describe the bug git ssh flow ui tests failed on generate a ssh key step because workspace wasn t ready at the time ▼ topmenu selectoption view ▼ topmenu clickontopmenubutton view ▼ ide closeallnotifications ▼ notificationcenter open ▼ notificationcenter clickicononstatusbar ▼ notificationcenter waitopening ▼ notificationcenter closeall ▼ notificationcenter clickcloseallnotificationsbutton ▼ notificationcenter waitclearnotificationslist ▼ topmenu clickonsubmenuitem find command ▼ quickopencontainer typeandselectsuggestion ▼ quickopencontainer clickoncontaineritem ssh generate key pair ▼ quickopencontainer waitcontainer generate a ssh key passing failing git with ssh workflow generate a ssh key timeouterror exceeded maximum clicking attempts the by css selector div element is not clickable at driverhelper waitandclick tmp utils driverhelper ts at at process tickcallback internal process next tick js che version latest nightly other please specify steps to reproduce tests scenario expected behavior runtime kubernetes include output of kubectl version openshift include output of oc version minikube include output of minikube version and kubectl version minishift include output of minishift version and oc version docker desktop include output of docker version and kubectl version other please specify screenshots screencast installation method chectl provide a full command that was used to deploy eclipse che including the output provide an output of chectl version command operatorhub i don t know environment my computer windows linux macos cloud amazon azure gce other please specify other please specify eclipse che logs additional context
0
166,022
20,711,379,498
IssuesEvent
2022-03-12 01:14:25
snowflakedb/snowflake-jdbc
https://api.github.com/repos/snowflakedb/snowflake-jdbc
closed
SNOW-558862: CVE-2019-10202 (High) detected in jackson-databind-2.9.8.jar - autoclosed
security vulnerability
## CVE-2019-10202 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-ua_20220312003410_KQQKCS/archiveExtraction_BELGGC/FUIDAN/20220312003410/snowflake-jdbc_depth_0/dependencies/arrow-vector-0.15.1/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowflakedb/snowflake-jdbc/commit/8560bcca9d395d1ee02123536c2e958f7d386fe0">8560bcca9d395d1ee02123536c2e958f7d386fe0</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202>CVE-2019-10202</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://access.redhat.com/errata/RHSA-2019:2938">https://access.redhat.com/errata/RHSA-2019:2938</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","packageFilePaths":["/tmp/ws-ua_20220312003410_KQQKCS/archiveExtraction_BELGGC/FUIDAN/20220312003410/snowflake-jdbc_depth_0/dependencies/arrow-vector-0.15.1/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-10202","vulnerabilityDetails":"A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
SNOW-558862: CVE-2019-10202 (High) detected in jackson-databind-2.9.8.jar - autoclosed - ## CVE-2019-10202 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary> <p>General data-binding functionality for Jackson: works on core streaming API</p> <p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p> <p>Path to dependency file: /tmp/ws-ua_20220312003410_KQQKCS/archiveExtraction_BELGGC/FUIDAN/20220312003410/snowflake-jdbc_depth_0/dependencies/arrow-vector-0.15.1/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml</p> <p>Path to vulnerable library: /sitory/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p> <p> Dependency Hierarchy: - :x: **jackson-databind-2.9.8.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowflakedb/snowflake-jdbc/commit/8560bcca9d395d1ee02123536c2e958f7d386fe0">8560bcca9d395d1ee02123536c2e958f7d386fe0</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike. <p>Publish Date: 2019-10-01 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202>CVE-2019-10202</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://access.redhat.com/errata/RHSA-2019:2938">https://access.redhat.com/errata/RHSA-2019:2938</a></p> <p>Release Date: 2019-10-01</p> <p>Fix Resolution: JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","packageFilePaths":["/tmp/ws-ua_20220312003410_KQQKCS/archiveExtraction_BELGGC/FUIDAN/20220312003410/snowflake-jdbc_depth_0/dependencies/arrow-vector-0.15.1/META-INF/maven/org.apache.arrow/arrow-vector/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"JBoss Enterprise Application Platform - 7.2.4;com.fasterxml.jackson.core:jackson-databind:2.9.9","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2019-10202","vulnerabilityDetails":"A series of deserialization vulnerabilities have been discovered in Codehaus 1.9.x implemented in EAP 7. This CVE fixes CVE-2017-17485, CVE-2017-7525, CVE-2017-15095, CVE-2018-5968, CVE-2018-7489, CVE-2018-1000873, CVE-2019-12086 reported for FasterXML jackson-databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-10202","cvss3Severity":"high","cvss3Score":"9.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
snow cve high detected in jackson databind jar autoclosed cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws ua kqqkcs archiveextraction belggc fuidan snowflake jdbc depth dependencies arrow vector meta inf maven org apache arrow arrow vector pom xml path to vulnerable library sitory com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution jboss enterprise application platform com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion jboss enterprise application platform com fasterxml jackson core jackson databind isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails a series of deserialization vulnerabilities have been discovered in codehaus x implemented in eap this cve fixes cve cve cve cve cve cve cve reported for fasterxml jackson databind by implementing a whitelist approach that will mitigate these vulnerabilities and future ones alike vulnerabilityurl
0
61,893
12,196,459,197
IssuesEvent
2020-04-29 19:07:07
kwk/test-llvm-bz-import-5
https://api.github.com/repos/kwk/test-llvm-bz-import-5
closed
Assertion `FieldNo < FieldCount && "Invalid Field No"'
BZ-BUG-STATUS: RESOLVED BZ-RESOLUTION: FIXED clang/LLVM Codegen dummy import from bugzilla
This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=10912.
1.0
Assertion `FieldNo < FieldCount && "Invalid Field No"' - This issue was imported from Bugzilla https://bugs.llvm.org/show_bug.cgi?id=10912.
non_priority
assertion fieldno fieldcount invalid field no this issue was imported from bugzilla
0
79,154
28,019,051,856
IssuesEvent
2023-03-28 02:48:38
salsadigitalauorg/civictheme_source
https://api.github.com/repos/salsadigitalauorg/civictheme_source
opened
[DEFECT] Test Jira GH integration
Type: Defect
### Summary Summary ### Steps to reproduce Steps ### Observed outcome Observed ### Expected outcome Expected
1.0
[DEFECT] Test Jira GH integration - ### Summary Summary ### Steps to reproduce Steps ### Observed outcome Observed ### Expected outcome Expected
non_priority
test jira gh integration summary summary steps to reproduce steps observed outcome observed expected outcome expected
0
15,587
5,147,069,109
IssuesEvent
2017-01-13 04:57:19
rubberduck-vba/Rubberduck
https://api.github.com/repos/rubberduck-vba/Rubberduck
closed
Code inspection allows refresh of project with missing references
bug code-explorer code-inspections
I managed to get a project with a missing reference (VBE warned on open). The status bar stuck on "Resolving references", which (I guess) was to be expected. However, the refresh button on the Code Inspection window was still active. So... being the button pusher that I am, I clicked on it and ended up with a perpetually spinning busy indicator with all of the parser states stuck in "Pending".
2.0
Code inspection allows refresh of project with missing references - I managed to get a project with a missing reference (VBE warned on open). The status bar stuck on "Resolving references", which (I guess) was to be expected. However, the refresh button on the Code Inspection window was still active. So... being the button pusher that I am, I clicked on it and ended up with a perpetually spinning busy indicator with all of the parser states stuck in "Pending".
non_priority
code inspection allows refresh of project with missing references i managed to get a project with a missing reference vbe warned on open the status bar stuck on resolving references which i guess was to be expected however the refresh button on the code inspection window was still active so being the button pusher that i am i clicked on it and ended up with a perpetually spinning busy indicator with all of the parser states stuck in pending
0
357,549
25,176,403,391
IssuesEvent
2022-11-11 09:38:58
jwdavis0200/pe
https://api.github.com/repos/jwdavis0200/pe
opened
Commons class is used by multiple classes but yet is not so in the architecture diagram.
type.DocumentationBug severity.VeryLow
![image.png](https://raw.githubusercontent.com/jwdavis0200/pe/main/files/36a10202-0f72-4ef6-85cd-1c8cd0e9b826.png) The commons components is shown to be isolated here, which may confuse developers and give them the impression that it is either a deprecated component or an isolated component in the architecture. However, later in the DG, ![image.png](https://raw.githubusercontent.com/jwdavis0200/pe/main/files/ac155e92-9bea-4eb1-b023-cdaaa8f78d54.png) It is specified that the commons class is used by multiple components. Hence not accurate diagram. <!--session: 1668154592408-aa02e40a-16e9-443e-95e5-0d6565bc2029--> <!--Version: Web v3.4.4-->
1.0
Commons class is used by multiple classes but yet is not so in the architecture diagram. - ![image.png](https://raw.githubusercontent.com/jwdavis0200/pe/main/files/36a10202-0f72-4ef6-85cd-1c8cd0e9b826.png) The commons components is shown to be isolated here, which may confuse developers and give them the impression that it is either a deprecated component or an isolated component in the architecture. However, later in the DG, ![image.png](https://raw.githubusercontent.com/jwdavis0200/pe/main/files/ac155e92-9bea-4eb1-b023-cdaaa8f78d54.png) It is specified that the commons class is used by multiple components. Hence not accurate diagram. <!--session: 1668154592408-aa02e40a-16e9-443e-95e5-0d6565bc2029--> <!--Version: Web v3.4.4-->
non_priority
commons class is used by multiple classes but yet is not so in the architecture diagram the commons components is shown to be isolated here which may confuse developers and give them the impression that it is either a deprecated component or an isolated component in the architecture however later in the dg it is specified that the commons class is used by multiple components hence not accurate diagram
0
96,965
8,638,743,436
IssuesEvent
2018-11-23 15:47:09
EyeSeeTea/dhis2-newsletter
https://api.github.com/repos/EyeSeeTea/dhis2-newsletter
closed
Add unsubscribe link to newsletters
testing
Add Unsubscribe link to emails: - [x] @mention Notifications - [x] Newsletters
1.0
Add unsubscribe link to newsletters - Add Unsubscribe link to emails: - [x] @mention Notifications - [x] Newsletters
non_priority
add unsubscribe link to newsletters add unsubscribe link to emails mention notifications newsletters
0
69,736
9,330,441,009
IssuesEvent
2019-03-28 06:56:13
GluuFederation/oxTrust
https://api.github.com/repos/GluuFederation/oxTrust
closed
Add form for passport configuration management
Needs Documentation Needs screenshot new development
Related #1531 The `conf` section of `gluuPassportConfiguration` json looks like: ``` { "serverURI": "...", "serverWebPort": 8090, "postProfileEndpoint": "...", "spTLSCert": "...", "spTLSKey": "...", "logging": { "level": "...", "consoleLogOnly" : true/false, "activeMQConf": { "enabled": true/false, "host": "...", "username": "...", "password": "...", "port": "..." } } ``` We have to create a form to manage this data. There is already a POJO created for [this here](https://github.com/GluuFederation/oxCore/blob/master/oxService/src/main/java/org/xdi/model/passport/config/Configuration.java) All fields are required except the `activeMQConf` section. The possible values that `level` can take are the npm logging levels: error, warn, info, verbose, and debug Hopefully, upon form submission we should validate `serverURI` and `postProfileEndpoint` are URLs (not arbitrary strings)
1.0
Add form for passport configuration management - Related #1531 The `conf` section of `gluuPassportConfiguration` json looks like: ``` { "serverURI": "...", "serverWebPort": 8090, "postProfileEndpoint": "...", "spTLSCert": "...", "spTLSKey": "...", "logging": { "level": "...", "consoleLogOnly" : true/false, "activeMQConf": { "enabled": true/false, "host": "...", "username": "...", "password": "...", "port": "..." } } ``` We have to create a form to manage this data. There is already a POJO created for [this here](https://github.com/GluuFederation/oxCore/blob/master/oxService/src/main/java/org/xdi/model/passport/config/Configuration.java) All fields are required except the `activeMQConf` section. The possible values that `level` can take are the npm logging levels: error, warn, info, verbose, and debug Hopefully, upon form submission we should validate `serverURI` and `postProfileEndpoint` are URLs (not arbitrary strings)
non_priority
add form for passport configuration management related the conf section of gluupassportconfiguration json looks like serveruri serverwebport postprofileendpoint sptlscert sptlskey logging level consolelogonly true false activemqconf enabled true false host username password port we have to create a form to manage this data there is already a pojo created for all fields are required except the activemqconf section the possible values that level can take are the npm logging levels error warn info verbose and debug hopefully upon form submission we should validate serveruri and postprofileendpoint are urls not arbitrary strings
0
21,009
11,046,548,123
IssuesEvent
2019-12-09 17:03:57
statsmodels/statsmodels
https://api.github.com/repos/statsmodels/statsmodels
opened
REF/Review computational shortcuts for OLS outlier influence regression diagnostics
Performance comp-graphics comp-regression comp-stats comp-tools
outlier influence and similar regression diagnostics might still have some inefficient computations. (I improved those as I semi-randomly found computational shortcuts) article that summarizes several computational shortcuts Velleman, Paul F., and Roy E. Welsch. 1981. “Efficient Computing of Regression Diagnostics.” The American Statistician 35 (4): 234–42. https://doi.org/10.2307/2683296. one that I haven't seen before: section 3.1 catcher matrix which is just transposed `pinv(x)` can be used to construct partial residual plot without explicit regression to partial out other variables. e.g. statsmodels.graphics.regressionplots plot_partregress uses OLS to partial out other exog i.e. we should be able to get partial regression residuals directly from pinv(x), but I haven't tried yet. related PRs #6265, #6268 and #2380 work with moment (`cov(xy)`) or product matrices (`x'x`) and not with `pinv(x)` and are focused on effects/influence of variables and not with effects of observations.
True
REF/Review computational shortcuts for OLS outlier influence regression diagnostics - outlier influence and similar regression diagnostics might still have some inefficient computations. (I improved those as I semi-randomly found computational shortcuts) article that summarizes several computational shortcuts Velleman, Paul F., and Roy E. Welsch. 1981. “Efficient Computing of Regression Diagnostics.” The American Statistician 35 (4): 234–42. https://doi.org/10.2307/2683296. one that I haven't seen before: section 3.1 catcher matrix which is just transposed `pinv(x)` can be used to construct partial residual plot without explicit regression to partial out other variables. e.g. statsmodels.graphics.regressionplots plot_partregress uses OLS to partial out other exog i.e. we should be able to get partial regression residuals directly from pinv(x), but I haven't tried yet. related PRs #6265, #6268 and #2380 work with moment (`cov(xy)`) or product matrices (`x'x`) and not with `pinv(x)` and are focused on effects/influence of variables and not with effects of observations.
non_priority
ref review computational shortcuts for ols outlier influence regression diagnostics outlier influence and similar regression diagnostics might still have some inefficient computations i improved those as i semi randomly found computational shortcuts article that summarizes several computational shortcuts velleman paul f and roy e welsch “efficient computing of regression diagnostics ” the american statistician – one that i haven t seen before section catcher matrix which is just transposed pinv x can be used to construct partial residual plot without explicit regression to partial out other variables e g statsmodels graphics regressionplots plot partregress uses ols to partial out other exog i e we should be able to get partial regression residuals directly from pinv x but i haven t tried yet related prs and work with moment cov xy or product matrices x x and not with pinv x and are focused on effects influence of variables and not with effects of observations
0
211,332
16,196,711,065
IssuesEvent
2021-05-04 15:22:38
hashgraph/hedera-services
https://api.github.com/repos/hashgraph/hedera-services
closed
Reconnect test scenarios for Files
Test Development enhancement
**Summary** Add reconnect test scenario in which the following file operations are done during and after reconnect 1. Files are created 2. Files are Updated 3. Files are Appended Validate if the reconnect is successful with the file operations.
1.0
Reconnect test scenarios for Files - **Summary** Add reconnect test scenario in which the following file operations are done during and after reconnect 1. Files are created 2. Files are Updated 3. Files are Appended Validate if the reconnect is successful with the file operations.
non_priority
reconnect test scenarios for files summary add reconnect test scenario in which the following file operations are done during and after reconnect files are created files are updated files are appended validate if the reconnect is successful with the file operations
0
206,747
23,396,871,822
IssuesEvent
2022-08-12 01:18:41
Baneeishaque/comingsoon_03-colorlib
https://api.github.com/repos/Baneeishaque/comingsoon_03-colorlib
opened
CVE-2022-24785 (High) detected in moment-2.20.1.min.js
security vulnerability
## CVE-2022-24785 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.20.1.min.js</b></p></summary> <p>Parse, validate, manipulate, and display dates</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.20.1/moment.min.js">https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.20.1/moment.min.js</a></p> <p>Path to dependency file: /index.html</p> <p>Path to vulnerable library: /vendor/countdowntime/moment.min.js,/vendor/countdowntime/moment.min.js</p> <p> Dependency Hierarchy: - :x: **moment-2.20.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Baneeishaque/comingsoon_03-colorlib/commit/6437a6c55e104e9f959ac26e963b5a4843a5b8d7">6437a6c55e104e9f959ac26e963b5a4843a5b8d7</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js. <p>Publish Date: 2022-04-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24785>CVE-2022-24785</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p> <p>Release Date: 2022-04-04</p> <p>Fix Resolution: moment - 2.29.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24785 (High) detected in moment-2.20.1.min.js - ## CVE-2022-24785 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>moment-2.20.1.min.js</b></p></summary> <p>Parse, validate, manipulate, and display dates</p> <p>Library home page: <a href="https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.20.1/moment.min.js">https://cdnjs.cloudflare.com/ajax/libs/moment.js/2.20.1/moment.min.js</a></p> <p>Path to dependency file: /index.html</p> <p>Path to vulnerable library: /vendor/countdowntime/moment.min.js,/vendor/countdowntime/moment.min.js</p> <p> Dependency Hierarchy: - :x: **moment-2.20.1.min.js** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Baneeishaque/comingsoon_03-colorlib/commit/6437a6c55e104e9f959ac26e963b5a4843a5b8d7">6437a6c55e104e9f959ac26e963b5a4843a5b8d7</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Moment.js is a JavaScript date library for parsing, validating, manipulating, and formatting dates. A path traversal vulnerability impacts npm (server) users of Moment.js between versions 1.0.1 and 2.29.1, especially if a user-provided locale string is directly used to switch moment locale. This problem is patched in 2.29.2, and the patch can be applied to all affected versions. As a workaround, sanitize the user-provided locale name before passing it to Moment.js. <p>Publish Date: 2022-04-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-24785>CVE-2022-24785</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4">https://github.com/moment/moment/security/advisories/GHSA-8hfj-j24r-96c4</a></p> <p>Release Date: 2022-04-04</p> <p>Fix Resolution: moment - 2.29.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in moment min js cve high severity vulnerability vulnerable library moment min js parse validate manipulate and display dates library home page a href path to dependency file index html path to vulnerable library vendor countdowntime moment min js vendor countdowntime moment min js dependency hierarchy x moment min js vulnerable library found in head commit a href vulnerability details moment js is a javascript date library for parsing validating manipulating and formatting dates a path traversal vulnerability impacts npm server users of moment js between versions and especially if a user provided locale string is directly used to switch moment locale this problem is patched in and the patch can be applied to all affected versions as a workaround sanitize the user provided locale name before passing it to moment js publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution moment step up your open source security game with mend
0
4,267
3,342,867,400
IssuesEvent
2015-11-15 00:46:52
SecUpwN/Android-IMSI-Catcher-Detector
https://api.github.com/repos/SecUpwN/Android-IMSI-Catcher-Detector
reopened
Build: Automatic version and app name update with Gradle
BUILD ENHANCEMENT
Implement automatic build and version updates when using Travis-CI and Gradle, to build our App. The `build.gradle` script to do this, is described [HERE](http://bryankrosenbaum.com/2013/11/27/getting-to-know-gradle-auto-increment-version-and-signing-releases/), and lastest version can be found [HERE](https://github.com/bryanro/later-android/blob/master/Later/build.gradle). This would obviously require a few modifications in the *RegEx* as our build string is different, including changing the correct min/max of the supported API. (min=API-**17**, max=?) ```xml <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.SecUpwN.AIMSICD" android:versionCode="24" android:versionName="0.1.24-alpha-build-12"> ``` The link above also provide a way to implement automatic APK signing, using a [signing.properties](https://github.com/bryanro/later-android/blob/master/signing.properties) file. And [HERE](http://toastdroid.com/2014/03/28/customizing-your-build-with-gradle/) is a way to automatically name the built APK.
1.0
Build: Automatic version and app name update with Gradle - Implement automatic build and version updates when using Travis-CI and Gradle, to build our App. The `build.gradle` script to do this, is described [HERE](http://bryankrosenbaum.com/2013/11/27/getting-to-know-gradle-auto-increment-version-and-signing-releases/), and lastest version can be found [HERE](https://github.com/bryanro/later-android/blob/master/Later/build.gradle). This would obviously require a few modifications in the *RegEx* as our build string is different, including changing the correct min/max of the supported API. (min=API-**17**, max=?) ```xml <manifest xmlns:android="http://schemas.android.com/apk/res/android" package="com.SecUpwN.AIMSICD" android:versionCode="24" android:versionName="0.1.24-alpha-build-12"> ``` The link above also provide a way to implement automatic APK signing, using a [signing.properties](https://github.com/bryanro/later-android/blob/master/signing.properties) file. And [HERE](http://toastdroid.com/2014/03/28/customizing-your-build-with-gradle/) is a way to automatically name the built APK.
non_priority
build automatic version and app name update with gradle implement automatic build and version updates when using travis ci and gradle to build our app the build gradle script to do this is described and lastest version can be found this would obviously require a few modifications in the regex as our build string is different including changing the correct min max of the supported api min api max xml manifest xmlns android package com secupwn aimsicd android versioncode android versionname alpha build the link above also provide a way to implement automatic apk signing using a file and is a way to automatically name the built apk
0
86,816
15,755,875,730
IssuesEvent
2021-03-31 02:32:25
turkdevops/node
https://api.github.com/repos/turkdevops/node
opened
WS-2017-0266 (Low) detected in http-signature-0.10.0.tgz
security vulnerability
## WS-2017-0266 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>http-signature-0.10.0.tgz</b></p></summary> <p>Reference implementation of Joyent's HTTP Signature Scheme</p> <p>Library home page: <a href="https://registry.npmjs.org/http-signature/-/http-signature-0.10.0.tgz">https://registry.npmjs.org/http-signature/-/http-signature-0.10.0.tgz</a></p> <p>Path to dependency file: node/deps/npm/package.json</p> <p>Path to vulnerable library: node/deps/npm/node_modules/request/node_modules/http-signature/package.json</p> <p> Dependency Hierarchy: - request-2.42.0.tgz (Root Library) - :x: **http-signature-0.10.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>archived-io.js-v0.10</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Affected versions (before 1.0.0) of the http-signature package are vulnerable to Timing Attacks. <p>Publish Date: 2015-01-22 <p>URL: <a href=https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56>WS-2017-0266</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/joyent/node-http-signature/pull/36">https://github.com/joyent/node-http-signature/pull/36</a></p> <p>Release Date: 2017-01-31</p> <p>Fix Resolution: 1.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2017-0266 (Low) detected in http-signature-0.10.0.tgz - ## WS-2017-0266 - Low Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>http-signature-0.10.0.tgz</b></p></summary> <p>Reference implementation of Joyent's HTTP Signature Scheme</p> <p>Library home page: <a href="https://registry.npmjs.org/http-signature/-/http-signature-0.10.0.tgz">https://registry.npmjs.org/http-signature/-/http-signature-0.10.0.tgz</a></p> <p>Path to dependency file: node/deps/npm/package.json</p> <p>Path to vulnerable library: node/deps/npm/node_modules/request/node_modules/http-signature/package.json</p> <p> Dependency Hierarchy: - request-2.42.0.tgz (Root Library) - :x: **http-signature-0.10.0.tgz** (Vulnerable Library) <p>Found in base branch: <b>archived-io.js-v0.10</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Affected versions (before 1.0.0) of the http-signature package are vulnerable to Timing Attacks. <p>Publish Date: 2015-01-22 <p>URL: <a href=https://github.com/joyent/node-http-signature/commit/78ab1da232f31f695f5c362d863593a143aa8b56>WS-2017-0266</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>3.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Adjacent - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/joyent/node-http-signature/pull/36">https://github.com/joyent/node-http-signature/pull/36</a></p> <p>Release Date: 2017-01-31</p> <p>Fix Resolution: 1.0.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws low detected in http signature tgz ws low severity vulnerability vulnerable library http signature tgz reference implementation of joyent s http signature scheme library home page a href path to dependency file node deps npm package json path to vulnerable library node deps npm node modules request node modules http signature package json dependency hierarchy request tgz root library x http signature tgz vulnerable library found in base branch archived io js vulnerability details affected versions before of the http signature package are vulnerable to timing attacks publish date url a href cvss score details base score metrics exploitability metrics attack vector adjacent attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
27,350
6,841,269,583
IssuesEvent
2017-11-11 11:22:06
justDoji/TrackMeUp
https://api.github.com/repos/justDoji/TrackMeUp
opened
QualityAssurance: increase test coverage of Java component
code-quality
Increase the test coverage indicated by the Sonar Cloud analysis. Target coverage is 70%, only non-trivial functions should be tested. (no private constructor or getter tests).
1.0
QualityAssurance: increase test coverage of Java component - Increase the test coverage indicated by the Sonar Cloud analysis. Target coverage is 70%, only non-trivial functions should be tested. (no private constructor or getter tests).
non_priority
qualityassurance increase test coverage of java component increase the test coverage indicated by the sonar cloud analysis target coverage is only non trivial functions should be tested no private constructor or getter tests
0
132,485
12,509,501,577
IssuesEvent
2020-06-02 17:08:48
nipype/pydra
https://api.github.com/repos/nipype/pydra
opened
Expand docstrings in specs.py and core.py to numpy docstring style
documentation
Docstrings are not complete, so it's not clear how the classes are related to each other and what some of the functions and class methods do etc.
1.0
Expand docstrings in specs.py and core.py to numpy docstring style - Docstrings are not complete, so it's not clear how the classes are related to each other and what some of the functions and class methods do etc.
non_priority
expand docstrings in specs py and core py to numpy docstring style docstrings are not complete so it s not clear how the classes are related to each other and what some of the functions and class methods do etc
0
109,714
9,411,676,933
IssuesEvent
2019-04-10 00:31:07
filecoin-project/go-filecoin
https://api.github.com/repos/filecoin-project/go-filecoin
opened
Resolve long low-CPU delays during tests
A-tests C-dev-productivity
### Description When running tests, I observe periods of intense CPU work and periods where my CPU is near idle (maybe 1 core working). This suggests that the total duration required to run tests is longer than necessary, not constrained by resources. My guess is that there are some lengthy tests that are not but should be marked as parallel. ### Acceptance criteria - Tests consume all resources available on a typical developer machine in the name of finishing as quickly as possible. ### Risks + pitfalls If the tests to be parallelised are very memory intensive they may put more pressure on CI builds, see #2516. ### Where to begin Evaluate which test functions are not marked parallel.
1.0
Resolve long low-CPU delays during tests - ### Description When running tests, I observe periods of intense CPU work and periods where my CPU is near idle (maybe 1 core working). This suggests that the total duration required to run tests is longer than necessary, not constrained by resources. My guess is that there are some lengthy tests that are not but should be marked as parallel. ### Acceptance criteria - Tests consume all resources available on a typical developer machine in the name of finishing as quickly as possible. ### Risks + pitfalls If the tests to be parallelised are very memory intensive they may put more pressure on CI builds, see #2516. ### Where to begin Evaluate which test functions are not marked parallel.
non_priority
resolve long low cpu delays during tests description when running tests i observe periods of intense cpu work and periods where my cpu is near idle maybe core working this suggests that the total duration required to run tests is longer than necessary not constrained by resources my guess is that there are some lengthy tests that are not but should be marked as parallel acceptance criteria tests consume all resources available on a typical developer machine in the name of finishing as quickly as possible risks pitfalls if the tests to be parallelised are very memory intensive they may put more pressure on ci builds see where to begin evaluate which test functions are not marked parallel
0
160,881
20,120,316,292
IssuesEvent
2022-02-08 01:07:02
AkshayMukkavilli/Tensorflow
https://api.github.com/repos/AkshayMukkavilli/Tensorflow
opened
CVE-2022-23573 (High) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl
security vulnerability
## CVE-2022-23573 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /Tensorflow/src/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_5ea86033-7612-4210-97f3-8edb65806ddf/20190525011619_2843/20190525011537_depth_0/2/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand side is also initialized. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. <p>Publish Date: 2022-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23573>CVE-2022-23573</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2</a></p> <p>Release Date: 2022-02-04</p> <p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-23573 (High) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2022-23573 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary> <p>TensorFlow is an open source machine learning framework for everyone.</p> <p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p> <p>Path to dependency file: /Tensorflow/src/requirements.txt</p> <p>Path to vulnerable library: /teSource-ArchiveExtractor_5ea86033-7612-4210-97f3-8edb65806ddf/20190525011619_2843/20190525011537_depth_0/2/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64/tensorflow-1.13.1.data/purelib/tensorflow</p> <p> Dependency Hierarchy: - :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library) </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Tensorflow is an Open Source Machine Learning Framework. The implementation of `AssignOp` can result in copying uninitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the left hand side of the assignment is initialized (to minimize number of allocations), but does not check that the right hand side is also initialized. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. <p>Publish Date: 2022-02-04 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23573>CVE-2022-23573</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.6</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2</a></p> <p>Release Date: 2022-02-04</p> <p>Fix Resolution: tensorflow - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-cpu - 2.5.3,2.6.3,2.7.1,2.8.0;tensorflow-gpu - 2.5.3,2.6.3,2.7.1,2.8.0</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tensorflow whl cve high severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href path to dependency file tensorflow src requirements txt path to vulnerable library tesource archiveextractor depth tensorflow tensorflow data purelib tensorflow dependency hierarchy x tensorflow whl vulnerable library vulnerability details tensorflow is an open source machine learning framework the implementation of assignop can result in copying uninitialized data to a new tensor this later results in undefined behavior the implementation has a check that the left hand side of the assignment is initialized to minimize number of allocations but does not check that the right hand side is also initialized the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with whitesource
0
3,304
12,749,105,772
IssuesEvent
2020-06-26 21:46:43
tgstation/tgstation-server
https://api.github.com/repos/tgstation/tgstation-server
closed
Create a checklist for the release process
CI Maintainability Issue Work In Progress
Things to include - Release note touchup on PRs - Major/Minor/Patch selection - API/Client/Server versioning - Proper use of TGSDeploy and NugetDeploy - Announcement channels
True
Create a checklist for the release process - Things to include - Release note touchup on PRs - Major/Minor/Patch selection - API/Client/Server versioning - Proper use of TGSDeploy and NugetDeploy - Announcement channels
non_priority
create a checklist for the release process things to include release note touchup on prs major minor patch selection api client server versioning proper use of tgsdeploy and nugetdeploy announcement channels
0
245,549
18,787,332,601
IssuesEvent
2021-11-08 13:32:05
philippabele/irrigation-springler
https://api.github.com/repos/philippabele/irrigation-springler
closed
Update readme / literature review
documentation
- Inform the reader about, what work has been done before. What ideas and models have already been developed. - List the relevant literature, blogs, educational platforms and sites to highlight sources for background information of this project.
1.0
Update readme / literature review - - Inform the reader about, what work has been done before. What ideas and models have already been developed. - List the relevant literature, blogs, educational platforms and sites to highlight sources for background information of this project.
non_priority
update readme literature review inform the reader about what work has been done before what ideas and models have already been developed list the relevant literature blogs educational platforms and sites to highlight sources for background information of this project
0
356,181
25,176,131,301
IssuesEvent
2022-11-11 09:25:16
autumn-sonata/pe
https://api.github.com/repos/autumn-sonata/pe
opened
[User guide] Some commands lacking any visuals to aid the user in following along with the examples
severity.VeryLow type.DocumentationBug
![image.png](https://raw.githubusercontent.com/autumn-sonata/pe/main/files/f969167a-a3d1-44be-a063-7624f3594c13.png) In this case, to better distinguish between the `find` and `filter` command, there should be an example with visuals. <!--session: 1668154499182-004918ce-c7c4-4d19-a42b-a278b5192249--> <!--Version: Web v3.4.4-->
1.0
[User guide] Some commands lacking any visuals to aid the user in following along with the examples - ![image.png](https://raw.githubusercontent.com/autumn-sonata/pe/main/files/f969167a-a3d1-44be-a063-7624f3594c13.png) In this case, to better distinguish between the `find` and `filter` command, there should be an example with visuals. <!--session: 1668154499182-004918ce-c7c4-4d19-a42b-a278b5192249--> <!--Version: Web v3.4.4-->
non_priority
some commands lacking any visuals to aid the user in following along with the examples in this case to better distinguish between the find and filter command there should be an example with visuals
0
291,207
21,917,624,928
IssuesEvent
2022-05-22 04:01:19
cynkra/dm
https://api.github.com/repos/cynkra/dm
closed
Remove all calls of soft deprecated functionalities
documentation
an example: https://github.com/cynkra/dm/blob/0cd852445b5e41fcc93fc2f428bf02c22d2cc165/vignettes/tech-dm-join.Rmd#L98-L100 results the following: ![image](https://user-images.githubusercontent.com/12943682/169556872-3d39aeed-7560-4b7d-92a8-8b6c9a19979e.png) Looking into the code - there are more soft-deprecated functions. Would be worth to clean this up.
1.0
Remove all calls of soft deprecated functionalities - an example: https://github.com/cynkra/dm/blob/0cd852445b5e41fcc93fc2f428bf02c22d2cc165/vignettes/tech-dm-join.Rmd#L98-L100 results the following: ![image](https://user-images.githubusercontent.com/12943682/169556872-3d39aeed-7560-4b7d-92a8-8b6c9a19979e.png) Looking into the code - there are more soft-deprecated functions. Would be worth to clean this up.
non_priority
remove all calls of soft deprecated functionalities an example results the following looking into the code there are more soft deprecated functions would be worth to clean this up
0
178,936
13,804,666,674
IssuesEvent
2020-10-11 10:06:42
add-ons/plugin.video.vtm.go
https://api.github.com/repos/add-ons/plugin.video.vtm.go
closed
Run some CI tests every few hours to check authentication flow
testing
Given the recent breakages in the login flow, it would make sense to run some CI tests related to authentication every few hours. Maybe like every 6 hours, that's 4 times a day. @dagwieers can you help with that? I think you've set that up for VRT NU. Do we get an e-mail when something breaks?
1.0
Run some CI tests every few hours to check authentication flow - Given the recent breakages in the login flow, it would make sense to run some CI tests related to authentication every few hours. Maybe like every 6 hours, that's 4 times a day. @dagwieers can you help with that? I think you've set that up for VRT NU. Do we get an e-mail when something breaks?
non_priority
run some ci tests every few hours to check authentication flow given the recent breakages in the login flow it would make sense to run some ci tests related to authentication every few hours maybe like every hours that s times a day dagwieers can you help with that i think you ve set that up for vrt nu do we get an e mail when something breaks
0
1,637
2,613,015,160
IssuesEvent
2015-02-27 18:08:07
scento/lingua
https://api.github.com/repos/scento/lingua
opened
CLDR Language
documentation feature implementation testcase
**Implementation:** The class `\Lingua\Setup\Processor\CldrLanguage` should process the data generated by `Lingua\Setup\Downloader\Iana`, `Lingua\Setup\Downloader\Icu` and `Lingua\Setup\Downloader\Sil` to generate the following files: * `iso639-1.json` * `iso639-1_to_iso639-3.json` * `iso639-1_to_bcp47.json` * `iso639-3.json` * `iso639-3_to_iso639-1.json` * `iso639-3_to_bcp47.json` * `bcp47_to_iso639-1.json` * `bcp47_to_iso639-3.json` There is no `bcp47.json`, since the BCP47 codes are aggregated and do not only contain the language part, which is represented by this class. The method `getSubsystem()` must always return `Language`. **Testcase:** The testcase should cover the entire implementation. Please ensure, that all functions verify, that the parameters match the expected type. In case the base data is not available, an Exception must be thrown. Also throw an Exception, in case the Downloaders are not available, no `Setup` is available or no destination is available. Since new files must be created, the `process()` function must throw an Exception, when the destination directory is not writable or any other error occur. **Documentation:** The documentation to this class should cover the input and output files, a list of the dependencies regarding Downloaders and an short overview about the basic functionality. As always, UML diagrams should be added to illustrate the subsystem integration. **Integration:** The caching feature of `composer install` must be removed, since the user needs to accept the SIL license and the data must be downloaded from their page. This processor combines the SIL and data from other sources, which might be unavailable in that context. --- ![cldrlanguage](https://cloud.githubusercontent.com/assets/2129596/6417872/b6c91eca-beb0-11e4-93ee-b019125a4e82.jpg)
1.0
CLDR Language - **Implementation:** The class `\Lingua\Setup\Processor\CldrLanguage` should process the data generated by `Lingua\Setup\Downloader\Iana`, `Lingua\Setup\Downloader\Icu` and `Lingua\Setup\Downloader\Sil` to generate the following files: * `iso639-1.json` * `iso639-1_to_iso639-3.json` * `iso639-1_to_bcp47.json` * `iso639-3.json` * `iso639-3_to_iso639-1.json` * `iso639-3_to_bcp47.json` * `bcp47_to_iso639-1.json` * `bcp47_to_iso639-3.json` There is no `bcp47.json`, since the BCP47 codes are aggregated and do not only contain the language part, which is represented by this class. The method `getSubsystem()` must always return `Language`. **Testcase:** The testcase should cover the entire implementation. Please ensure, that all functions verify, that the parameters match the expected type. In case the base data is not available, an Exception must be thrown. Also throw an Exception, in case the Downloaders are not available, no `Setup` is available or no destination is available. Since new files must be created, the `process()` function must throw an Exception, when the destination directory is not writable or any other error occur. **Documentation:** The documentation to this class should cover the input and output files, a list of the dependencies regarding Downloaders and an short overview about the basic functionality. As always, UML diagrams should be added to illustrate the subsystem integration. **Integration:** The caching feature of `composer install` must be removed, since the user needs to accept the SIL license and the data must be downloaded from their page. This processor combines the SIL and data from other sources, which might be unavailable in that context. --- ![cldrlanguage](https://cloud.githubusercontent.com/assets/2129596/6417872/b6c91eca-beb0-11e4-93ee-b019125a4e82.jpg)
non_priority
cldr language implementation the class lingua setup processor cldrlanguage should process the data generated by lingua setup downloader iana lingua setup downloader icu and lingua setup downloader sil to generate the following files json to json to json json to json to json to json to json there is no json since the codes are aggregated and do not only contain the language part which is represented by this class the method getsubsystem must always return language testcase the testcase should cover the entire implementation please ensure that all functions verify that the parameters match the expected type in case the base data is not available an exception must be thrown also throw an exception in case the downloaders are not available no setup is available or no destination is available since new files must be created the process function must throw an exception when the destination directory is not writable or any other error occur documentation the documentation to this class should cover the input and output files a list of the dependencies regarding downloaders and an short overview about the basic functionality as always uml diagrams should be added to illustrate the subsystem integration integration the caching feature of composer install must be removed since the user needs to accept the sil license and the data must be downloaded from their page this processor combines the sil and data from other sources which might be unavailable in that context
0
303,945
26,240,851,904
IssuesEvent
2023-01-05 11:21:25
woocommerce/woocommerce-blocks
https://api.github.com/repos/woocommerce/woocommerce-blocks
closed
Product Query: [Tests] Add E2E tests for Popular Filters
category: tests 🔹 block-type: product-query
The test should cover: - Newest - Best Selling - Top rated We should test against a reference to avoid false positive tests. A possible reference is the WooCommerce products shortcode.
1.0
Product Query: [Tests] Add E2E tests for Popular Filters - The test should cover: - Newest - Best Selling - Top rated We should test against a reference to avoid false positive tests. A possible reference is the WooCommerce products shortcode.
non_priority
product query add tests for popular filters the test should cover newest best selling top rated we should test against a reference to avoid false positive tests a possible reference is the woocommerce products shortcode
0
284,166
30,913,598,962
IssuesEvent
2023-08-05 02:21:24
Satheesh575555/linux-4.1.15_CVE-2022-45934
https://api.github.com/repos/Satheesh575555/linux-4.1.15_CVE-2022-45934
reopened
CVE-2022-24958 (High) detected in linuxlinux-4.6
Mend: dependency security vulnerability
## CVE-2022-24958 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-45934/commit/7c0b143b43394df131d83e9aecb3c5518edc127a">7c0b143b43394df131d83e9aecb3c5518edc127a</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release. <p>Publish Date: 2022-02-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24958>CVE-2022-24958</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958</a></p> <p>Release Date: 2022-02-11</p> <p>Fix Resolution: v5.16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-24958 (High) detected in linuxlinux-4.6 - ## CVE-2022-24958 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.6</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in HEAD commit: <a href="https://github.com/Satheesh575555/linux-4.1.15_CVE-2022-45934/commit/7c0b143b43394df131d83e9aecb3c5518edc127a">7c0b143b43394df131d83e9aecb3c5518edc127a</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> drivers/usb/gadget/legacy/inode.c in the Linux kernel through 5.16.8 mishandles dev->buf release. <p>Publish Date: 2022-02-11 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-24958>CVE-2022-24958</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24958</a></p> <p>Release Date: 2022-02-11</p> <p>Fix Resolution: v5.16</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details drivers usb gadget legacy inode c in the linux kernel through mishandles dev buf release publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
115,765
24,808,303,072
IssuesEvent
2022-10-25 07:22:45
sast-automation-dev/railsgoat-45
https://api.github.com/repos/sast-automation-dev/railsgoat-45
opened
Code Security Report: 20 high severity findings, 30 total findings
code security findings
# Code Security Report **Latest Scan:** 2022-10-25 07:20am **Total Findings:** 30 **Tested Project Files:** 134 **Detected Programming Languages:** 2 <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: JavaScript / Node.js | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|2| ### Details > No high vulnerability findings detected. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/714406f6-bc99-47d7-b72f-612cc14ee022/details). ## Language: Ruby | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-78](https://cwe.mitre.org/data/definitions/78.html)|Command Injection|4| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Path/Directory Traversal|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-915](https://cwe.mitre.org/data/definitions/915.html)|Mass Assignment|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Dangerous HTML Embedded|10| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Cross-Site Scripting|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-321](https://cwe.mitre.org/data/definitions/321.html)|Secret Key In Source|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-916](https://cwe.mitre.org/data/definitions/916.html)|Weak Hash Strength|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|HTTP Response Splitting|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-1004](https://cwe.mitre.org/data/definitions/1004.html)|Cookie Without 'HttpOnly' Flag|1| ### Details > The below list presents the 20 high vulnerability findings that need your attention. To view information on these findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/714406f6-bc99-47d7-b72f-612cc14ee022/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Command Injection (CWE-78) : 4</summary> #### Findings <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L6 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L13 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L13 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L6 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Injection (CWE-89) : 1</summary> #### Findings <details> <summary>controllers/users_controller.rb:29</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/users_controller.rb#L24-L29 </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Path/Directory Traversal (CWE-22) : 3</summary> #### Findings <details> <summary>models/benefits.rb:7</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L2-L7 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L6 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L7 </details> </details> <details> <summary>controllers/benefit_forms_controller.rb:12</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L7-L12 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L11 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L12 </details> </details> <details> <summary>controllers/benefit_forms_controller.rb:12</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L7-L12 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L10 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L11 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L12 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Mass Assignment (CWE-915) : 1</summary> #### Findings <details> <summary>controllers/users_controller.rb:55</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/users_controller.rb#L50-L55 </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Dangerous HTML Embedded (CWE-79) : 10</summary> #### Findings <details> <summary>performance/index.html.erb:63</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/performance/index.html.erb#L58-L63 </details> <details> <summary>admin/get_all_users.html.erb:29</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/admin/get_all_users.html.erb#L24-L29 </details> <details> <summary>messages/index.html.erb:114</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/messages/index.html.erb#L109-L114 </details> <details> <summary>shared/_header.html.erb:31</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/layouts/shared/_header.html.erb#L26-L31 </details> <details> <summary>controllers/password_resets_controller.rb:36</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/password_resets_controller.rb#L31-L36 </details> <details> <summary>shared/_header.html.erb:82</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/layouts/shared/_header.html.erb#L77-L82 </details> <details> <summary>paid_time_off/index.html.erb:192</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/paid_time_off/index.html.erb#L187-L192 </details> <details> <summary>paid_time_off/index.html.erb:158</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/paid_time_off/index.html.erb#L153-L158 </details> <details> <summary>paid_time_off/index.html.erb:135</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/paid_time_off/index.html.erb#L130-L135 </details> <details> <summary>users/account_settings.html.erb:81</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/users/account_settings.html.erb#L76-L81 </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Cross-Site Scripting (CWE-79) : 1</summary> #### Findings <details> <summary>layouts/application.html.erb:12</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/layouts/application.html.erb#L7-L12 </details> </details>
1.0
Code Security Report: 20 high severity findings, 30 total findings - # Code Security Report **Latest Scan:** 2022-10-25 07:20am **Total Findings:** 30 **Tested Project Files:** 134 **Detected Programming Languages:** 2 <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ## Language: JavaScript / Node.js | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-338](https://cwe.mitre.org/data/definitions/338.html)|Weak Pseudo-Random|2| ### Details > No high vulnerability findings detected. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/714406f6-bc99-47d7-b72f-612cc14ee022/details). ## Language: Ruby | Severity | CWE | Vulnerability Type | Count | |-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-78](https://cwe.mitre.org/data/definitions/78.html)|Command Injection|4| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|SQL Injection|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Path/Directory Traversal|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-915](https://cwe.mitre.org/data/definitions/915.html)|Mass Assignment|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Dangerous HTML Embedded|10| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Cross-Site Scripting|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium|[CWE-321](https://cwe.mitre.org/data/definitions/321.html)|Secret Key In Source|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-916](https://cwe.mitre.org/data/definitions/916.html)|Weak Hash Strength|5| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|HTTP Response Splitting|1| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png' width=19 height=20> Low|[CWE-1004](https://cwe.mitre.org/data/definitions/1004.html)|Cookie Without 'HttpOnly' Flag|1| ### Details > The below list presents the 20 high vulnerability findings that need your attention. To view information on these findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/714406f6-bc99-47d7-b72f-612cc14ee022/details). <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Command Injection (CWE-78) : 4</summary> #### Findings <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L6 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L13 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L13 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> <details> <summary>models/benefits.rb:15</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L10-L15 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L6 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L15 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>SQL Injection (CWE-89) : 1</summary> #### Findings <details> <summary>controllers/users_controller.rb:29</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/users_controller.rb#L24-L29 </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Path/Directory Traversal (CWE-22) : 3</summary> #### Findings <details> <summary>models/benefits.rb:7</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L2-L7 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L19 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L4 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L6 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/models/benefits.rb#L7 </details> </details> <details> <summary>controllers/benefit_forms_controller.rb:12</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L7-L12 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L11 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L12 </details> </details> <details> <summary>controllers/benefit_forms_controller.rb:12</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L7-L12 <details> <summary> Trace </summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L10 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L11 https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/benefit_forms_controller.rb#L12 </details> </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Mass Assignment (CWE-915) : 1</summary> #### Findings <details> <summary>controllers/users_controller.rb:55</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/users_controller.rb#L50-L55 </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Dangerous HTML Embedded (CWE-79) : 10</summary> #### Findings <details> <summary>performance/index.html.erb:63</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/performance/index.html.erb#L58-L63 </details> <details> <summary>admin/get_all_users.html.erb:29</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/admin/get_all_users.html.erb#L24-L29 </details> <details> <summary>messages/index.html.erb:114</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/messages/index.html.erb#L109-L114 </details> <details> <summary>shared/_header.html.erb:31</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/layouts/shared/_header.html.erb#L26-L31 </details> <details> <summary>controllers/password_resets_controller.rb:36</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/controllers/password_resets_controller.rb#L31-L36 </details> <details> <summary>shared/_header.html.erb:82</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/layouts/shared/_header.html.erb#L77-L82 </details> <details> <summary>paid_time_off/index.html.erb:192</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/paid_time_off/index.html.erb#L187-L192 </details> <details> <summary>paid_time_off/index.html.erb:158</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/paid_time_off/index.html.erb#L153-L158 </details> <details> <summary>paid_time_off/index.html.erb:135</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/paid_time_off/index.html.erb#L130-L135 </details> <details> <summary>users/account_settings.html.erb:81</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/users/account_settings.html.erb#L76-L81 </details> </details> <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20>Cross-Site Scripting (CWE-79) : 1</summary> #### Findings <details> <summary>layouts/application.html.erb:12</summary> https://github.com/sast-automation-dev/railsgoat-45/blob/4af0b15b213fca0ddfbdcf696e5803947b8bc1a2/railsgoat-45/app/views/layouts/application.html.erb#L7-L12 </details> </details>
non_priority
code security report high severity findings total findings code security report latest scan total findings tested project files detected programming languages check this box to manually trigger a scan language javascript node js severity cwe vulnerability type count medium pseudo random details no high vulnerability findings detected to view information on the remaining findings navigate to the language ruby severity cwe vulnerability type count high injection high injection high traversal high assignment high html embedded high scripting medium key in source low hash strength low response splitting low without httponly flag details the below list presents the high vulnerability findings that need your attention to view information on these findings navigate to the command injection cwe findings models benefits rb trace models benefits rb trace models benefits rb trace models benefits rb trace sql injection cwe findings controllers users controller rb path directory traversal cwe findings models benefits rb trace controllers benefit forms controller rb trace controllers benefit forms controller rb trace mass assignment cwe findings controllers users controller rb dangerous html embedded cwe findings performance index html erb admin get all users html erb messages index html erb shared header html erb controllers password resets controller rb shared header html erb paid time off index html erb paid time off index html erb paid time off index html erb users account settings html erb cross site scripting cwe findings layouts application html erb
0
7,823
10,996,990,856
IssuesEvent
2019-12-03 08:10:22
Altinn/altinn-studio
https://api.github.com/repos/Altinn/altinn-studio
closed
isArchived is not set to True when an instance is sent in
area/message-box area/process kind/bug solution/sbl team/nusse
## Describe the bug isArchived is not set to True when an instance is sent in by an user from SBL ## To Reproduce Steps to reproduce the behavior: 1. Login to AT21 and start a instance of a deployed app 2. Fill in data and send inn the instance 3. The receipt page is presented to the user 4. Navigate back to inbox and see that the instance is still available in the Inbox 5. Open the instance and click on 'Gå til skjema' and user is presented with a receipt ## Expected behavior When an instance is submitted/sent in, isArchived on the instance should be set to true and the instance should be moved to the archived. ## Additional info App: ttd/pdp-test Env: AT21 Browser: Chrome 78
1.0
isArchived is not set to True when an instance is sent in - ## Describe the bug isArchived is not set to True when an instance is sent in by an user from SBL ## To Reproduce Steps to reproduce the behavior: 1. Login to AT21 and start a instance of a deployed app 2. Fill in data and send inn the instance 3. The receipt page is presented to the user 4. Navigate back to inbox and see that the instance is still available in the Inbox 5. Open the instance and click on 'Gå til skjema' and user is presented with a receipt ## Expected behavior When an instance is submitted/sent in, isArchived on the instance should be set to true and the instance should be moved to the archived. ## Additional info App: ttd/pdp-test Env: AT21 Browser: Chrome 78
non_priority
isarchived is not set to true when an instance is sent in describe the bug isarchived is not set to true when an instance is sent in by an user from sbl to reproduce steps to reproduce the behavior login to and start a instance of a deployed app fill in data and send inn the instance the receipt page is presented to the user navigate back to inbox and see that the instance is still available in the inbox open the instance and click on gå til skjema and user is presented with a receipt expected behavior when an instance is submitted sent in isarchived on the instance should be set to true and the instance should be moved to the archived additional info app ttd pdp test env browser chrome
0
44,903
9,658,568,826
IssuesEvent
2019-05-20 11:21:12
OpenXRay/xray-16
https://api.github.com/repos/OpenXRay/xray-16
closed
Split xrCore/ModuleLookup.cpp to Windows and Linux versions
Code Quality Core Developer Experience Infrastructure
Split the file to something like `ModuleLookupWindows.cpp` and `ModuleLookupLinux.cpp`
1.0
Split xrCore/ModuleLookup.cpp to Windows and Linux versions - Split the file to something like `ModuleLookupWindows.cpp` and `ModuleLookupLinux.cpp`
non_priority
split xrcore modulelookup cpp to windows and linux versions split the file to something like modulelookupwindows cpp and modulelookuplinux cpp
0
15,574
8,961,578,414
IssuesEvent
2019-01-28 10:02:18
bazelbuild/bazel
https://api.github.com/repos/bazelbuild/bazel
closed
[aquery] Add a label to TreeArtifact in text output
P2 team-Performance
### Description of the problem / feature request: It is useful for the users to know if an output artifact of an action is a TreeArtifact. We already have this information in the proto output. It should be added to the text output as well.
True
[aquery] Add a label to TreeArtifact in text output - ### Description of the problem / feature request: It is useful for the users to know if an output artifact of an action is a TreeArtifact. We already have this information in the proto output. It should be added to the text output as well.
non_priority
add a label to treeartifact in text output description of the problem feature request it is useful for the users to know if an output artifact of an action is a treeartifact we already have this information in the proto output it should be added to the text output as well
0
167,377
14,111,412,303
IssuesEvent
2020-11-07 00:09:47
JulianaMurillo1509/git_web_practice_branch
https://api.github.com/repos/JulianaMurillo1509/git_web_practice_branch
closed
Un commit que no sigue la convención de código o arreglo a realizar
documentation
La convención de código a seguir: `<Identificador comentario>: <Comentario>` Igualmente, solo hay 1 arreglo a realizar. Al realizar cada paso y completarlo se creará un issue con las instrucciones a realizar para continuar. Para realizar la corrección del mensaje de commit usar `git commit --amend` y `git commit push -f` El último commit tiene el siguiente mensaje: `fix_1` Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado.
1.0
Un commit que no sigue la convención de código o arreglo a realizar - La convención de código a seguir: `<Identificador comentario>: <Comentario>` Igualmente, solo hay 1 arreglo a realizar. Al realizar cada paso y completarlo se creará un issue con las instrucciones a realizar para continuar. Para realizar la corrección del mensaje de commit usar `git commit --amend` y `git commit push -f` El último commit tiene el siguiente mensaje: `fix_1` Este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado.
non_priority
un commit que no sigue la convención de código o arreglo a realizar la convención de código a seguir igualmente solo hay arreglo a realizar al realizar cada paso y completarlo se creará un issue con las instrucciones a realizar para continuar para realizar la corrección del mensaje de commit usar git commit amend y git commit push f el último commit tiene el siguiente mensaje fix este issue es solo un recordatorio de la convención de comentarios en los commits y puede ser cerrado
0
133,540
12,543,844,814
IssuesEvent
2020-06-05 16:13:34
SE2-Busfahrer-SS20/SE2-Busfahrer-SS20
https://api.github.com/repos/SE2-Busfahrer-SS20/SE2-Busfahrer-SS20
closed
[E07 Story 04] - Schummelfunktion Refactoring/Testen/Dokumentation
Effort: 5 Test documentation
Schummelfunktion Refactoring/Testen/Dokumentation
1.0
[E07 Story 04] - Schummelfunktion Refactoring/Testen/Dokumentation - Schummelfunktion Refactoring/Testen/Dokumentation
non_priority
schummelfunktion refactoring testen dokumentation schummelfunktion refactoring testen dokumentation
0
22,135
6,229,488,462
IssuesEvent
2017-07-11 04:10:12
XceedBoucherS/TestImport5
https://api.github.com/repos/XceedBoucherS/TestImport5
closed
Do not handle PreviewMouseDown on PropertyItem
CodePlex
<b>emartin[CodePlex]</b> <br />Need expressed from patch 13449 ( http://wpftoolkit.codeplex.com/SourceControl/list/patches ) This handling is actually done to affect the quotIsSelectedquot property. Handling this event may interfere with the underlying editor that need to handle the MouseDown event too.
1.0
Do not handle PreviewMouseDown on PropertyItem - <b>emartin[CodePlex]</b> <br />Need expressed from patch 13449 ( http://wpftoolkit.codeplex.com/SourceControl/list/patches ) This handling is actually done to affect the quotIsSelectedquot property. Handling this event may interfere with the underlying editor that need to handle the MouseDown event too.
non_priority
do not handle previewmousedown on propertyitem emartin need expressed from patch this handling is actually done to affect the quotisselectedquot property handling this event may interfere with the underlying editor that need to handle the mousedown event too
0
136,792
11,083,736,704
IssuesEvent
2019-12-13 15:05:08
ipfs/go-ipfs
https://api.github.com/repos/ipfs/go-ipfs
opened
go-ipfs-api test timeout
test failure
The go-ipfs-api tests are timing out randomly when run against go-ipfs master (using CircleCI, at least). Example failure (no output): https://circleci.com/gh/ipfs/go-ipfs/22908
1.0
go-ipfs-api test timeout - The go-ipfs-api tests are timing out randomly when run against go-ipfs master (using CircleCI, at least). Example failure (no output): https://circleci.com/gh/ipfs/go-ipfs/22908
non_priority
go ipfs api test timeout the go ipfs api tests are timing out randomly when run against go ipfs master using circleci at least example failure no output
0
174,248
21,259,432,979
IssuesEvent
2022-04-13 01:21:44
GuyBarGil/WebGoat
https://api.github.com/repos/GuyBarGil/WebGoat
opened
WS-2019-0490 (High) detected in jcommander-1.72.jar
security vulnerability
## WS-2019-0490 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jcommander-1.72.jar</b></p></summary> <p>Command line parsing</p> <p>Library home page: <a href="http://jcommander.org">http://jcommander.org</a></p> <p>Path to dependency file: /webgoat-integration-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.72/jcommander-1.72.jar</p> <p> Dependency Hierarchy: - webgoat-server-8.2.1-SNAPSHOT.jar (Root Library) - webgoat-container-8.2.1-SNAPSHOT.jar - asciidoctorj-2.4.3.jar - :x: **jcommander-1.72.jar** (Vulnerable Library) <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS. <p>Publish Date: 2019-02-19 <p>URL: <a href=https://github.com/cbeust/jcommander/commit/3ae95595febbed9c13f367b6bda5c0be1c572c53>WS-2019-0490</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/cbeust/jcommander/issues/465">https://github.com/cbeust/jcommander/issues/465</a></p> <p>Release Date: 2019-02-19</p> <p>Fix Resolution: com.beust:jcommander:1.75</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
WS-2019-0490 (High) detected in jcommander-1.72.jar - ## WS-2019-0490 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jcommander-1.72.jar</b></p></summary> <p>Command line parsing</p> <p>Library home page: <a href="http://jcommander.org">http://jcommander.org</a></p> <p>Path to dependency file: /webgoat-integration-tests/pom.xml</p> <p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/beust/jcommander/1.72/jcommander-1.72.jar</p> <p> Dependency Hierarchy: - webgoat-server-8.2.1-SNAPSHOT.jar (Root Library) - webgoat-container-8.2.1-SNAPSHOT.jar - asciidoctorj-2.4.3.jar - :x: **jcommander-1.72.jar** (Vulnerable Library) <p>Found in base branch: <b>develop</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Inclusion of Functionality from Untrusted Control Sphere vulnerability found in jcommander before 1.75. jcommander resolving dependencies over HTTP instead of HTTPS. <p>Publish Date: 2019-02-19 <p>URL: <a href=https://github.com/cbeust/jcommander/commit/3ae95595febbed9c13f367b6bda5c0be1c572c53>WS-2019-0490</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/cbeust/jcommander/issues/465">https://github.com/cbeust/jcommander/issues/465</a></p> <p>Release Date: 2019-02-19</p> <p>Fix Resolution: com.beust:jcommander:1.75</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
ws high detected in jcommander jar ws high severity vulnerability vulnerable library jcommander jar command line parsing library home page a href path to dependency file webgoat integration tests pom xml path to vulnerable library home wss scanner repository com beust jcommander jcommander jar dependency hierarchy webgoat server snapshot jar root library webgoat container snapshot jar asciidoctorj jar x jcommander jar vulnerable library found in base branch develop vulnerability details inclusion of functionality from untrusted control sphere vulnerability found in jcommander before jcommander resolving dependencies over http instead of https publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com beust jcommander step up your open source security game with whitesource
0
278,530
30,702,347,396
IssuesEvent
2023-07-27 01:22:27
hshivhare67/kernel_v4.1.15_CVE-2019-10220
https://api.github.com/repos/hshivhare67/kernel_v4.1.15_CVE-2019-10220
closed
CVE-2016-7117 (Critical) detected in linuxlinux-4.4.302 - autoclosed
Mend: dependency security vulnerability
## CVE-2016-7117 - Critical Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.4.302</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. <p>Publish Date: 2016-10-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-7117>CVE-2016-7117</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">https://nvd.nist.gov/vuln/detail/CVE-2016-7117</a></p> <p>Release Date: 2016-10-10</p> <p>Fix Resolution: 4.5.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2016-7117 (Critical) detected in linuxlinux-4.4.302 - autoclosed - ## CVE-2016-7117 - Critical Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.4.302</b></p></summary> <p> <p>The Linux Kernel</p> <p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary> <p></p> <p> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/critical_vul.png?' width=19 height=20> Vulnerability Details</summary> <p> Use-after-free vulnerability in the __sys_recvmmsg function in net/socket.c in the Linux kernel before 4.5.2 allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing. <p>Publish Date: 2016-10-10 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2016-7117>CVE-2016-7117</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7117">https://nvd.nist.gov/vuln/detail/CVE-2016-7117</a></p> <p>Release Date: 2016-10-10</p> <p>Fix Resolution: 4.5.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve critical detected in linuxlinux autoclosed cve critical severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in base branch master vulnerable source files vulnerability details use after free vulnerability in the sys recvmmsg function in net socket c in the linux kernel before allows remote attackers to execute arbitrary code via vectors involving a recvmmsg system call that is mishandled during error processing publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend
0
126,132
16,980,083,288
IssuesEvent
2021-06-30 07:43:07
nextcloud/spreed
https://api.github.com/repos/nextcloud/spreed
closed
Add icons for Mark as read and unread
3. to review design
**Is your feature request related to a problem? Please describe.** There are no icons for both the "Mark as read" and "Mark as unread" context menu options which looks odd next to the other options which do have icons. **Describe the solution you'd like** Icons should be added for the "Mark as read" and "Mark as unread" options. **Additional context** ![image](https://user-images.githubusercontent.com/24800714/123720886-f9c36600-d839-11eb-8f48-7136bc85cc47.png) ![image](https://user-images.githubusercontent.com/24800714/123720894-fc25c000-d839-11eb-9352-c059201189cf.png)
1.0
Add icons for Mark as read and unread - **Is your feature request related to a problem? Please describe.** There are no icons for both the "Mark as read" and "Mark as unread" context menu options which looks odd next to the other options which do have icons. **Describe the solution you'd like** Icons should be added for the "Mark as read" and "Mark as unread" options. **Additional context** ![image](https://user-images.githubusercontent.com/24800714/123720886-f9c36600-d839-11eb-8f48-7136bc85cc47.png) ![image](https://user-images.githubusercontent.com/24800714/123720894-fc25c000-d839-11eb-9352-c059201189cf.png)
non_priority
add icons for mark as read and unread is your feature request related to a problem please describe there are no icons for both the mark as read and mark as unread context menu options which looks odd next to the other options which do have icons describe the solution you d like icons should be added for the mark as read and mark as unread options additional context
0
185,137
21,785,083,775
IssuesEvent
2022-05-14 02:25:35
turkdevops/angular
https://api.github.com/repos/turkdevops/angular
opened
CVE-2022-1650 (High) detected in eventsource-1.0.7.tgz
security vulnerability
## CVE-2022-1650 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eventsource-1.0.7.tgz</b></p></summary> <p>W3C compliant EventSource client for Node.js and browser (polyfill)</p> <p>Library home page: <a href="https://registry.npmjs.org/eventsource/-/eventsource-1.0.7.tgz">https://registry.npmjs.org/eventsource/-/eventsource-1.0.7.tgz</a></p> <p>Path to dependency file: /integration/cli-hello-world-lazy-rollup/package.json</p> <p>Path to vulnerable library: /integration/cli-hello-world-lazy-rollup/node_modules/eventsource/package.json,/integration/cli-hello-world-ivy-minimal/node_modules/eventsource/package.json,/integration/cli-hello-world-lazy/node_modules/eventsource/package.json,/integration/ng_update_migrations/node_modules/eventsource/package.json,/integration/trusted-types/node_modules/eventsource/package.json,/aio/node_modules/eventsource/package.json,/integration/cli-hello-world-ivy-compat/node_modules/eventsource/package.json,/integration/cli-hello-world/node_modules/eventsource/package.json,/integration/cli-hello-world-ivy-i18n/node_modules/eventsource/package.json,/node_modules/eventsource/package.json</p> <p> Dependency Hierarchy: - build-angular-0.1100.1.tgz (Root Library) - webpack-dev-server-3.11.0.tgz - sockjs-client-1.4.0.tgz - :x: **eventsource-1.0.7.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/angular/commit/c6aca37f442da8c55a02d7c53ccc58100ab004f3">c6aca37f442da8c55a02d7c53ccc58100ab004f3</a></p> <p>Found in base branch: <b>labs/router</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2. <p>Publish Date: 2022-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-1650>CVE-2022-1650</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/">https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/</a></p> <p>Release Date: 2022-05-12</p> <p>Fix Resolution: eventsource - 2.0.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-1650 (High) detected in eventsource-1.0.7.tgz - ## CVE-2022-1650 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eventsource-1.0.7.tgz</b></p></summary> <p>W3C compliant EventSource client for Node.js and browser (polyfill)</p> <p>Library home page: <a href="https://registry.npmjs.org/eventsource/-/eventsource-1.0.7.tgz">https://registry.npmjs.org/eventsource/-/eventsource-1.0.7.tgz</a></p> <p>Path to dependency file: /integration/cli-hello-world-lazy-rollup/package.json</p> <p>Path to vulnerable library: /integration/cli-hello-world-lazy-rollup/node_modules/eventsource/package.json,/integration/cli-hello-world-ivy-minimal/node_modules/eventsource/package.json,/integration/cli-hello-world-lazy/node_modules/eventsource/package.json,/integration/ng_update_migrations/node_modules/eventsource/package.json,/integration/trusted-types/node_modules/eventsource/package.json,/aio/node_modules/eventsource/package.json,/integration/cli-hello-world-ivy-compat/node_modules/eventsource/package.json,/integration/cli-hello-world/node_modules/eventsource/package.json,/integration/cli-hello-world-ivy-i18n/node_modules/eventsource/package.json,/node_modules/eventsource/package.json</p> <p> Dependency Hierarchy: - build-angular-0.1100.1.tgz (Root Library) - webpack-dev-server-3.11.0.tgz - sockjs-client-1.4.0.tgz - :x: **eventsource-1.0.7.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/turkdevops/angular/commit/c6aca37f442da8c55a02d7c53ccc58100ab004f3">c6aca37f442da8c55a02d7c53ccc58100ab004f3</a></p> <p>Found in base branch: <b>labs/router</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository eventsource/eventsource prior to v2.0.2. <p>Publish Date: 2022-05-12 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-1650>CVE-2022-1650</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/">https://huntr.dev/bounties/dc9e467f-be5d-4945-867d-1044d27e9b8e/</a></p> <p>Release Date: 2022-05-12</p> <p>Fix Resolution: eventsource - 2.0.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in eventsource tgz cve high severity vulnerability vulnerable library eventsource tgz compliant eventsource client for node js and browser polyfill library home page a href path to dependency file integration cli hello world lazy rollup package json path to vulnerable library integration cli hello world lazy rollup node modules eventsource package json integration cli hello world ivy minimal node modules eventsource package json integration cli hello world lazy node modules eventsource package json integration ng update migrations node modules eventsource package json integration trusted types node modules eventsource package json aio node modules eventsource package json integration cli hello world ivy compat node modules eventsource package json integration cli hello world node modules eventsource package json integration cli hello world ivy node modules eventsource package json node modules eventsource package json dependency hierarchy build angular tgz root library webpack dev server tgz sockjs client tgz x eventsource tgz vulnerable library found in head commit a href found in base branch labs router vulnerability details exposure of sensitive information to an unauthorized actor in github repository eventsource eventsource prior to publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution eventsource step up your open source security game with whitesource
0
152,494
19,685,361,295
IssuesEvent
2022-01-11 21:26:57
eclipse/rdf4j
https://api.github.com/repos/eclipse/rdf4j
closed
Upgrade to Spring 5.3.14
🐞 bug security dependencies
### Current Behavior Current 5.3 version may have a log injection vulnerability ### Expected Behavior Upgrade to latest patch version to fix the issue ### Steps To Reproduce _No response_ ### Version 3.7.4 ### Are you interested in contributing a solution yourself? Yes ### Anything else? https://spring.io/blog/2021/12/16/spring-framework-5-3-14-and-5-2-19-available-now https://tanzu.vmware.com/security/cve-2021-22096
True
Upgrade to Spring 5.3.14 - ### Current Behavior Current 5.3 version may have a log injection vulnerability ### Expected Behavior Upgrade to latest patch version to fix the issue ### Steps To Reproduce _No response_ ### Version 3.7.4 ### Are you interested in contributing a solution yourself? Yes ### Anything else? https://spring.io/blog/2021/12/16/spring-framework-5-3-14-and-5-2-19-available-now https://tanzu.vmware.com/security/cve-2021-22096
non_priority
upgrade to spring current behavior current version may have a log injection vulnerability expected behavior upgrade to latest patch version to fix the issue steps to reproduce no response version are you interested in contributing a solution yourself yes anything else
0
45,557
7,190,224,600
IssuesEvent
2018-02-02 16:32:40
CCI-MOC/hil
https://api.github.com/repos/CCI-MOC/hil
closed
More consistent terminology
cleanup documentation naming
There are a number of concepts in the HaaS that we have redundant names for throughout the code, which makes variable names less consistent and thus less predictable. Here are some examples: - [ ] name/label ...okay just the one example for now. We can edit this if/when we find more, I feel like they're there.
1.0
More consistent terminology - There are a number of concepts in the HaaS that we have redundant names for throughout the code, which makes variable names less consistent and thus less predictable. Here are some examples: - [ ] name/label ...okay just the one example for now. We can edit this if/when we find more, I feel like they're there.
non_priority
more consistent terminology there are a number of concepts in the haas that we have redundant names for throughout the code which makes variable names less consistent and thus less predictable here are some examples name label okay just the one example for now we can edit this if when we find more i feel like they re there
0
201,813
15,814,086,953
IssuesEvent
2021-04-05 08:51:47
asiisii/Fitness-Tracker
https://api.github.com/repos/asiisii/Fitness-Tracker
closed
Charts are not updating
bug documentation
When the date or week or the user name is changed, charts need to remove the orignal data, and update it with new data.
1.0
Charts are not updating - When the date or week or the user name is changed, charts need to remove the orignal data, and update it with new data.
non_priority
charts are not updating when the date or week or the user name is changed charts need to remove the orignal data and update it with new data
0
132,367
18,716,895,383
IssuesEvent
2021-11-03 06:48:21
woocommerce/woocommerce-gutenberg-products-block
https://api.github.com/repos/woocommerce/woocommerce-gutenberg-products-block
closed
Decide on and design template block placeholders for the editor
needs design category: fse 🔹 block-type: templates
## Context For the [WooCommerce Store Editing Templates v1](https://github.com/woocommerce/woocommerce-gutenberg-products-block/issues/4926), we're converting a set of WooCommerce PHP templates to a block each. Initially, the goal is not to create fully-featured blocks but instead create one basic block per PHP template that renders a placeholder in the editor and the template on the Frontend. ## Goal The goal of this particular issue is to decide on the placeholder design and copy for the editor. ## Ideas We created some basic prototypes to demonstrate the design challenge and offer some initial ideas on potential solutions. ### Option 1: simple text-based placeholder The first option would be to display a simple text-based placeholder that provides the merchant with an explanation that a) they are seeing a placeholder they can move and add blocks around and b) that the placeholder will be replaced by the related WooCommerce template on the Frontend. This simple option has a couple of key advantages: - Its compact size makes it easy for a merchant to move around and edit the page with other blocks. For example, if they'd like to move the template block into a column layout, it's easier to move a compact block than a prominent wireframe placeholder like below. - It's very straightforward to implement. Given that these placeholders are a temporary stopgap solution, it is at least up for debate on how much work should go into creating them. Note: we just used the `Notice` component inside the `Placeholder` component for the prototype here. As per [Block Editor Handbook](https://developer.wordpress.org/block-editor/reference-guides/components/notice/) it sounds like the `Notice` should only be used for top-level notices. We'd have to use something else here. <img width="500" alt="Screenshot 2021-10-14 at 16 34 16" src="https://user-images.githubusercontent.com/1562646/137440146-d24c2807-c2cc-49b5-99b4-ea4ded1ce4e1.png"> ### Option 2: text-based replica placeholder The second option is inspired by the recent effort of [unifying Site Editing block placeholders](https://github.com/WordPress/gutenberg/issues/35501). In situations in which the blocks have no data to reference, the blocks are now showing basic descriptions in place of where the relevant elements would be e.g. "Product title" where the title of the product would show. The main downsides of this option are: - Given that the placeholder mimics the actual template that will be rendered on the Frontend, the placeholder can get very large which makes it difficult for a merchant to move it around in the editor. The user experience arguably isn't great. - Implementing this option means we'll have to basically replicate each entire template in the editor. Given that these placeholders are a temporary stopgap solution, it is up for debate if this is worth the time commitment required. <img width="500" alt="Screenshot 2021-10-14 at 17 20 00" src="https://user-images.githubusercontent.com/1562646/137441560-f43d1b24-4fe0-4afd-894f-7495fd0470ad.png"> ### Option 3.1: wireframe replica placeholder The third option is inspired by the navigation block empty state placeholder. In situations in which the block has no data, it's showing a basic wireframe representation of the content. The main downsides of this option are: - Given that the placeholder mimics the actual template that will be rendered on the Frontend, the placeholder can get very large which makes it difficult for a merchant to move it around in the editor. The user experience arguably isn't great. - While this option is a little less involved than option 2, implementing this option still means we'll have to basically replicate each entire template in the editor. Given that these placeholders are a temporary stopgap solution, it is up for debate if this is worth the time commitment required. <img width="500" alt="Screenshot 2021-10-14 at 17 52 47" src="https://user-images.githubusercontent.com/1562646/137442283-975c8a26-fa4e-4204-a7e2-9c0e78173a25.png"> ### Option 3.2: image-based wireframe replica placeholder A potential solution to reducing the time investment for this option could be to just include an image wireframe representing the template. The assumption here is that designing these wireframes in Figma would probably be quicker than building out each wireframe with actual markup/styles? <img width="500" alt="Screenshot 2021-10-15 at 08 49 01" src="https://user-images.githubusercontent.com/1562646/137444374-13318db4-3967-4581-8e29-7331c28ab062.png">
1.0
Decide on and design template block placeholders for the editor - ## Context For the [WooCommerce Store Editing Templates v1](https://github.com/woocommerce/woocommerce-gutenberg-products-block/issues/4926), we're converting a set of WooCommerce PHP templates to a block each. Initially, the goal is not to create fully-featured blocks but instead create one basic block per PHP template that renders a placeholder in the editor and the template on the Frontend. ## Goal The goal of this particular issue is to decide on the placeholder design and copy for the editor. ## Ideas We created some basic prototypes to demonstrate the design challenge and offer some initial ideas on potential solutions. ### Option 1: simple text-based placeholder The first option would be to display a simple text-based placeholder that provides the merchant with an explanation that a) they are seeing a placeholder they can move and add blocks around and b) that the placeholder will be replaced by the related WooCommerce template on the Frontend. This simple option has a couple of key advantages: - Its compact size makes it easy for a merchant to move around and edit the page with other blocks. For example, if they'd like to move the template block into a column layout, it's easier to move a compact block than a prominent wireframe placeholder like below. - It's very straightforward to implement. Given that these placeholders are a temporary stopgap solution, it is at least up for debate on how much work should go into creating them. Note: we just used the `Notice` component inside the `Placeholder` component for the prototype here. As per [Block Editor Handbook](https://developer.wordpress.org/block-editor/reference-guides/components/notice/) it sounds like the `Notice` should only be used for top-level notices. We'd have to use something else here. <img width="500" alt="Screenshot 2021-10-14 at 16 34 16" src="https://user-images.githubusercontent.com/1562646/137440146-d24c2807-c2cc-49b5-99b4-ea4ded1ce4e1.png"> ### Option 2: text-based replica placeholder The second option is inspired by the recent effort of [unifying Site Editing block placeholders](https://github.com/WordPress/gutenberg/issues/35501). In situations in which the blocks have no data to reference, the blocks are now showing basic descriptions in place of where the relevant elements would be e.g. "Product title" where the title of the product would show. The main downsides of this option are: - Given that the placeholder mimics the actual template that will be rendered on the Frontend, the placeholder can get very large which makes it difficult for a merchant to move it around in the editor. The user experience arguably isn't great. - Implementing this option means we'll have to basically replicate each entire template in the editor. Given that these placeholders are a temporary stopgap solution, it is up for debate if this is worth the time commitment required. <img width="500" alt="Screenshot 2021-10-14 at 17 20 00" src="https://user-images.githubusercontent.com/1562646/137441560-f43d1b24-4fe0-4afd-894f-7495fd0470ad.png"> ### Option 3.1: wireframe replica placeholder The third option is inspired by the navigation block empty state placeholder. In situations in which the block has no data, it's showing a basic wireframe representation of the content. The main downsides of this option are: - Given that the placeholder mimics the actual template that will be rendered on the Frontend, the placeholder can get very large which makes it difficult for a merchant to move it around in the editor. The user experience arguably isn't great. - While this option is a little less involved than option 2, implementing this option still means we'll have to basically replicate each entire template in the editor. Given that these placeholders are a temporary stopgap solution, it is up for debate if this is worth the time commitment required. <img width="500" alt="Screenshot 2021-10-14 at 17 52 47" src="https://user-images.githubusercontent.com/1562646/137442283-975c8a26-fa4e-4204-a7e2-9c0e78173a25.png"> ### Option 3.2: image-based wireframe replica placeholder A potential solution to reducing the time investment for this option could be to just include an image wireframe representing the template. The assumption here is that designing these wireframes in Figma would probably be quicker than building out each wireframe with actual markup/styles? <img width="500" alt="Screenshot 2021-10-15 at 08 49 01" src="https://user-images.githubusercontent.com/1562646/137444374-13318db4-3967-4581-8e29-7331c28ab062.png">
non_priority
decide on and design template block placeholders for the editor context for the we re converting a set of woocommerce php templates to a block each initially the goal is not to create fully featured blocks but instead create one basic block per php template that renders a placeholder in the editor and the template on the frontend goal the goal of this particular issue is to decide on the placeholder design and copy for the editor ideas we created some basic prototypes to demonstrate the design challenge and offer some initial ideas on potential solutions option simple text based placeholder the first option would be to display a simple text based placeholder that provides the merchant with an explanation that a they are seeing a placeholder they can move and add blocks around and b that the placeholder will be replaced by the related woocommerce template on the frontend this simple option has a couple of key advantages its compact size makes it easy for a merchant to move around and edit the page with other blocks for example if they d like to move the template block into a column layout it s easier to move a compact block than a prominent wireframe placeholder like below it s very straightforward to implement given that these placeholders are a temporary stopgap solution it is at least up for debate on how much work should go into creating them note we just used the notice component inside the placeholder component for the prototype here as per it sounds like the notice should only be used for top level notices we d have to use something else here img width alt screenshot at src option text based replica placeholder the second option is inspired by the recent effort of in situations in which the blocks have no data to reference the blocks are now showing basic descriptions in place of where the relevant elements would be e g product title where the title of the product would show the main downsides of this option are given that the placeholder mimics the actual template that will be rendered on the frontend the placeholder can get very large which makes it difficult for a merchant to move it around in the editor the user experience arguably isn t great implementing this option means we ll have to basically replicate each entire template in the editor given that these placeholders are a temporary stopgap solution it is up for debate if this is worth the time commitment required img width alt screenshot at src option wireframe replica placeholder the third option is inspired by the navigation block empty state placeholder in situations in which the block has no data it s showing a basic wireframe representation of the content the main downsides of this option are given that the placeholder mimics the actual template that will be rendered on the frontend the placeholder can get very large which makes it difficult for a merchant to move it around in the editor the user experience arguably isn t great while this option is a little less involved than option implementing this option still means we ll have to basically replicate each entire template in the editor given that these placeholders are a temporary stopgap solution it is up for debate if this is worth the time commitment required img width alt screenshot at src option image based wireframe replica placeholder a potential solution to reducing the time investment for this option could be to just include an image wireframe representing the template the assumption here is that designing these wireframes in figma would probably be quicker than building out each wireframe with actual markup styles img width alt screenshot at src
0
121,973
12,138,355,449
IssuesEvent
2020-04-23 17:06:43
CTeX-org/ctex-kit
https://api.github.com/repos/CTeX-org/ctex-kit
closed
ctex: \CTEXifname 的名称和用法问题
ctex documentation
目前 `ctex` 文档中对 `\CTEXifname` 的说明如下: > `\CTEXifname` 用于根据当前章节的名字的有无设置不同的格式。……例如,设置章的标题有名字时左对齐,无名字时居中对齐,并且在标题后画一条横线。 但在代码部分的注释却是「用于判断当前标题是否有编号」,且从后续代码来看确实是用来判断是否有编号而非名字的。 所以,是否应当重新命名这一命令,或是仅仅修改文档?以及这一名称的由来有什么解释吗? 有关信息:`\CTEXifname` 是在 fbfc484f81c1a9568c02642c541d249562b74e26 引入的,之后基本没有做过修改。
1.0
ctex: \CTEXifname 的名称和用法问题 - 目前 `ctex` 文档中对 `\CTEXifname` 的说明如下: > `\CTEXifname` 用于根据当前章节的名字的有无设置不同的格式。……例如,设置章的标题有名字时左对齐,无名字时居中对齐,并且在标题后画一条横线。 但在代码部分的注释却是「用于判断当前标题是否有编号」,且从后续代码来看确实是用来判断是否有编号而非名字的。 所以,是否应当重新命名这一命令,或是仅仅修改文档?以及这一名称的由来有什么解释吗? 有关信息:`\CTEXifname` 是在 fbfc484f81c1a9568c02642c541d249562b74e26 引入的,之后基本没有做过修改。
non_priority
ctex ctexifname 的名称和用法问题 目前 ctex 文档中对 ctexifname 的说明如下: ctexifname 用于根据当前章节的名字的有无设置不同的格式。……例如,设置章的标题有名字时左对齐,无名字时居中对齐,并且在标题后画一条横线。 但在代码部分的注释却是「用于判断当前标题是否有编号」,且从后续代码来看确实是用来判断是否有编号而非名字的。 所以,是否应当重新命名这一命令,或是仅仅修改文档?以及这一名称的由来有什么解释吗? 有关信息: ctexifname 是在 引入的,之后基本没有做过修改。
0
112,679
14,273,563,399
IssuesEvent
2020-11-21 22:20:28
flutter/flutter
https://api.github.com/repos/flutter/flutter
closed
Implement material icon toggles
P4 f: material design framework severe: new feature
Icon and IconButton doesn't use colors from the current theme, it should probably read them from the primaryIconTheme property of the ThemeData. Also, by default the theme uses black and white colors while the material design spec says they should be gray.
1.0
Implement material icon toggles - Icon and IconButton doesn't use colors from the current theme, it should probably read them from the primaryIconTheme property of the ThemeData. Also, by default the theme uses black and white colors while the material design spec says they should be gray.
non_priority
implement material icon toggles icon and iconbutton doesn t use colors from the current theme it should probably read them from the primaryicontheme property of the themedata also by default the theme uses black and white colors while the material design spec says they should be gray
0
64,371
6,901,100,074
IssuesEvent
2017-11-25 01:40:53
alleyinteractive/wordpress-fieldmanager
https://api.github.com/repos/alleyinteractive/wordpress-fieldmanager
closed
Increase selector specificity for initializing display-if fields
needs-tests scope:display-if scope:field
As @danielbachhuber [noted](https://github.com/alleyinteractive/wordpress-fieldmanager/pull/399#discussion_r46553341), targeting any element with the `display-if` class has a high potential for false positives. We could reduce that potential by using a selector with some more FM-specific information.
1.0
Increase selector specificity for initializing display-if fields - As @danielbachhuber [noted](https://github.com/alleyinteractive/wordpress-fieldmanager/pull/399#discussion_r46553341), targeting any element with the `display-if` class has a high potential for false positives. We could reduce that potential by using a selector with some more FM-specific information.
non_priority
increase selector specificity for initializing display if fields as danielbachhuber targeting any element with the display if class has a high potential for false positives we could reduce that potential by using a selector with some more fm specific information
0
5,053
2,902,499,769
IssuesEvent
2015-06-18 07:27:15
excilys/androidannotations
https://api.github.com/repos/excilys/androidannotations
closed
REST POST
Documentation
There are no more arguments and file uploading example? I pass parameters through the following form, not accepted by the server. @Post("/user/register") @Accept(MediaType.APPLICATION_JSON) ResponseEntity<User> register(MultiValueMap multiValueMap); There is, if the multi-parameter and multi-file upload together, how do Sorry I could not find an example
1.0
REST POST - There are no more arguments and file uploading example? I pass parameters through the following form, not accepted by the server. @Post("/user/register") @Accept(MediaType.APPLICATION_JSON) ResponseEntity<User> register(MultiValueMap multiValueMap); There is, if the multi-parameter and multi-file upload together, how do Sorry I could not find an example
non_priority
rest post there are no more arguments and file uploading example i pass parameters through the following form not accepted by the server post user register accept mediatype application json responseentity register multivaluemap multivaluemap there is if the multi parameter and multi file upload together how do sorry i could not find an example
0
47,885
13,259,114,867
IssuesEvent
2020-08-20 16:16:11
tech256/jobs
https://api.github.com/repos/tech256/jobs
closed
Cyber Analyst (#1405711)
Active Clearance Required Cyber Security Hiring stale
PeopleTec is currently seeking a Cyber Analyst to support our Huntsville, AL location. PeopleTec is currently searching for a Cyber Analyst to support an Aviation customer in our Huntsville, AL location. The ideal candidate will be responsible for development of the Assess and Authorize package for various Aviation customer tactical systems. Candidate will also be responsible for the continuous monitoring and IV&V of these systems. The Cyber Analyst will be responsible for the development or updating of Risk Management Framework (RMF) documentation, standard operating procedures, policies and security instructions. Candidate will also be responsible for assisting in entering A&A data and documentation into eMASS and some system administration functions of aviation tactical systems. Required Skills/Experience: Strong communication and customer skills Knowledge of cyber security Background in IT or System administration Minimum of 6+ years of related work experience Knowledge of the Department of Defense Risk Management Framework (RMF) policies and procedures Excellent technical domain knowledge Great communication skills with peers and customers Ability to adapt to a dynamic customer-oriented environment Travel: Up to 20% Must be a U.S. Citizen An active DoD Secret clearance is required to perform this work. Candidates are required to have an active Secret clearance upon hire, and the ability to maintain this level of clearance during their employment. Education Requirements: BS degree in Computer Engineering, Cyber, or other technical domain 6+ years in system administration (10 years without degree) 1+ year in RMF and eMASS Physical Job Requirements: Must be able to lift and move up to 25lbs during hardware installations Desired Skills: Security+, CISSP, CEH, MCSE People First. Technology Always. PeopleTec, Inc. is an employee-owned small business founded in Huntsville, AL that provides exceptional customer support by employing and retaining a highly skilled workforce. Culture: The name "PeopleTec" was deliberately chosen to remind us of our core value system - our people. Our company's foundation was built on placing our employees and customers first. With an award-winning atmosphere, we have matured into a company that boasts the best and brightest across multiple technical fields. Career: At PeopleTec, we value your long-term goals. Whether it's through our continuing-education opportunities, our robust training programs, or our "People First" benefits package, PeopleTec truly believes that our best investments are our people. Come Experience It. EOE/Minorities/Females/Veterans/Disabled PeopleTec, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following email address, HR@peopletec.com and/or phone number (256.319.3800) to contact us about your interest in employment with PeopleTec, Inc. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, citizenship, ancestry, marital status, protected veteran status, disability status or any other status protected by federal, state, or local law. PeopleTec, Inc. participates in E-Verify. For more information, or to apply now, you must go to the website below. Please DO NOT email your resume to us as we only accept applications through our website. https://www.applicantpro.com/openings/peopletec/jobs/1405711-424912
True
Cyber Analyst (#1405711) - PeopleTec is currently seeking a Cyber Analyst to support our Huntsville, AL location. PeopleTec is currently searching for a Cyber Analyst to support an Aviation customer in our Huntsville, AL location. The ideal candidate will be responsible for development of the Assess and Authorize package for various Aviation customer tactical systems. Candidate will also be responsible for the continuous monitoring and IV&V of these systems. The Cyber Analyst will be responsible for the development or updating of Risk Management Framework (RMF) documentation, standard operating procedures, policies and security instructions. Candidate will also be responsible for assisting in entering A&A data and documentation into eMASS and some system administration functions of aviation tactical systems. Required Skills/Experience: Strong communication and customer skills Knowledge of cyber security Background in IT or System administration Minimum of 6+ years of related work experience Knowledge of the Department of Defense Risk Management Framework (RMF) policies and procedures Excellent technical domain knowledge Great communication skills with peers and customers Ability to adapt to a dynamic customer-oriented environment Travel: Up to 20% Must be a U.S. Citizen An active DoD Secret clearance is required to perform this work. Candidates are required to have an active Secret clearance upon hire, and the ability to maintain this level of clearance during their employment. Education Requirements: BS degree in Computer Engineering, Cyber, or other technical domain 6+ years in system administration (10 years without degree) 1+ year in RMF and eMASS Physical Job Requirements: Must be able to lift and move up to 25lbs during hardware installations Desired Skills: Security+, CISSP, CEH, MCSE People First. Technology Always. PeopleTec, Inc. is an employee-owned small business founded in Huntsville, AL that provides exceptional customer support by employing and retaining a highly skilled workforce. Culture: The name "PeopleTec" was deliberately chosen to remind us of our core value system - our people. Our company's foundation was built on placing our employees and customers first. With an award-winning atmosphere, we have matured into a company that boasts the best and brightest across multiple technical fields. Career: At PeopleTec, we value your long-term goals. Whether it's through our continuing-education opportunities, our robust training programs, or our "People First" benefits package, PeopleTec truly believes that our best investments are our people. Come Experience It. EOE/Minorities/Females/Veterans/Disabled PeopleTec, Inc. is an Equal Employment Opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures. If you have any difficulty using our online system and you need an accommodation due to a disability, you may use the following email address, HR@peopletec.com and/or phone number (256.319.3800) to contact us about your interest in employment with PeopleTec, Inc. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, genetic information, citizenship, ancestry, marital status, protected veteran status, disability status or any other status protected by federal, state, or local law. PeopleTec, Inc. participates in E-Verify. For more information, or to apply now, you must go to the website below. Please DO NOT email your resume to us as we only accept applications through our website. https://www.applicantpro.com/openings/peopletec/jobs/1405711-424912
non_priority
cyber analyst peopletec is currently seeking a cyber analyst to support our huntsville al location peopletec is currently searching for a cyber analyst to support an aviation customer in our huntsville al location the ideal candidate will be responsible for development of the assess and authorize package for various aviation customer tactical systems candidate will also be responsible for the continuous monitoring and iv v of these systems the cyber analyst will be responsible for the development or updating of risk management framework rmf documentation standard operating procedures policies and security instructions candidate will also be responsible for assisting in entering a a data and documentation into emass and some system administration functions of aviation tactical systems required skills experience strong communication and customer skills knowledge of cyber security background in it or system administration minimum of years of related work experience knowledge of the department of defense risk management framework rmf policies and procedures excellent technical domain knowledge great communication skills with peers and customers ability to adapt to a dynamic customer oriented environment travel up to must be a u s citizen an active dod secret clearance is required to perform this work candidates are required to have an active secret clearance upon hire and the ability to maintain this level of clearance during their employment education requirements bs degree in computer engineering cyber or other technical domain years in system administration years without degree year in rmf and emass physical job requirements must be able to lift and move up to during hardware installations desired skills security cissp ceh mcse people first technology always peopletec inc is an employee owned small business founded in huntsville al that provides exceptional customer support by employing and retaining a highly skilled workforce culture the name peopletec was deliberately chosen to remind us of our core value system our people our company s foundation was built on placing our employees and customers first with an award winning atmosphere we have matured into a company that boasts the best and brightest across multiple technical fields career at peopletec we value your long term goals whether it s through our continuing education opportunities our robust training programs or our people first benefits package peopletec truly believes that our best investments are our people come experience it eoe minorities females veterans disabled peopletec inc is an equal employment opportunity employer and provides reasonable accommodation for qualified individuals with disabilities and disabled veterans in its job application procedures if you have any difficulty using our online system and you need an accommodation due to a disability you may use the following email address hr peopletec com and or phone number to contact us about your interest in employment with peopletec inc all qualified applicants will receive consideration for employment without regard to race color religion sex sexual orientation gender identity national origin age genetic information citizenship ancestry marital status protected veteran status disability status or any other status protected by federal state or local law peopletec inc participates in e verify for more information or to apply now you must go to the website below please do not email your resume to us as we only accept applications through our website
0
20,701
27,385,849,614
IssuesEvent
2023-02-28 13:16:10
microsoftgraph/msgraph-metadata
https://api.github.com/repos/microsoftgraph/msgraph-metadata
closed
beta generation failing because of delta function
Generator: Metadata Preprocessor metadata-issue blocking
[beta weekly generation is currently failing](https://microsoftgraph.visualstudio.com/Graph%20Developer%20Experiences/_build/results?buildId=106293&view=logs&j=4c81e8e4-6eb9-5def-7261-b44ad0fc1b7d&t=163839c6-f69e-5b5d-39e2-5b38e97d3fe3) because [a delta function on directory objects was added](https://dev.azure.com/msazure/One/_git/AD-AggregatorService-Workloads/pullRequest/7582888#1676991425) which conflicts with the derived types delta functions. I believe we should introduce an xsl fix that removes the functions on the derived types, only for beta, only for kiota based SDK for the time being until the service fixes their definition to unblock our generation pipeline, but I'm open to feedback here first. CC @andrueastman @peombwa @irvinesunday
1.0
beta generation failing because of delta function - [beta weekly generation is currently failing](https://microsoftgraph.visualstudio.com/Graph%20Developer%20Experiences/_build/results?buildId=106293&view=logs&j=4c81e8e4-6eb9-5def-7261-b44ad0fc1b7d&t=163839c6-f69e-5b5d-39e2-5b38e97d3fe3) because [a delta function on directory objects was added](https://dev.azure.com/msazure/One/_git/AD-AggregatorService-Workloads/pullRequest/7582888#1676991425) which conflicts with the derived types delta functions. I believe we should introduce an xsl fix that removes the functions on the derived types, only for beta, only for kiota based SDK for the time being until the service fixes their definition to unblock our generation pipeline, but I'm open to feedback here first. CC @andrueastman @peombwa @irvinesunday
non_priority
beta generation failing because of delta function because which conflicts with the derived types delta functions i believe we should introduce an xsl fix that removes the functions on the derived types only for beta only for kiota based sdk for the time being until the service fixes their definition to unblock our generation pipeline but i m open to feedback here first cc andrueastman peombwa irvinesunday
0
38,209
5,168,753,999
IssuesEvent
2017-01-17 22:28:02
mozilla/activity-stream
https://api.github.com/repos/mozilla/activity-stream
closed
Add tests to make sure we add listeners for each event from content
Chore P3 Tests
Right now we don't actually have tests to make sure we've added listeners for every event content will send. We should make sure all actions defined in `common/action-manager`, such as `NOTIFY_USER_EVENT`, actually triggers a handler in the addon.
1.0
Add tests to make sure we add listeners for each event from content - Right now we don't actually have tests to make sure we've added listeners for every event content will send. We should make sure all actions defined in `common/action-manager`, such as `NOTIFY_USER_EVENT`, actually triggers a handler in the addon.
non_priority
add tests to make sure we add listeners for each event from content right now we don t actually have tests to make sure we ve added listeners for every event content will send we should make sure all actions defined in common action manager such as notify user event actually triggers a handler in the addon
0
262,984
19,850,257,377
IssuesEvent
2022-01-21 11:27:49
RaphaelNeubert/I5_GPS_Tracks
https://api.github.com/repos/RaphaelNeubert/I5_GPS_Tracks
opened
UC Tracks auflisten (Optionale Fortsetzung) Loeschen
documentation
Track loeschen als optionale Fortsetzung von UC Tracks auflisten hinzufuegen
1.0
UC Tracks auflisten (Optionale Fortsetzung) Loeschen - Track loeschen als optionale Fortsetzung von UC Tracks auflisten hinzufuegen
non_priority
uc tracks auflisten optionale fortsetzung loeschen track loeschen als optionale fortsetzung von uc tracks auflisten hinzufuegen
0
244,199
26,373,668,870
IssuesEvent
2023-01-11 23:16:44
snowdensb/job-dsl-plugin
https://api.github.com/repos/snowdensb/job-dsl-plugin
opened
CVE-2021-37533 (Medium) detected in commons-net-3.6.jar
security vulnerability
## CVE-2021-37533 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-net-3.6.jar</b></p></summary> <p>Apache Commons Net library contains a collection of network utilities and protocol implementations. Supported protocols include: Echo, Finger, FTP, NNTP, NTP, POP3(S), SMTP(S), Telnet, Whois</p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua_20210927190226_TRFFHW/downloadResource_SQXZWB/20210927190451/commons-net-3.6.jar</p> <p> Dependency Hierarchy: - jenkins-test-harness-2.60.jar (Root Library) - jenkins-test-harness-htmlunit-2.36.0-1.jar - :x: **commons-net-3.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/job-dsl-plugin/commit/2e8946fc25b6060b5637631b8813fe86b6da687a">2e8946fc25b6060b5637631b8813fe86b6da687a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. <p>Publish Date: 2022-12-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-37533>CVE-2021-37533</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2021-37533">https://www.cve.org/CVERecord?id=CVE-2021-37533</a></p> <p>Release Date: 2022-12-03</p> <p>Fix Resolution: commons-net:commons-net:3.9.0</p> </p> </details> <p></p>
True
CVE-2021-37533 (Medium) detected in commons-net-3.6.jar - ## CVE-2021-37533 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-net-3.6.jar</b></p></summary> <p>Apache Commons Net library contains a collection of network utilities and protocol implementations. Supported protocols include: Echo, Finger, FTP, NNTP, NTP, POP3(S), SMTP(S), Telnet, Whois</p> <p>Path to dependency file: /build.gradle</p> <p>Path to vulnerable library: /tmp/ws-ua_20210927190226_TRFFHW/downloadResource_SQXZWB/20210927190451/commons-net-3.6.jar</p> <p> Dependency Hierarchy: - jenkins-test-harness-2.60.jar (Root Library) - jenkins-test-harness-htmlunit-2.36.0-1.jar - :x: **commons-net-3.6.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/snowdensb/job-dsl-plugin/commit/2e8946fc25b6060b5637631b8813fe86b6da687a">2e8946fc25b6060b5637631b8813fe86b6da687a</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. <p>Publish Date: 2022-12-03 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-37533>CVE-2021-37533</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.cve.org/CVERecord?id=CVE-2021-37533">https://www.cve.org/CVERecord?id=CVE-2021-37533</a></p> <p>Release Date: 2022-12-03</p> <p>Fix Resolution: commons-net:commons-net:3.9.0</p> </p> </details> <p></p>
non_priority
cve medium detected in commons net jar cve medium severity vulnerability vulnerable library commons net jar apache commons net library contains a collection of network utilities and protocol implementations supported protocols include echo finger ftp nntp ntp s smtp s telnet whois path to dependency file build gradle path to vulnerable library tmp ws ua trffhw downloadresource sqxzwb commons net jar dependency hierarchy jenkins test harness jar root library jenkins test harness htmlunit jar x commons net jar vulnerable library found in head commit a href found in base branch master vulnerability details prior to apache commons net net s ftp client trusts the host from pasv response by default a malicious server can redirect the commons net code to use a different host but the user has to connect to the malicious server in the first place this may lead to leakage of information about services running on the private network of the client the default in version is now false to ignore such hosts as curl does see publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons net commons net
0
1,219
5,290,444,148
IssuesEvent
2017-02-08 19:54:35
reactphp/react
https://api.github.com/repos/reactphp/react
closed
Move Buffer to EventLoop component, add libevent implementation
architecture event-loop
The write buffer is currently in the Socket component. But it really is more general purpose. For libevent we can provide an implementation that uses [event_buffer_write](http://php.net/event_buffer_write), which may give us some speed improvements.
1.0
Move Buffer to EventLoop component, add libevent implementation - The write buffer is currently in the Socket component. But it really is more general purpose. For libevent we can provide an implementation that uses [event_buffer_write](http://php.net/event_buffer_write), which may give us some speed improvements.
non_priority
move buffer to eventloop component add libevent implementation the write buffer is currently in the socket component but it really is more general purpose for libevent we can provide an implementation that uses which may give us some speed improvements
0
401,685
27,335,962,739
IssuesEvent
2023-02-26 07:46:28
MLNLP-World/AI-Paper-Collector
https://api.github.com/repos/MLNLP-World/AI-Paper-Collector
closed
[Question]搜索的时候会出错怎么办
documentation
**Question** 本地和colab上执行都会出错,请问下这怎么解决呢 **Screenshots** Traceback (most recent call last): File "main.py", line 60, in <module> main() File "main.py", line 43, in main results = exec_search(indexes, candidates, query, mode, threshold, confs, limit) File "/content/AI-Paper-Collector/searcher.py", line 179, in exec_search results = exact_search(indexes, query, confs) File "/content/AI-Paper-Collector/searcher.py", line 86, in exact_search results = [item for item in indexes if query in item[1].lower()] File "/content/AI-Paper-Collector/searcher.py", line 86, in <listcomp> results = [item for item in indexes if query in item[1].lower()] AttributeError: 'dict' object has no attribute 'lower'
1.0
[Question]搜索的时候会出错怎么办 - **Question** 本地和colab上执行都会出错,请问下这怎么解决呢 **Screenshots** Traceback (most recent call last): File "main.py", line 60, in <module> main() File "main.py", line 43, in main results = exec_search(indexes, candidates, query, mode, threshold, confs, limit) File "/content/AI-Paper-Collector/searcher.py", line 179, in exec_search results = exact_search(indexes, query, confs) File "/content/AI-Paper-Collector/searcher.py", line 86, in exact_search results = [item for item in indexes if query in item[1].lower()] File "/content/AI-Paper-Collector/searcher.py", line 86, in <listcomp> results = [item for item in indexes if query in item[1].lower()] AttributeError: 'dict' object has no attribute 'lower'
non_priority
搜索的时候会出错怎么办 question 本地和colab上执行都会出错,请问下这怎么解决呢 screenshots traceback most recent call last file main py line in main file main py line in main results exec search indexes candidates query mode threshold confs limit file content ai paper collector searcher py line in exec search results exact search indexes query confs file content ai paper collector searcher py line in exact search results lower file content ai paper collector searcher py line in results lower attributeerror dict object has no attribute lower
0
92,256
11,616,199,230
IssuesEvent
2020-02-26 15:21:22
nextcloud/mail
https://api.github.com/repos/nextcloud/mail
closed
Dark theme in mail app
1. to develop design help wanted papercut
*Note: I don't know if I should post here or on mail tracker. I can repost if needed.* ### Actual behaviour With Dark theme enabled, I see the following inconsistencies: * Folder icons are still black ![black_icon](https://user-images.githubusercontent.com/1039753/49704672-3694c680-fc16-11e8-9df8-c14f77fd7b5e.png) * Text in message panel containing "From XX to YY" is still black. * Multipart messages with HTML are displayed with black font. Default font color should be light grey. * Lack of contrast on HTML mails (see below screenshots of the same mail) ![mail_dark](https://user-images.githubusercontent.com/1039753/49704650-ed447700-fc15-11e8-98ba-4b047932f4ec.png) ![mail_white](https://user-images.githubusercontent.com/1039753/49704651-ed447700-fc15-11e8-8c37-0b2aaf4d1dbb.png) ### Server configuration Nextcloud 14.0.4 Mail app 0.11.0 <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/67268610-dark-theme-in-mail-app?utm_campaign=plugin&utm_content=tracker%2F44154351&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F44154351&utm_medium=issues&utm_source=github). </bountysource-plugin>
1.0
Dark theme in mail app - *Note: I don't know if I should post here or on mail tracker. I can repost if needed.* ### Actual behaviour With Dark theme enabled, I see the following inconsistencies: * Folder icons are still black ![black_icon](https://user-images.githubusercontent.com/1039753/49704672-3694c680-fc16-11e8-9df8-c14f77fd7b5e.png) * Text in message panel containing "From XX to YY" is still black. * Multipart messages with HTML are displayed with black font. Default font color should be light grey. * Lack of contrast on HTML mails (see below screenshots of the same mail) ![mail_dark](https://user-images.githubusercontent.com/1039753/49704650-ed447700-fc15-11e8-98ba-4b047932f4ec.png) ![mail_white](https://user-images.githubusercontent.com/1039753/49704651-ed447700-fc15-11e8-8c37-0b2aaf4d1dbb.png) ### Server configuration Nextcloud 14.0.4 Mail app 0.11.0 <bountysource-plugin> --- Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/67268610-dark-theme-in-mail-app?utm_campaign=plugin&utm_content=tracker%2F44154351&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F44154351&utm_medium=issues&utm_source=github). </bountysource-plugin>
non_priority
dark theme in mail app note i don t know if i should post here or on mail tracker i can repost if needed actual behaviour with dark theme enabled i see the following inconsistencies folder icons are still black text in message panel containing from xx to yy is still black multipart messages with html are displayed with black font default font color should be light grey lack of contrast on html mails see below screenshots of the same mail server configuration nextcloud mail app want to back this issue we accept bounties via
0
148,918
19,560,731,417
IssuesEvent
2022-01-03 15:52:56
shaimael/Webgoat
https://api.github.com/repos/shaimael/Webgoat
opened
CVE-2021-21342 (High) detected in xstream-1.4.5.jar
security vulnerability
## CVE-2021-21342 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Path to dependency file: /webgoat-lessons/vulnerable-components/pom.xml</p> <p>Path to vulnerable library: /m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shaimael/Webgoat/commit/06d8d0b5bb8a459ba3d47f61a64fe00c62662d81">06d8d0b5bb8a459ba3d47f61a64fe00c62662d81</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342>CVE-2021-21342</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m">https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":["/webgoat-lessons/vulnerable-components/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-21342","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
True
CVE-2021-21342 (High) detected in xstream-1.4.5.jar - ## CVE-2021-21342 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>xstream-1.4.5.jar</b></p></summary> <p>XStream is a serialization library from Java objects to XML and back.</p> <p>Path to dependency file: /webgoat-lessons/vulnerable-components/pom.xml</p> <p>Path to vulnerable library: /m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar,/home/wss-scanner/.m2/repository/com/thoughtworks/xstream/xstream/1.4.5/xstream-1.4.5.jar</p> <p> Dependency Hierarchy: - :x: **xstream-1.4.5.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/shaimael/Webgoat/commit/06d8d0b5bb8a459ba3d47f61a64fe00c62662d81">06d8d0b5bb8a459ba3d47f61a64fe00c62662d81</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types. If you rely on XStream's default blacklist of the Security Framework, you will have to use at least version 1.4.16. <p>Publish Date: 2021-03-23 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342>CVE-2021-21342</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.1</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m">https://github.com/x-stream/xstream/security/advisories/GHSA-hvv8-336g-rx3m</a></p> <p>Release Date: 2021-03-23</p> <p>Fix Resolution: com.thoughtworks.xstream:xstream:1.4.16</p> </p> </details> <p></p> *** :rescue_worker_helmet: Automatic Remediation is available for this issue <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.thoughtworks.xstream","packageName":"xstream","packageVersion":"1.4.5","packageFilePaths":["/webgoat-lessons/vulnerable-components/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.thoughtworks.xstream:xstream:1.4.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.thoughtworks.xstream:xstream:1.4.16","isBinary":false}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2021-21342","vulnerabilityDetails":"XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.16, there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects. XStream creates therefore new instances based on these type information. An attacker can manipulate the processed input stream and replace or inject objects, that result in a server-side forgery request. No user is affected, who followed the recommendation to setup XStream\u0027s security framework with a whitelist limited to the minimal required types. If you rely on XStream\u0027s default blacklist of the Security Framework, you will have to use at least version 1.4.16.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-21342","cvss3Severity":"high","cvss3Score":"9.1","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in xstream jar cve high severity vulnerability vulnerable library xstream jar xstream is a serialization library from java objects to xml and back path to dependency file webgoat lessons vulnerable components pom xml path to vulnerable library repository com thoughtworks xstream xstream xstream jar home wss scanner repository com thoughtworks xstream xstream xstream jar home wss scanner repository com thoughtworks xstream xstream xstream jar dependency hierarchy x xstream jar vulnerable library found in head commit a href found in base branch main vulnerability details xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects xstream creates therefore new instances based on these type information an attacker can manipulate the processed input stream and replace or inject objects that result in a server side forgery request no user is affected who followed the recommendation to setup xstream s security framework with a whitelist limited to the minimal required types if you rely on xstream s default blacklist of the security framework you will have to use at least version publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com thoughtworks xstream xstream rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree com thoughtworks xstream xstream isminimumfixversionavailable true minimumfixversion com thoughtworks xstream xstream isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails xstream is a java library to serialize objects to xml and back again in xstream before version there is a vulnerability where the processed stream at unmarshalling time contains type information to recreate the formerly written objects xstream creates therefore new instances based on these type information an attacker can manipulate the processed input stream and replace or inject objects that result in a server side forgery request no user is affected who followed the recommendation to setup xstream security framework with a whitelist limited to the minimal required types if you rely on xstream default blacklist of the security framework you will have to use at least version vulnerabilityurl
0
342,973
24,762,961,532
IssuesEvent
2022-10-22 06:08:32
ryan-way/newgameplus
https://api.github.com/repos/ryan-way/newgameplus
closed
Game Architecture Requirements
documentation
- Persistence - Logging - Monitoring (data gathering) - Allow for long running jobs
1.0
Game Architecture Requirements - - Persistence - Logging - Monitoring (data gathering) - Allow for long running jobs
non_priority
game architecture requirements persistence logging monitoring data gathering allow for long running jobs
0
23,200
7,297,651,164
IssuesEvent
2018-02-26 14:51:14
debrief/debrief
https://api.github.com/repos/debrief/debrief
opened
Improved Twitter posting
build help wanted
We send automated Tweets on new releases. But, they're very boring Tweets: ![screen shot 2018-02-26 at 14 49 10](https://user-images.githubusercontent.com/1108513/36676671-3e05bf12-1b04-11e8-8cd4-38c4d51d8e35.png) We should follow an improved process. I think it's currently done by IFTTT. We should try to extend/modify the function to: * include an image, if there is on in the Release notes * include more descriptive text. I could make the first para an overview, and we us the first para for the body of the tweet.
1.0
Improved Twitter posting - We send automated Tweets on new releases. But, they're very boring Tweets: ![screen shot 2018-02-26 at 14 49 10](https://user-images.githubusercontent.com/1108513/36676671-3e05bf12-1b04-11e8-8cd4-38c4d51d8e35.png) We should follow an improved process. I think it's currently done by IFTTT. We should try to extend/modify the function to: * include an image, if there is on in the Release notes * include more descriptive text. I could make the first para an overview, and we us the first para for the body of the tweet.
non_priority
improved twitter posting we send automated tweets on new releases but they re very boring tweets we should follow an improved process i think it s currently done by ifttt we should try to extend modify the function to include an image if there is on in the release notes include more descriptive text i could make the first para an overview and we us the first para for the body of the tweet
0
161,222
12,534,179,299
IssuesEvent
2020-06-04 18:57:05
astropy/astropy
https://api.github.com/repos/astropy/astropy
closed
tox -e codestyle fails on astropy/_erfa/core.py
Bug Docs testing
<!-- This comments are hidden when you submit the issue, so you do not need to remove them! --> <!-- Please be sure to check out our contributing guidelines, https://github.com/astropy/astropy/blob/master/CONTRIBUTING.md . Please be sure to check out our code of conduct, https://github.com/astropy/astropy/blob/master/CODE_OF_CONDUCT.md . --> <!-- Please have a search on our GitHub repository to see if a similar issue has already been posted. If a similar issue is closed, have a quick look to see if you are satisfied by the resolution. If not please go ahead and open an issue! --> <!-- Please check that the development version still produces the same bug. You can install development version with pip install git+https://github.com/astropy/astropy command. --> ### Description <!-- Provide a general description of the bug. --> `tox -e codestyle` always fails with a huge stream of code style violations in `astropy/_erfa/core.py`. This renders it largely useless for checking my own code for style violations. I assume the file is auto-generated, so simply telling the job to ignore code style violations in that file might solve the problem. If not, a once-over with `black` or `autopep8` would probably resolve the issue. ### Expected behavior <!-- What did you expect to happen. --> `tox -e codestyle` succeeds on a clean master. ### Actual behavior <!-- What actually happened. --> <!-- Was the output confusing or poorly described? --> ``` ... astropy/_erfa/core.py:20058:37: W291 trailing whitespace astropy/_erfa/core.py:20101:37: W291 trailing whitespace astropy/_erfa/core.py:20146:37: W291 trailing whitespace astropy/_erfa/core.py:20187:37: W291 trailing whitespace astropy/_erfa/core.py:20231:37: W291 trailing whitespace astropy/_erfa/core.py:20272:37: W291 trailing whitespace astropy/_erfa/core.py:20342:22: W292 no newline at end of file 244 ERROR: InvocationError for command /home/archibald/projects/astropy/astropy/.tox/codestyle/bin/flake8 astropy --count --select=E101,W191,W291,W292,W293,W391,E111,E112,E113,E30,E502,E722,E901,E902,E999,F822,F823 (exited with code 1) _______________________________________________________ summary _______________________________________________________ ERROR: codestyle: commands failed ``` ### Steps to Reproduce <!-- Ideally a code example could be provided so we can run it ourselves. --> <!-- If you are pasting code, use triple backticks (```) around your code snippet. --> <!-- If necessary, sanitize your screen output to be pasted so you do not reveal secrets like tokens and passwords. --> ```sh tox -e codestyle ``` ### System Details <!-- Even if you do not think this is necessary, it is useful information for the maintainers. Please run the following snippet and paste the output below: import platform; print(platform.platform()) import sys; print("Python", sys.version) import numpy; print("Numpy", numpy.__version__) import astropy; print("astropy", astropy.__version__) import scipy; print("Scipy", scipy.__version__) import matplotlib; print("Matplotlib", matplotlib.__version__) --> ``` >>> import platform; print(platform.platform()) Linux-5.4.0-33-generic-x86_64-with-glibc2.29 >>> import sys; print("Python", sys.version) Python 3.8.2 (default, Apr 27 2020, 15:53:34) [GCC 9.3.0] >>> import numpy; print("Numpy", numpy.__version__) Numpy 1.18.4 >>> import astropy; print("astropy", astropy.__version__) astropy 4.2.dev162+gd0a1e469f >>> import scipy; print("Scipy", scipy.__version__) Scipy 1.4.1 >>> import matplotlib; print("Matplotlib", matplotlib.__version__) Matplotlib 3.2.1 ```
1.0
tox -e codestyle fails on astropy/_erfa/core.py - <!-- This comments are hidden when you submit the issue, so you do not need to remove them! --> <!-- Please be sure to check out our contributing guidelines, https://github.com/astropy/astropy/blob/master/CONTRIBUTING.md . Please be sure to check out our code of conduct, https://github.com/astropy/astropy/blob/master/CODE_OF_CONDUCT.md . --> <!-- Please have a search on our GitHub repository to see if a similar issue has already been posted. If a similar issue is closed, have a quick look to see if you are satisfied by the resolution. If not please go ahead and open an issue! --> <!-- Please check that the development version still produces the same bug. You can install development version with pip install git+https://github.com/astropy/astropy command. --> ### Description <!-- Provide a general description of the bug. --> `tox -e codestyle` always fails with a huge stream of code style violations in `astropy/_erfa/core.py`. This renders it largely useless for checking my own code for style violations. I assume the file is auto-generated, so simply telling the job to ignore code style violations in that file might solve the problem. If not, a once-over with `black` or `autopep8` would probably resolve the issue. ### Expected behavior <!-- What did you expect to happen. --> `tox -e codestyle` succeeds on a clean master. ### Actual behavior <!-- What actually happened. --> <!-- Was the output confusing or poorly described? --> ``` ... astropy/_erfa/core.py:20058:37: W291 trailing whitespace astropy/_erfa/core.py:20101:37: W291 trailing whitespace astropy/_erfa/core.py:20146:37: W291 trailing whitespace astropy/_erfa/core.py:20187:37: W291 trailing whitespace astropy/_erfa/core.py:20231:37: W291 trailing whitespace astropy/_erfa/core.py:20272:37: W291 trailing whitespace astropy/_erfa/core.py:20342:22: W292 no newline at end of file 244 ERROR: InvocationError for command /home/archibald/projects/astropy/astropy/.tox/codestyle/bin/flake8 astropy --count --select=E101,W191,W291,W292,W293,W391,E111,E112,E113,E30,E502,E722,E901,E902,E999,F822,F823 (exited with code 1) _______________________________________________________ summary _______________________________________________________ ERROR: codestyle: commands failed ``` ### Steps to Reproduce <!-- Ideally a code example could be provided so we can run it ourselves. --> <!-- If you are pasting code, use triple backticks (```) around your code snippet. --> <!-- If necessary, sanitize your screen output to be pasted so you do not reveal secrets like tokens and passwords. --> ```sh tox -e codestyle ``` ### System Details <!-- Even if you do not think this is necessary, it is useful information for the maintainers. Please run the following snippet and paste the output below: import platform; print(platform.platform()) import sys; print("Python", sys.version) import numpy; print("Numpy", numpy.__version__) import astropy; print("astropy", astropy.__version__) import scipy; print("Scipy", scipy.__version__) import matplotlib; print("Matplotlib", matplotlib.__version__) --> ``` >>> import platform; print(platform.platform()) Linux-5.4.0-33-generic-x86_64-with-glibc2.29 >>> import sys; print("Python", sys.version) Python 3.8.2 (default, Apr 27 2020, 15:53:34) [GCC 9.3.0] >>> import numpy; print("Numpy", numpy.__version__) Numpy 1.18.4 >>> import astropy; print("astropy", astropy.__version__) astropy 4.2.dev162+gd0a1e469f >>> import scipy; print("Scipy", scipy.__version__) Scipy 1.4.1 >>> import matplotlib; print("Matplotlib", matplotlib.__version__) Matplotlib 3.2.1 ```
non_priority
tox e codestyle fails on astropy erfa core py this comments are hidden when you submit the issue so you do not need to remove them please be sure to check out our contributing guidelines please be sure to check out our code of conduct please have a search on our github repository to see if a similar issue has already been posted if a similar issue is closed have a quick look to see if you are satisfied by the resolution if not please go ahead and open an issue please check that the development version still produces the same bug you can install development version with pip install git command description tox e codestyle always fails with a huge stream of code style violations in astropy erfa core py this renders it largely useless for checking my own code for style violations i assume the file is auto generated so simply telling the job to ignore code style violations in that file might solve the problem if not a once over with black or would probably resolve the issue expected behavior tox e codestyle succeeds on a clean master actual behavior astropy erfa core py trailing whitespace astropy erfa core py trailing whitespace astropy erfa core py trailing whitespace astropy erfa core py trailing whitespace astropy erfa core py trailing whitespace astropy erfa core py trailing whitespace astropy erfa core py no newline at end of file error invocationerror for command home archibald projects astropy astropy tox codestyle bin astropy count select exited with code summary error codestyle commands failed steps to reproduce if you are pasting code use triple backticks around your code snippet if necessary sanitize your screen output to be pasted so you do not reveal secrets like tokens and passwords sh tox e codestyle system details even if you do not think this is necessary it is useful information for the maintainers please run the following snippet and paste the output below import platform print platform platform import sys print python sys version import numpy print numpy numpy version import astropy print astropy astropy version import scipy print scipy scipy version import matplotlib print matplotlib matplotlib version import platform print platform platform linux generic with import sys print python sys version python default apr import numpy print numpy numpy version numpy import astropy print astropy astropy version astropy import scipy print scipy scipy version scipy import matplotlib print matplotlib matplotlib version matplotlib
0
156,089
19,809,459,601
IssuesEvent
2022-01-19 10:35:00
benchmarkdebricked/angular
https://api.github.com/repos/benchmarkdebricked/angular
opened
CVE-2018-20834 (High) detected in tar-2.2.1.tgz
security vulnerability
## CVE-2018-20834 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-2.2.1.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p> Dependency Hierarchy: - compiler-cli-6.1.0.tgz (Root Library) - chokidar-1.7.0.tgz - fsevents-1.1.3.tgz - node-pre-gyp-0.6.39.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/benchmarkdebricked/angular/commit/d5d066ec5f183ee78b6a36dc6eaa6714647bc518">d5d066ec5f183ee78b6a36dc6eaa6714647bc518</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2). <p>Publish Date: 2019-04-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834>CVE-2018-20834</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 2.2.2,4.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2018-20834 (High) detected in tar-2.2.1.tgz - ## CVE-2018-20834 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tar-2.2.1.tgz</b></p></summary> <p>tar for node</p> <p>Library home page: <a href="https://registry.npmjs.org/tar/-/tar-2.2.1.tgz">https://registry.npmjs.org/tar/-/tar-2.2.1.tgz</a></p> <p> Dependency Hierarchy: - compiler-cli-6.1.0.tgz (Root Library) - chokidar-1.7.0.tgz - fsevents-1.1.3.tgz - node-pre-gyp-0.6.39.tgz - :x: **tar-2.2.1.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/benchmarkdebricked/angular/commit/d5d066ec5f183ee78b6a36dc6eaa6714647bc518">d5d066ec5f183ee78b6a36dc6eaa6714647bc518</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A vulnerability was found in node-tar before version 4.4.2 (excluding version 2.2.2). An Arbitrary File Overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system, in conjunction with a later plain file with the same name as the hardlink. This plain file content replaces the existing file content. A patch has been applied to node-tar v2.2.2). <p>Publish Date: 2019-04-30 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-20834>CVE-2018-20834</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16082</a></p> <p>Release Date: 2019-04-30</p> <p>Fix Resolution: 2.2.2,4.4.2</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in tar tgz cve high severity vulnerability vulnerable library tar tgz tar for node library home page a href dependency hierarchy compiler cli tgz root library chokidar tgz fsevents tgz node pre gyp tgz x tar tgz vulnerable library found in head commit a href vulnerability details a vulnerability was found in node tar before version excluding version an arbitrary file overwrite issue exists when extracting a tarball containing a hardlink to a file that already exists on the system in conjunction with a later plain file with the same name as the hardlink this plain file content replaces the existing file content a patch has been applied to node tar publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
65,927
12,697,398,558
IssuesEvent
2020-06-22 11:45:37
Abbassihraf/P-curiosity-LAB
https://api.github.com/repos/Abbassihraf/P-curiosity-LAB
opened
Learning center
Code
- All versions - [ ] include nav - [ ] latest projects webinars and posts - [ ] new Blog posts - [ ] popular blog posts - [ ] events - [ ] get started - [ ] include footer
1.0
Learning center - - All versions - [ ] include nav - [ ] latest projects webinars and posts - [ ] new Blog posts - [ ] popular blog posts - [ ] events - [ ] get started - [ ] include footer
non_priority
learning center all versions include nav latest projects webinars and posts new blog posts popular blog posts events get started include footer
0
127,367
17,263,574,501
IssuesEvent
2021-07-22 10:58:27
gitpod-io/gitpod
https://api.github.com/repos/gitpod-io/gitpod
closed
[Dashboard] Project Configuration
component: dashboard needs visual design 💄 roadmap item: teams & projects 🧑‍🚀 crew: teams and projects
Part of the [onboarding flow](https://www.notion.so/gitpod/Onboarding-Flow-bc21ce30f91c42b88bbce42ab58d17c2) (internal) after importing a git repository as a project is to guide users through the configuration steps in order to get them into a prebuilt ready-to-code dev environment. This includes a) configuring `.gitpod.yml` and `.gitpod.Dockerfile` for the project, b) triggering a prebuild, and c) allowing users to open a workspace afterwards.
1.0
[Dashboard] Project Configuration - Part of the [onboarding flow](https://www.notion.so/gitpod/Onboarding-Flow-bc21ce30f91c42b88bbce42ab58d17c2) (internal) after importing a git repository as a project is to guide users through the configuration steps in order to get them into a prebuilt ready-to-code dev environment. This includes a) configuring `.gitpod.yml` and `.gitpod.Dockerfile` for the project, b) triggering a prebuild, and c) allowing users to open a workspace afterwards.
non_priority
project configuration part of the internal after importing a git repository as a project is to guide users through the configuration steps in order to get them into a prebuilt ready to code dev environment this includes a configuring gitpod yml and gitpod dockerfile for the project b triggering a prebuild and c allowing users to open a workspace afterwards
0
490
7,022,469,429
IssuesEvent
2017-12-22 10:42:58
zcash/zcash
https://api.github.com/repos/zcash/zcash
opened
Improve serialization of MerklePath
portability protocol fragility
`MerklePath` contains vectors of `bool`. Currently, these are [directly serialized](https://github.com/zcash/zcash/blob/master/src/zcash/IncrementalMerkleTree.hpp#L15), which causes the `bool`s to be converted to `char`s [](https://github.com/zcash/zcash/blob/master/src/serialize.h#L230). This is an ambiguous serialization ([which prevents the MacOS CI builder from building](https://ci.z.cash/#/builders/16/builds/91/steps/3/logs/stdio)), but is also very inefficient. A more efficient format would be to use bit arrays ([see e.g. `CPartialMerkleTree` uses](https://github.com/zcash/zcash/blob/master/src/merkleblock.h#L91-L104)). One question I haven't yet determined the answer to is, where is `MerklePath` actually serialized? If it is being used, then migration will be trickier. If it isn't being used, then do we even need any code here? I don't currently recall whether #2120 (which *does* serialize related structures) might start using it.
True
Improve serialization of MerklePath - `MerklePath` contains vectors of `bool`. Currently, these are [directly serialized](https://github.com/zcash/zcash/blob/master/src/zcash/IncrementalMerkleTree.hpp#L15), which causes the `bool`s to be converted to `char`s [](https://github.com/zcash/zcash/blob/master/src/serialize.h#L230). This is an ambiguous serialization ([which prevents the MacOS CI builder from building](https://ci.z.cash/#/builders/16/builds/91/steps/3/logs/stdio)), but is also very inefficient. A more efficient format would be to use bit arrays ([see e.g. `CPartialMerkleTree` uses](https://github.com/zcash/zcash/blob/master/src/merkleblock.h#L91-L104)). One question I haven't yet determined the answer to is, where is `MerklePath` actually serialized? If it is being used, then migration will be trickier. If it isn't being used, then do we even need any code here? I don't currently recall whether #2120 (which *does* serialize related structures) might start using it.
non_priority
improve serialization of merklepath merklepath contains vectors of bool currently these are which causes the bool s to be converted to char s this is an ambiguous serialization but is also very inefficient a more efficient format would be to use bit arrays one question i haven t yet determined the answer to is where is merklepath actually serialized if it is being used then migration will be trickier if it isn t being used then do we even need any code here i don t currently recall whether which does serialize related structures might start using it
0
199,415
22,693,327,655
IssuesEvent
2022-07-05 01:13:40
Kijacode/dotfiles
https://api.github.com/repos/Kijacode/dotfiles
opened
CVE-2022-23302 (High) detected in org.apache.log4j_1.2.15.v201012070815.jar
security vulnerability
## CVE-2022-23302 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>org.apache.log4j_1.2.15.v201012070815.jar</b></p></summary> <p></p> <p>Library home page: <a href="http://eclipse.mirror.garr.it/mirrors/eclipse/webtools/downloads/drops/R3.16.0/S-3.16.0.M3-20191121172023/wtp-repo-S-3.16.0.M3-20191121172023.zip">http://eclipse.mirror.garr.it/mirrors/eclipse/webtools/downloads/drops/R3.16.0/S-3.16.0.M3-20191121172023/wtp-repo-S-3.16.0.M3-20191121172023.zip</a></p> <p>Path to vulnerable library: /.vscode/extensions/redhat.java-0.80.0/server/plugins/org.apache.log4j_1.2.15.v201012070815.jar</p> <p> Dependency Hierarchy: - :x: **org.apache.log4j_1.2.15.v201012070815.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Kijacode/dotfiles/commit/a1134e0d69c95f5b6b6bbfb161bbf263699292f0">a1134e0d69c95f5b6b6bbfb161bbf263699292f0</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23302>CVE-2022-23302</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2022-23302 (High) detected in org.apache.log4j_1.2.15.v201012070815.jar - ## CVE-2022-23302 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>org.apache.log4j_1.2.15.v201012070815.jar</b></p></summary> <p></p> <p>Library home page: <a href="http://eclipse.mirror.garr.it/mirrors/eclipse/webtools/downloads/drops/R3.16.0/S-3.16.0.M3-20191121172023/wtp-repo-S-3.16.0.M3-20191121172023.zip">http://eclipse.mirror.garr.it/mirrors/eclipse/webtools/downloads/drops/R3.16.0/S-3.16.0.M3-20191121172023/wtp-repo-S-3.16.0.M3-20191121172023.zip</a></p> <p>Path to vulnerable library: /.vscode/extensions/redhat.java-0.80.0/server/plugins/org.apache.log4j_1.2.15.v201012070815.jar</p> <p> Dependency Hierarchy: - :x: **org.apache.log4j_1.2.15.v201012070815.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/Kijacode/dotfiles/commit/a1134e0d69c95f5b6b6bbfb161bbf263699292f0">a1134e0d69c95f5b6b6bbfb161bbf263699292f0</a></p> <p>Found in base branch: <b>main</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> JMSSink in all versions of Log4j 1.x is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration or if the configuration references an LDAP service the attacker has access to. The attacker can provide a TopicConnectionFactoryBindingName configuration causing JMSSink to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-4104. Note this issue only affects Log4j 1.x when specifically configured to use JMSSink, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions. <p>Publish Date: 2022-01-18 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-23302>CVE-2022-23302</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://reload4j.qos.ch/">https://reload4j.qos.ch/</a></p> <p>Release Date: 2022-01-18</p> <p>Fix Resolution: ch.qos.reload4j:reload4j:1.2.18.1</p> </p> </details> <p></p> *** Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in org apache jar cve high severity vulnerability vulnerable library org apache jar library home page a href path to vulnerable library vscode extensions redhat java server plugins org apache jar dependency hierarchy x org apache jar vulnerable library found in head commit a href found in base branch main vulnerability details jmssink in all versions of x is vulnerable to deserialization of untrusted data when the attacker has write access to the configuration or if the configuration references an ldap service the attacker has access to the attacker can provide a topicconnectionfactorybindingname configuration causing jmssink to perform jndi requests that result in remote code execution in a similar fashion to cve note this issue only affects x when specifically configured to use jmssink which is not the default apache reached end of life in august users should upgrade to as it addresses numerous other issues from the previous versions publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ch qos step up your open source security game with mend
0