Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 957 | labels stringlengths 4 795 | body stringlengths 1 259k | index stringclasses 12
values | text_combine stringlengths 96 259k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
177,329 | 14,623,357,076 | IssuesEvent | 2020-12-23 03:07:00 | WSU-CASAS/AL | https://api.github.com/repos/WSU-CASAS/AL | opened | Don't generate statistical features for GPS sensors by default | documentation enhancement | We would not like to include the statistical features (mean, zero crossing, etc) for GPS sensors, as they do not provide much useful information (due to different peoples' GPS locations being different). Thus we would like to by default disable creating these features for GPS, with a flag to enable it in config if desired.
Some changes we want to make/consider:
- [ ] Add a configuration flag to check whether to generate statistical features on GPS in `config.py`
- [ ] Set flag to false by default
- [ ] Check the flag before generating statistical features in `features.create_point()`
- [ ] We still want to include the other location features (`distance`, `hcr`, etc)
- [ ] Verify that this will not affect the trained location model (both in `loc.py` training and in `label_loc()` | 1.0 | Don't generate statistical features for GPS sensors by default - We would not like to include the statistical features (mean, zero crossing, etc) for GPS sensors, as they do not provide much useful information (due to different peoples' GPS locations being different). Thus we would like to by default disable creating these features for GPS, with a flag to enable it in config if desired.
Some changes we want to make/consider:
- [ ] Add a configuration flag to check whether to generate statistical features on GPS in `config.py`
- [ ] Set flag to false by default
- [ ] Check the flag before generating statistical features in `features.create_point()`
- [ ] We still want to include the other location features (`distance`, `hcr`, etc)
- [ ] Verify that this will not affect the trained location model (both in `loc.py` training and in `label_loc()` | non_priority | don t generate statistical features for gps sensors by default we would not like to include the statistical features mean zero crossing etc for gps sensors as they do not provide much useful information due to different peoples gps locations being different thus we would like to by default disable creating these features for gps with a flag to enable it in config if desired some changes we want to make consider add a configuration flag to check whether to generate statistical features on gps in config py set flag to false by default check the flag before generating statistical features in features create point we still want to include the other location features distance hcr etc verify that this will not affect the trained location model both in loc py training and in label loc | 0 |
36,956 | 12,452,543,812 | IssuesEvent | 2020-05-27 12:28:54 | diennea/carapaceproxy | https://api.github.com/repos/diennea/carapaceproxy | closed | Carapace> possibility to change default pwd used by carapace to comunicate with the DB | Security enhancement | Currently, is not possible to change the default pwd used by Carapace for auth with the database.
So, if we change the db default pwd, Carapace will be not able to connect to database.
For security reason, i think is appropriate add posibility to set a custom pwd.
| True | Carapace> possibility to change default pwd used by carapace to comunicate with the DB - Currently, is not possible to change the default pwd used by Carapace for auth with the database.
So, if we change the db default pwd, Carapace will be not able to connect to database.
For security reason, i think is appropriate add posibility to set a custom pwd.
| non_priority | carapace possibility to change default pwd used by carapace to comunicate with the db currently is not possible to change the default pwd used by carapace for auth with the database so if we change the db default pwd carapace will be not able to connect to database for security reason i think is appropriate add posibility to set a custom pwd | 0 |
82,600 | 10,299,939,782 | IssuesEvent | 2019-08-28 11:47:22 | coderplex/donation-page | https://api.github.com/repos/coderplex/donation-page | closed | Add contribution.md file | documentation enhancement | - Specify how to run this project on local machine.
- Add contribution guidelines. | 1.0 | Add contribution.md file - - Specify how to run this project on local machine.
- Add contribution guidelines. | non_priority | add contribution md file specify how to run this project on local machine add contribution guidelines | 0 |
165,445 | 20,574,680,208 | IssuesEvent | 2022-03-04 02:23:38 | AlexRogalskiy/github-action-user-contribution | https://api.github.com/repos/AlexRogalskiy/github-action-user-contribution | closed | CVE-2022-0235 (Medium) detected in multiple libraries - autoclosed | security vulnerability | ## CVE-2022-0235 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-fetch-3.0.0-beta.9.tgz</b>, <b>node-fetch-2.6.6.tgz</b>, <b>node-fetch-2.6.1.tgz</b></p></summary>
<p>
<details><summary><b>node-fetch-3.0.0-beta.9.tgz</b></p></summary>
<p>A light-weight module that brings Fetch API to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-3.0.0-beta.9.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-3.0.0-beta.9.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/ky-universal/node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- monika-1.6.8.tgz (Root Library)
- mailgun.js-3.7.3.tgz
- ky-universal-0.8.2.tgz
- :x: **node-fetch-3.0.0-beta.9.tgz** (Vulnerable Library)
</details>
<details><summary><b>node-fetch-2.6.6.tgz</b></p></summary>
<p>A light-weight module that brings window.fetch to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.6.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/pkg-fetch/node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- monika-1.6.8.tgz (Root Library)
- pkg-5.5.1.tgz
- pkg-fetch-3.2.5.tgz
- :x: **node-fetch-2.6.6.tgz** (Vulnerable Library)
</details>
<details><summary><b>node-fetch-2.6.1.tgz</b></p></summary>
<p>A light-weight module that brings window.fetch to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-fetch-2.6.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/github-action-user-contribution/commit/a4aa5a5e60d0b7b24eeedb6e9b278a881096ba16">a4aa5a5e60d0b7b24eeedb6e9b278a881096ba16</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
<p>Publish Date: 2022-01-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235>CVE-2022-0235</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a></p>
<p>Release Date: 2022-01-16</p>
<p>Fix Resolution: 2.6.7</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-0235 (Medium) detected in multiple libraries - autoclosed - ## CVE-2022-0235 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>node-fetch-3.0.0-beta.9.tgz</b>, <b>node-fetch-2.6.6.tgz</b>, <b>node-fetch-2.6.1.tgz</b></p></summary>
<p>
<details><summary><b>node-fetch-3.0.0-beta.9.tgz</b></p></summary>
<p>A light-weight module that brings Fetch API to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-3.0.0-beta.9.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-3.0.0-beta.9.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/ky-universal/node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- monika-1.6.8.tgz (Root Library)
- mailgun.js-3.7.3.tgz
- ky-universal-0.8.2.tgz
- :x: **node-fetch-3.0.0-beta.9.tgz** (Vulnerable Library)
</details>
<details><summary><b>node-fetch-2.6.6.tgz</b></p></summary>
<p>A light-weight module that brings window.fetch to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.6.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.6.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/pkg-fetch/node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- monika-1.6.8.tgz (Root Library)
- pkg-5.5.1.tgz
- pkg-fetch-3.2.5.tgz
- :x: **node-fetch-2.6.6.tgz** (Vulnerable Library)
</details>
<details><summary><b>node-fetch-2.6.1.tgz</b></p></summary>
<p>A light-weight module that brings window.fetch to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- :x: **node-fetch-2.6.1.tgz** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/AlexRogalskiy/github-action-user-contribution/commit/a4aa5a5e60d0b7b24eeedb6e9b278a881096ba16">a4aa5a5e60d0b7b24eeedb6e9b278a881096ba16</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
<p>Publish Date: 2022-01-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235>CVE-2022-0235</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a></p>
<p>Release Date: 2022-01-16</p>
<p>Fix Resolution: 2.6.7</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in multiple libraries autoclosed cve medium severity vulnerability vulnerable libraries node fetch beta tgz node fetch tgz node fetch tgz node fetch beta tgz a light weight module that brings fetch api to node js library home page a href path to dependency file package json path to vulnerable library node modules ky universal node modules node fetch package json dependency hierarchy monika tgz root library mailgun js tgz ky universal tgz x node fetch beta tgz vulnerable library node fetch tgz a light weight module that brings window fetch to node js library home page a href path to dependency file package json path to vulnerable library node modules pkg fetch node modules node fetch package json dependency hierarchy monika tgz root library pkg tgz pkg fetch tgz x node fetch tgz vulnerable library node fetch tgz a light weight module that brings window fetch to node js library home page a href path to dependency file package json path to vulnerable library node modules node fetch package json dependency hierarchy x node fetch tgz vulnerable library found in head commit a href vulnerability details node fetch is vulnerable to exposure of sensitive information to an unauthorized actor publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
269,953 | 20,513,167,548 | IssuesEvent | 2022-03-01 09:04:35 | ssciwr/adaptivefiltering | https://api.github.com/repos/ssciwr/adaptivefiltering | opened | Import adaptivefiltering as af in example notebooks | documentation enhancement | The name `adaptivefiltering` is quite long. We should use the following in all examples:
```
import adaptivefiltering as af
ds = af.DataSet(...)
```
Will make it much more readable. | 1.0 | Import adaptivefiltering as af in example notebooks - The name `adaptivefiltering` is quite long. We should use the following in all examples:
```
import adaptivefiltering as af
ds = af.DataSet(...)
```
Will make it much more readable. | non_priority | import adaptivefiltering as af in example notebooks the name adaptivefiltering is quite long we should use the following in all examples import adaptivefiltering as af ds af dataset will make it much more readable | 0 |
40,792 | 16,546,017,196 | IssuesEvent | 2021-05-28 00:10:21 | microsoft/vscode-cpptools | https://api.github.com/repos/microsoft/vscode-cpptools | closed | Designated struct initializtion with default values gives an error | Language Service Visual Studio bug fixed (release pending) | **Type: LanguageService**
When working on an OpenGL wrapper I stumbled upon what seems to be either a bug in IntelliSense or a as of yet not implemented feature. When trying to use designated initializers for a struct, it would not work when the struct had default values. The code compiled happily, but IntelliSense gave me the error "class type not suitable for use with designators". More specifically, I get the error when one of the structs default values are omitted from the initialization. When initializing the entire struct it works fine.
- OS and Version: Kubuntu 20.04
- VS Code Version: 0.28.1
- C/C++ Extension Version: 1.45.1
**Silly example code**
```
// test.cpp
struct A {
int x = 0;
int y = 0;
int z = 0;
};
A func() {
return {
.y = 0, // error here
.z = 0,
};
}
```
Compiled with ```g++-10 test.cpp -c -std=c++2a```
**Expected behavior**
There should be no such error message. | 1.0 | Designated struct initializtion with default values gives an error - **Type: LanguageService**
When working on an OpenGL wrapper I stumbled upon what seems to be either a bug in IntelliSense or a as of yet not implemented feature. When trying to use designated initializers for a struct, it would not work when the struct had default values. The code compiled happily, but IntelliSense gave me the error "class type not suitable for use with designators". More specifically, I get the error when one of the structs default values are omitted from the initialization. When initializing the entire struct it works fine.
- OS and Version: Kubuntu 20.04
- VS Code Version: 0.28.1
- C/C++ Extension Version: 1.45.1
**Silly example code**
```
// test.cpp
struct A {
int x = 0;
int y = 0;
int z = 0;
};
A func() {
return {
.y = 0, // error here
.z = 0,
};
}
```
Compiled with ```g++-10 test.cpp -c -std=c++2a```
**Expected behavior**
There should be no such error message. | non_priority | designated struct initializtion with default values gives an error type languageservice when working on an opengl wrapper i stumbled upon what seems to be either a bug in intellisense or a as of yet not implemented feature when trying to use designated initializers for a struct it would not work when the struct had default values the code compiled happily but intellisense gave me the error class type not suitable for use with designators more specifically i get the error when one of the structs default values are omitted from the initialization when initializing the entire struct it works fine os and version kubuntu vs code version c c extension version silly example code test cpp struct a int x int y int z a func return y error here z compiled with g test cpp c std c expected behavior there should be no such error message | 0 |
61,986 | 7,540,926,119 | IssuesEvent | 2018-04-17 08:15:05 | owncloud/core | https://api.github.com/repos/owncloud/core | reopened | [9.0.3] [Accessibility] Feedback & Suggestions | design | One of our users analyzed our ownCloud instance for accessibility and we would be glad to share their conclusions with you.
> We are currently working to address the problems that can be fixed by changes in the theming. However, we would appreciate it if you could also work on improving the experience for challenged people.
- [ ] Some icons do not have tooltips (e.g. the magnifying glass or the trash bin) or the tooltips are not shown
- [ ] While using a screenreader the order in which the elements are read are confusing, as it is not the same order in which the elements are switched through the tabulator key
- [ ] When resizing the browser window (or small screens) elements can overlap each other and thus being hard to read or are not shown completely.
- [ ] The home-symbol does not navigate back to the home page, instead it leads to the root of the file system. A different icon might make the functionality more clear to the users
- [ ] More ways to access features of ownCloud would be good. Additionally a sitemap would help some users with navigating the site
- [ ] In the sidebar of the activity app no icons for the different filters are shown, while the files app utilizes icons
- [ ] Access keys will help with quick navigation of the site for users that can only use their keyboard
- [ ] The arrows for accessing the different apps and user options are hard to use for impaired users
- [ ] The way folders are opened is not intuitive, most users attempted to open a folder by clicking on its icon. However, that only selects the folder
- [ ] Highlighting certain elements with `<em>` or `<strong>`-tags would help users to quickly understand the page
- [ ] Tables lack a description of their content, e.g. by a summary attribute or caption tag.
I hope this information will help you improve ownCloud.
### Server configuration
**ownCloud version:** (see ownCloud admin page)
9.0.2
@owncloud/accessibility @owncloud/designers
00005848
| 1.0 | [9.0.3] [Accessibility] Feedback & Suggestions - One of our users analyzed our ownCloud instance for accessibility and we would be glad to share their conclusions with you.
> We are currently working to address the problems that can be fixed by changes in the theming. However, we would appreciate it if you could also work on improving the experience for challenged people.
- [ ] Some icons do not have tooltips (e.g. the magnifying glass or the trash bin) or the tooltips are not shown
- [ ] While using a screenreader the order in which the elements are read are confusing, as it is not the same order in which the elements are switched through the tabulator key
- [ ] When resizing the browser window (or small screens) elements can overlap each other and thus being hard to read or are not shown completely.
- [ ] The home-symbol does not navigate back to the home page, instead it leads to the root of the file system. A different icon might make the functionality more clear to the users
- [ ] More ways to access features of ownCloud would be good. Additionally a sitemap would help some users with navigating the site
- [ ] In the sidebar of the activity app no icons for the different filters are shown, while the files app utilizes icons
- [ ] Access keys will help with quick navigation of the site for users that can only use their keyboard
- [ ] The arrows for accessing the different apps and user options are hard to use for impaired users
- [ ] The way folders are opened is not intuitive, most users attempted to open a folder by clicking on its icon. However, that only selects the folder
- [ ] Highlighting certain elements with `<em>` or `<strong>`-tags would help users to quickly understand the page
- [ ] Tables lack a description of their content, e.g. by a summary attribute or caption tag.
I hope this information will help you improve ownCloud.
### Server configuration
**ownCloud version:** (see ownCloud admin page)
9.0.2
@owncloud/accessibility @owncloud/designers
00005848
| non_priority | feedback suggestions one of our users analyzed our owncloud instance for accessibility and we would be glad to share their conclusions with you we are currently working to address the problems that can be fixed by changes in the theming however we would appreciate it if you could also work on improving the experience for challenged people some icons do not have tooltips e g the magnifying glass or the trash bin or the tooltips are not shown while using a screenreader the order in which the elements are read are confusing as it is not the same order in which the elements are switched through the tabulator key when resizing the browser window or small screens elements can overlap each other and thus being hard to read or are not shown completely the home symbol does not navigate back to the home page instead it leads to the root of the file system a different icon might make the functionality more clear to the users more ways to access features of owncloud would be good additionally a sitemap would help some users with navigating the site in the sidebar of the activity app no icons for the different filters are shown while the files app utilizes icons access keys will help with quick navigation of the site for users that can only use their keyboard the arrows for accessing the different apps and user options are hard to use for impaired users the way folders are opened is not intuitive most users attempted to open a folder by clicking on its icon however that only selects the folder highlighting certain elements with or tags would help users to quickly understand the page tables lack a description of their content e g by a summary attribute or caption tag i hope this information will help you improve owncloud server configuration owncloud version see owncloud admin page owncloud accessibility owncloud designers | 0 |
26,927 | 4,833,485,607 | IssuesEvent | 2016-11-08 11:09:14 | primefaces/primeng | https://api.github.com/repos/primefaces/primeng | closed | Calendar 'onSelect' not fired on time change | defect | It seems that the `onSelect` event is not fired up if one only changes the **time** in a `p-calendar` with date and time. I didn't test with a time only calendar.
Is it possible to trigger it when time is also modified? | 1.0 | Calendar 'onSelect' not fired on time change - It seems that the `onSelect` event is not fired up if one only changes the **time** in a `p-calendar` with date and time. I didn't test with a time only calendar.
Is it possible to trigger it when time is also modified? | non_priority | calendar onselect not fired on time change it seems that the onselect event is not fired up if one only changes the time in a p calendar with date and time i didn t test with a time only calendar is it possible to trigger it when time is also modified | 0 |
80,247 | 10,166,452,476 | IssuesEvent | 2019-08-07 15:50:54 | hoobs-org/HOOBS | https://api.github.com/repos/hoobs-org/HOOBS | closed | Add readme - Credits | documentation | rocketsmarthome.com
HOOBS Hardware is Manufactured by rocketsmarthome.com
rocketsmarthome.com is the official Manufacturer of HOOBS in a Box and HOOBS on microSD.
Rocket Smart Home is an all-in-one home automation service provider with its own technology and certified installers.
The Smart Home solution for home or office with intuitive user interface.Connects your home with you – your home in just one app
Source: rocketsmarthome.com
homemanager-app.de
Homemanager-App takes care of the installation and administration of Homebridge, as well as acting as a collection point for global community knowledge in the future. (Easy Plugin configuration, Plugin ratings, project and more)
We work closely with HOOBS to make it as easy as possible for HOOBS customers to use our app in the future and to advance the global Homebridge community.
Support will be announced soon.
Source: homemanager-app.de
homebridge.io
HOOBS is based on Homebridge. Homebridge is a li | 1.0 | Add readme - Credits - rocketsmarthome.com
HOOBS Hardware is Manufactured by rocketsmarthome.com
rocketsmarthome.com is the official Manufacturer of HOOBS in a Box and HOOBS on microSD.
Rocket Smart Home is an all-in-one home automation service provider with its own technology and certified installers.
The Smart Home solution for home or office with intuitive user interface.Connects your home with you – your home in just one app
Source: rocketsmarthome.com
homemanager-app.de
Homemanager-App takes care of the installation and administration of Homebridge, as well as acting as a collection point for global community knowledge in the future. (Easy Plugin configuration, Plugin ratings, project and more)
We work closely with HOOBS to make it as easy as possible for HOOBS customers to use our app in the future and to advance the global Homebridge community.
Support will be announced soon.
Source: homemanager-app.de
homebridge.io
HOOBS is based on Homebridge. Homebridge is a li | non_priority | add readme credits rocketsmarthome com hoobs hardware is manufactured by rocketsmarthome com rocketsmarthome com is the official manufacturer of hoobs in a box and hoobs on microsd rocket smart home is an all in one home automation service provider with its own technology and certified installers the smart home solution for home or office with intuitive user interface connects your home with you – your home in just one app source rocketsmarthome com homemanager app de homemanager app takes care of the installation and administration of homebridge as well as acting as a collection point for global community knowledge in the future easy plugin configuration plugin ratings project and more we work closely with hoobs to make it as easy as possible for hoobs customers to use our app in the future and to advance the global homebridge community support will be announced soon source homemanager app de homebridge io hoobs is based on homebridge homebridge is a li | 0 |
138,473 | 18,793,935,998 | IssuesEvent | 2021-11-08 19:53:52 | Dima2022/hygieia-workflow-github-collector | https://api.github.com/repos/Dima2022/hygieia-workflow-github-collector | opened | CVE-2018-12023 (High) detected in jackson-databind-2.5.0.jar | security vulnerability | ## CVE-2018-12023 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.5.0.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: hygieia-workflow-github-collector/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.5.0/jackson-databind-2.5.0.jar</p>
<p>
Dependency Hierarchy:
- core-3.9.7.jar (Root Library)
- spring-boot-starter-web-1.3.0.RELEASE.jar
- :x: **jackson-databind-2.5.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Dima2022/hygieia-workflow-github-collector/commit/236baaa856b74774f7b43ecb1eeade5a8d1d0496">236baaa856b74774f7b43ecb1eeade5a8d1d0496</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12023>CVE-2018-12023</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: 2.7.9.4, 2.8.11.2, 2.9.6</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.5.0","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.capitalone.dashboard:core:3.9.7;org.springframework.boot:spring-boot-starter-web:1.3.0.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.5.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.4, 2.8.11.2, 2.9.6"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-12023","vulnerabilityDetails":"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12023","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2018-12023 (High) detected in jackson-databind-2.5.0.jar - ## CVE-2018-12023 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.5.0.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: hygieia-workflow-github-collector/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.5.0/jackson-databind-2.5.0.jar</p>
<p>
Dependency Hierarchy:
- core-3.9.7.jar (Root Library)
- spring-boot-starter-web-1.3.0.RELEASE.jar
- :x: **jackson-databind-2.5.0.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/Dima2022/hygieia-workflow-github-collector/commit/236baaa856b74774f7b43ecb1eeade5a8d1d0496">236baaa856b74774f7b43ecb1eeade5a8d1d0496</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.
<p>Publish Date: 2019-03-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12023>CVE-2018-12023</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12022</a></p>
<p>Release Date: 2019-03-21</p>
<p>Fix Resolution: 2.7.9.4, 2.8.11.2, 2.9.6</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.5.0","packageFilePaths":["/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.capitalone.dashboard:core:3.9.7;org.springframework.boot:spring-boot-starter-web:1.3.0.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.5.0","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.4, 2.8.11.2, 2.9.6"}],"baseBranches":["main"],"vulnerabilityIdentifier":"CVE-2018-12023","vulnerabilityDetails":"An issue was discovered in FasterXML jackson-databind prior to 2.7.9.4, 2.8.11.2, and 2.9.6. When Default Typing is enabled (either globally or for a specific property), the service has the Oracle JDBC jar in the classpath, and an attacker can provide an LDAP service to access, it is possible to make the service execute a malicious payload.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12023","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file hygieia workflow github collector pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy core jar root library spring boot starter web release jar x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details an issue was discovered in fasterxml jackson databind prior to and when default typing is enabled either globally or for a specific property the service has the oracle jdbc jar in the classpath and an attacker can provide an ldap service to access it is possible to make the service execute a malicious payload publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com capitalone dashboard core org springframework boot spring boot starter web release com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion basebranches vulnerabilityidentifier cve vulnerabilitydetails an issue was discovered in fasterxml jackson databind prior to and when default typing is enabled either globally or for a specific property the service has the oracle jdbc jar in the classpath and an attacker can provide an ldap service to access it is possible to make the service execute a malicious payload vulnerabilityurl | 0 |
8,752 | 12,289,692,371 | IssuesEvent | 2020-05-09 22:55:28 | topcoder-platform/challenge-engine-ui | https://api.github.com/repos/topcoder-platform/challenge-engine-ui | closed | Search > Search is not happening for single charecter | Functional May 7 Bug Hunt Not a requirement Rejected | **Describe the bug**
Search is not happening for single charecter.
**To Reproduce / Actual Behavior**
Steps to reproduce the behavior:
1. Go to https://challenges.topcoder-dev.com/
2. Click on Search text box
3. Enter only one charecter "x"
4. Press Enter in the keyboard
5. Search is not happening
**Expected behavior**
Search should happen even for single charecter
**Screenshots**
[Bug3_New.zip](https://github.com/topcoder-platform/challenge-engine-ui/files/4599734/Bug3_New.zip)
**Desktop (please complete the following information):**
- OS: Windows 10
- Browser Chrome
- Version 81
**Additional context**
Add any other context about the problem here.
| 1.0 | Search > Search is not happening for single charecter - **Describe the bug**
Search is not happening for single charecter.
**To Reproduce / Actual Behavior**
Steps to reproduce the behavior:
1. Go to https://challenges.topcoder-dev.com/
2. Click on Search text box
3. Enter only one charecter "x"
4. Press Enter in the keyboard
5. Search is not happening
**Expected behavior**
Search should happen even for single charecter
**Screenshots**
[Bug3_New.zip](https://github.com/topcoder-platform/challenge-engine-ui/files/4599734/Bug3_New.zip)
**Desktop (please complete the following information):**
- OS: Windows 10
- Browser Chrome
- Version 81
**Additional context**
Add any other context about the problem here.
| non_priority | search search is not happening for single charecter describe the bug search is not happening for single charecter to reproduce actual behavior steps to reproduce the behavior go to click on search text box enter only one charecter x press enter in the keyboard search is not happening expected behavior search should happen even for single charecter screenshots desktop please complete the following information os windows browser chrome version additional context add any other context about the problem here | 0 |
112,968 | 24,347,009,921 | IssuesEvent | 2022-10-02 13:00:03 | AmreshSinha/Spotify-Cards-API | https://api.github.com/repos/AmreshSinha/Spotify-Cards-API | closed | Adding create card button option for user. | good first issue codepeak stale | **Is your feature request related to a problem? Please describe.**
Currently, there is no input or create card button option in the page. User has to copy the API link and hit the end points after entering the data in the url to get the result.
**Describe the solution you'd like**
A feature can be implemented for the user. So that the user can type the song name and color code as desired and the result will be show on the same or new page. Similarly, for other option like for song id the input can be changed depending on the option chosen by the user. This will result in more user friendly UI.
Just a simple representation of the proposed feature.

**Describe alternatives you've considered**
No alternatives right now.
| 1.0 | Adding create card button option for user. - **Is your feature request related to a problem? Please describe.**
Currently, there is no input or create card button option in the page. User has to copy the API link and hit the end points after entering the data in the url to get the result.
**Describe the solution you'd like**
A feature can be implemented for the user. So that the user can type the song name and color code as desired and the result will be show on the same or new page. Similarly, for other option like for song id the input can be changed depending on the option chosen by the user. This will result in more user friendly UI.
Just a simple representation of the proposed feature.

**Describe alternatives you've considered**
No alternatives right now.
| non_priority | adding create card button option for user is your feature request related to a problem please describe currently there is no input or create card button option in the page user has to copy the api link and hit the end points after entering the data in the url to get the result describe the solution you d like a feature can be implemented for the user so that the user can type the song name and color code as desired and the result will be show on the same or new page similarly for other option like for song id the input can be changed depending on the option chosen by the user this will result in more user friendly ui just a simple representation of the proposed feature describe alternatives you ve considered no alternatives right now | 0 |
36,874 | 18,022,137,167 | IssuesEvent | 2021-09-16 20:56:37 | microsoft/AdaptiveCards | https://api.github.com/repos/microsoft/AdaptiveCards | closed | Consider templatizing access to JSON parser/producer | Area-Renderers Platform-Shared Model Request Area-Performance | Guys, as a C++ user I'm trying to adopt your object model (since I don't want to have to manually redo upcoming changes). In the process I feel I'm losing something by going from super-fast and good STL player rapidjson to your jsoncpp choice.
Since you've already isolated most usage of jsoncpp into the ParseUtils class, would you be interested in templatizing so each dev can choose their JSON backend and still make use of your updated model? I'm offering to undertake that but only if you're interested (and commit to merging).
Thanks for reading! | True | Consider templatizing access to JSON parser/producer - Guys, as a C++ user I'm trying to adopt your object model (since I don't want to have to manually redo upcoming changes). In the process I feel I'm losing something by going from super-fast and good STL player rapidjson to your jsoncpp choice.
Since you've already isolated most usage of jsoncpp into the ParseUtils class, would you be interested in templatizing so each dev can choose their JSON backend and still make use of your updated model? I'm offering to undertake that but only if you're interested (and commit to merging).
Thanks for reading! | non_priority | consider templatizing access to json parser producer guys as a c user i m trying to adopt your object model since i don t want to have to manually redo upcoming changes in the process i feel i m losing something by going from super fast and good stl player rapidjson to your jsoncpp choice since you ve already isolated most usage of jsoncpp into the parseutils class would you be interested in templatizing so each dev can choose their json backend and still make use of your updated model i m offering to undertake that but only if you re interested and commit to merging thanks for reading | 0 |
67,139 | 7,036,509,611 | IssuesEvent | 2017-12-28 09:14:35 | kingalois/friedmanng | https://api.github.com/repos/kingalois/friedmanng | closed | Create test for GraveOwner | Alois testing | @flomue99 and @jonasmuehleder
I wrote a example for a test of class GarevOwner . For implementation see Class GraveOwnerTest | 1.0 | Create test for GraveOwner - @flomue99 and @jonasmuehleder
I wrote a example for a test of class GarevOwner . For implementation see Class GraveOwnerTest | non_priority | create test for graveowner and jonasmuehleder i wrote a example for a test of class garevowner for implementation see class graveownertest | 0 |
99,501 | 16,446,403,819 | IssuesEvent | 2021-05-20 20:09:47 | snowdensb/nibrs | https://api.github.com/repos/snowdensb/nibrs | opened | CVE-2020-10673 (High) detected in multiple libraries | security vulnerability | ## CVE-2020-10673 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.9.5.jar</b>, <b>jackson-databind-2.8.10.jar</b>, <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.6.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.9.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/tools/nibrs-validate-common/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.5/jackson-databind-2.9.5.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.5/jackson-databind-2.9.5.jar</p>
<p>
Dependency Hierarchy:
- tika-parsers-1.18.jar (Root Library)
- :x: **jackson-databind-2.9.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.10.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/tools/nibrs-fbi-service/pom.xml</p>
<p>Path to vulnerable library: nibrs/tools/nibrs-fbi-service/target/nibrs-fbi-service-1.0.0/WEB-INF/lib/jackson-databind-2.8.10.jar,canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.10/jackson-databind-2.8.10.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.8.10.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/tools/nibrs-summary-report-common/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.5.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.6.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/web/nibrs-web/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,nibrs/web/nibrs-web/target/nibrs-web/WEB-INF/lib/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.6.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/snowdensb/nibrs/commit/e33ecd45d71662f63121c238ca1c416a6631a650">e33ecd45d71662f63121c238ca1c416a6631a650</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
<p>Publish Date: 2020-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673>CVE-2020-10673</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2660">https://github.com/FasterXML/jackson-databind/issues/2660</a></p>
<p>Release Date: 2020-03-18</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.5","packageFilePaths":["/tools/nibrs-validate-common/pom.xml","/tools/nibrs-flatfile/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.tika:tika-parsers:1.18;com.fasterxml.jackson.core:jackson-databind:2.9.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.10","packageFilePaths":["/tools/nibrs-fbi-service/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.8.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","packageFilePaths":["/tools/nibrs-summary-report-common/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:2.1.5.RELEASE;org.springframework.boot:spring-boot-starter-json:2.1.5.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.6","packageFilePaths":["/web/nibrs-web/pom.xml","/tools/nibrs-validation/pom.xml","/tools/nibrs-route/pom.xml","/tools/nibrs-summary-report/pom.xml","/tools/nibrs-xmlfile/pom.xml","/tools/nibrs-staging-data-common/pom.xml","/tools/nibrs-staging-data/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-10673","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-10673 (High) detected in multiple libraries - ## CVE-2020-10673 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.9.5.jar</b>, <b>jackson-databind-2.8.10.jar</b>, <b>jackson-databind-2.9.8.jar</b>, <b>jackson-databind-2.9.6.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.9.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/tools/nibrs-validate-common/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.5/jackson-databind-2.9.5.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.5/jackson-databind-2.9.5.jar</p>
<p>
Dependency Hierarchy:
- tika-parsers-1.18.jar (Root Library)
- :x: **jackson-databind-2.9.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.10.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/tools/nibrs-fbi-service/pom.xml</p>
<p>Path to vulnerable library: nibrs/tools/nibrs-fbi-service/target/nibrs-fbi-service-1.0.0/WEB-INF/lib/jackson-databind-2.8.10.jar,canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.8.10/jackson-databind-2.8.10.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.8.10.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/tools/nibrs-summary-report-common/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.8/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-2.1.5.RELEASE.jar (Root Library)
- spring-boot-starter-json-2.1.5.RELEASE.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.6.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: nibrs/web/nibrs-web/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,nibrs/web/nibrs-web/target/nibrs-web/WEB-INF/lib/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,canner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar,/home/wss-scanner/.m2/repository/com/fasterxml/jackson/core/jackson-databind/2.9.6/jackson-databind-2.9.6.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.9.6.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/snowdensb/nibrs/commit/e33ecd45d71662f63121c238ca1c416a6631a650">e33ecd45d71662f63121c238ca1c416a6631a650</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).
<p>Publish Date: 2020-03-18
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673>CVE-2020-10673</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2660">https://github.com/FasterXML/jackson-databind/issues/2660</a></p>
<p>Release Date: 2020-03-18</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.5","packageFilePaths":["/tools/nibrs-validate-common/pom.xml","/tools/nibrs-flatfile/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.apache.tika:tika-parsers:1.18;com.fasterxml.jackson.core:jackson-databind:2.9.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.10","packageFilePaths":["/tools/nibrs-fbi-service/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.8.10","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","packageFilePaths":["/tools/nibrs-summary-report-common/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:2.1.5.RELEASE;org.springframework.boot:spring-boot-starter-json:2.1.5.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.6","packageFilePaths":["/web/nibrs-web/pom.xml","/tools/nibrs-validation/pom.xml","/tools/nibrs-route/pom.xml","/tools/nibrs-summary-report/pom.xml","/tools/nibrs-xmlfile/pom.xml","/tools/nibrs-staging-data-common/pom.xml","/tools/nibrs-staging-data/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"com.fasterxml.jackson.core:jackson-databind:2.9.6","isMinimumFixVersionAvailable":true,"minimumFixVersion":"com.fasterxml.jackson.core:jackson-databind:2.9.10.4"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-10673","vulnerabilityDetails":"FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to com.caucho.config.types.ResourceRef (aka caucho-quercus).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10673","cvss3Severity":"high","cvss3Score":"8.8","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"Required","AV":"Network","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file nibrs tools nibrs validate common pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy tika parsers jar root library x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file nibrs tools nibrs fbi service pom xml path to vulnerable library nibrs tools nibrs fbi service target nibrs fbi service web inf lib jackson databind jar canner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file nibrs tools nibrs summary report common pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library spring boot starter json release jar x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file nibrs web nibrs web pom xml path to vulnerable library home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar nibrs web nibrs web target nibrs web web inf lib jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar canner repository com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar home wss scanner repository com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy x jackson databind jar vulnerable library found in head commit a href found in base branch master vulnerability details fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com caucho config types resourceref aka caucho quercus publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree org apache tika tika parsers com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency true dependencytree org springframework boot spring boot starter web release org springframework boot spring boot starter json release com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind packagetype java groupid com fasterxml jackson core packagename jackson databind packageversion packagefilepaths istransitivedependency false dependencytree com fasterxml jackson core jackson databind isminimumfixversionavailable true minimumfixversion com fasterxml jackson core jackson databind basebranches vulnerabilityidentifier cve vulnerabilitydetails fasterxml jackson databind x before mishandles the interaction between serialization gadgets and typing related to com caucho config types resourceref aka caucho quercus vulnerabilityurl | 0 |
270,894 | 29,145,871,083 | IssuesEvent | 2023-05-18 02:48:38 | aayant-mend/WebGoat | https://api.github.com/repos/aayant-mend/WebGoat | opened | commons-io-2.6.jar: 1 vulnerabilities (highest severity is: 4.8) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-io-2.6.jar</b></p></summary>
<p>The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/WebGoat/commit/edae3edcc9d33118c8b81a9be8bb3d975504b0d1">edae3edcc9d33118c8b81a9be8bb3d975504b0d1</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (commons-io version) | Fix PR available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 4.8 | commons-io-2.6.jar | Direct | 2.7 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-29425</summary>
### Vulnerable Library - <b>commons-io-2.6.jar</b></p>
<p>The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar</p>
<p>
Dependency Hierarchy:
- :x: **commons-io-2.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/WebGoat/commit/edae3edcc9d33118c8b81a9be8bb3d975504b0d1">edae3edcc9d33118c8b81a9be8bb3d975504b0d1</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
<p>Publish Date: 2021-04-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29425>CVE-2021-29425</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p>
<p>Release Date: 2021-04-13</p>
<p>Fix Resolution (commons-io): commons-io:commons-io:2.7</p>
<p>Direct dependency fix Resolution (commons-io:commons-io): 2.7</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | commons-io-2.6.jar: 1 vulnerabilities (highest severity is: 4.8) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-io-2.6.jar</b></p></summary>
<p>The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/WebGoat/commit/edae3edcc9d33118c8b81a9be8bb3d975504b0d1">edae3edcc9d33118c8b81a9be8bb3d975504b0d1</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (commons-io version) | Fix PR available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-29425](https://www.mend.io/vulnerability-database/CVE-2021-29425) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 4.8 | commons-io-2.6.jar | Direct | 2.7 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2021-29425</summary>
### Vulnerable Library - <b>commons-io-2.6.jar</b></p>
<p>The Apache Commons IO library contains utility classes, stream implementations, file filters,
file comparators, endian transformation classes, and much more.</p>
<p>Library home page: <a href="http://commons.apache.org/proper/commons-io/">http://commons.apache.org/proper/commons-io/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/commons-io/commons-io/2.6/commons-io-2.6.jar</p>
<p>
Dependency Hierarchy:
- :x: **commons-io-2.6.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/aayant-mend/WebGoat/commit/edae3edcc9d33118c8b81a9be8bb3d975504b0d1">edae3edcc9d33118c8b81a9be8bb3d975504b0d1</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
In Apache Commons IO before 2.7, When invoking the method FileNameUtils.normalize with an improper input string, like "//../foo", or "\\..\foo", the result would be the same value, thus possibly providing access to files in the parent directory, but not further above (thus "limited" path traversal), if the calling code would use the result to construct a path value.
<p>Publish Date: 2021-04-13
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-29425>CVE-2021-29425</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>4.8</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-29425</a></p>
<p>Release Date: 2021-04-13</p>
<p>Fix Resolution (commons-io): commons-io:commons-io:2.7</p>
<p>Direct dependency fix Resolution (commons-io:commons-io): 2.7</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_priority | commons io jar vulnerabilities highest severity is vulnerable library commons io jar the apache commons io library contains utility classes stream implementations file filters file comparators endian transformation classes and much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons io commons io commons io jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in commons io version fix pr available medium commons io jar direct details cve vulnerable library commons io jar the apache commons io library contains utility classes stream implementations file filters file comparators endian transformation classes and much more library home page a href path to dependency file pom xml path to vulnerable library home wss scanner repository commons io commons io commons io jar dependency hierarchy x commons io jar vulnerable library found in head commit a href found in base branch main vulnerability details in apache commons io before when invoking the method filenameutils normalize with an improper input string like foo or foo the result would be the same value thus possibly providing access to files in the parent directory but not further above thus limited path traversal if the calling code would use the result to construct a path value publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons io commons io commons io direct dependency fix resolution commons io commons io rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
64,320 | 18,431,727,008 | IssuesEvent | 2021-10-14 08:28:50 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | closed | Password reset modal text is double-escaped. | T-Defect P2 S-Minor Z-Rageshake A-Password-Reset | Reset your password - the password reset email send confirmation message reads:
"An email has been sent to XXX@XXX. Once you've followed the link it contains, click below."
The text has been double escaped. | 1.0 | Password reset modal text is double-escaped. - Reset your password - the password reset email send confirmation message reads:
"An email has been sent to XXX@XXX. Once you've followed the link it contains, click below."
The text has been double escaped. | non_priority | password reset modal text is double escaped reset your password the password reset email send confirmation message reads an email has been sent to xxx xxx once you ve followed the link it contains click below the text has been double escaped | 0 |
328,633 | 24,193,088,704 | IssuesEvent | 2022-09-23 19:48:58 | nextgenhealthcare/connect | https://api.github.com/repos/nextgenhealthcare/connect | opened | com.mirth.connect.connectors.file.FileReceiver: Error polling in channel | documentation | I have the following problem with the Mirth Connect application, in which this channel has communication with an SSH server.
Do you know what exactly it refers to?
ERROR 2022-09-14 22:18:21,274 [Timer-1] com.mirth.connect.connectors.file.FileReceiver: Error polling in channel: 0c708f73-8567-454a-84ff-3d11bfd70cd4
com.jcraft.jsch.JSchException: java.net.ConnectException: Connection timed out: connect
at com.jcraft.jsch.Util.createSocket(Util.java:389)
at com.jcraft.jsch.Session.connect(Session.java:215)
at com.mirth.connect.connectors.file.filesystems.SftpConnection.<init>(SftpConnection.java:115)
at com.mirth.connect.connectors.file.filesystems.FileSystemConnectionFactory.makeObject(FileSystemConnectionFactory.java:97)
at org.apache.commons.pool.impl.GenericObjectPool.borrowObject(GenericObjectPool.java:1188)
at com.mirth.connect.connectors.file.FileConnector.getConnection(FileConnector.java:197)
at com.mirth.connect.connectors.file.FileReceiver.listFiles(FileReceiver.java:538)
at com.mirth.connect.connectors.file.FileReceiver.poll(FileReceiver.java:192)
at com.mirth.connect.donkey.server.channel.PollConnector$PollConnectorTask.run(PollConnector.java:141)
at java.util.TimerThread.mainLoop(Unknown Source)
at java.util.TimerThread.run(Unknown Source)
| 1.0 | com.mirth.connect.connectors.file.FileReceiver: Error polling in channel - I have the following problem with the Mirth Connect application, in which this channel has communication with an SSH server.
Do you know what exactly it refers to?
ERROR 2022-09-14 22:18:21,274 [Timer-1] com.mirth.connect.connectors.file.FileReceiver: Error polling in channel: 0c708f73-8567-454a-84ff-3d11bfd70cd4
com.jcraft.jsch.JSchException: java.net.ConnectException: Connection timed out: connect
at com.jcraft.jsch.Util.createSocket(Util.java:389)
at com.jcraft.jsch.Session.connect(Session.java:215)
at com.mirth.connect.connectors.file.filesystems.SftpConnection.<init>(SftpConnection.java:115)
at com.mirth.connect.connectors.file.filesystems.FileSystemConnectionFactory.makeObject(FileSystemConnectionFactory.java:97)
at org.apache.commons.pool.impl.GenericObjectPool.borrowObject(GenericObjectPool.java:1188)
at com.mirth.connect.connectors.file.FileConnector.getConnection(FileConnector.java:197)
at com.mirth.connect.connectors.file.FileReceiver.listFiles(FileReceiver.java:538)
at com.mirth.connect.connectors.file.FileReceiver.poll(FileReceiver.java:192)
at com.mirth.connect.donkey.server.channel.PollConnector$PollConnectorTask.run(PollConnector.java:141)
at java.util.TimerThread.mainLoop(Unknown Source)
at java.util.TimerThread.run(Unknown Source)
| non_priority | com mirth connect connectors file filereceiver error polling in channel i have the following problem with the mirth connect application in which this channel has communication with an ssh server do you know what exactly it refers to error com mirth connect connectors file filereceiver error polling in channel com jcraft jsch jschexception java net connectexception connection timed out connect at com jcraft jsch util createsocket util java at com jcraft jsch session connect session java at com mirth connect connectors file filesystems sftpconnection sftpconnection java at com mirth connect connectors file filesystems filesystemconnectionfactory makeobject filesystemconnectionfactory java at org apache commons pool impl genericobjectpool borrowobject genericobjectpool java at com mirth connect connectors file fileconnector getconnection fileconnector java at com mirth connect connectors file filereceiver listfiles filereceiver java at com mirth connect connectors file filereceiver poll filereceiver java at com mirth connect donkey server channel pollconnector pollconnectortask run pollconnector java at java util timerthread mainloop unknown source at java util timerthread run unknown source | 0 |
21,951 | 11,660,542,783 | IssuesEvent | 2020-03-03 03:42:06 | cityofaustin/atd-data-tech | https://api.github.com/repos/cityofaustin/atd-data-tech | opened | VZV | Map | Overlays | Epic Need: 1-Must Have Product: Vision Zero Crash Data System Product: Vision Zero Viewer Project: Vision Zero Viewer Service: Dev Workgroup: VZ migrated | The overlays components in the map section of VZV allow users to see additional polygons and lines of special features. The four features that we will be allowing the user to enable are:
- High Injury Network
- Speed Limits
- Austin City Council Districts
- ASMP Street Level
Overlay rules:
- The user should only be able to display one overlay on the map at a time.
- All overlays should be inactive by default.
Below is the preliminary design of the VZV map view

*Migrated from [atd-vz-data #560](https://github.com/cityofaustin/atd-vz-data/issues/560)* | 1.0 | VZV | Map | Overlays - The overlays components in the map section of VZV allow users to see additional polygons and lines of special features. The four features that we will be allowing the user to enable are:
- High Injury Network
- Speed Limits
- Austin City Council Districts
- ASMP Street Level
Overlay rules:
- The user should only be able to display one overlay on the map at a time.
- All overlays should be inactive by default.
Below is the preliminary design of the VZV map view

*Migrated from [atd-vz-data #560](https://github.com/cityofaustin/atd-vz-data/issues/560)* | non_priority | vzv map overlays the overlays components in the map section of vzv allow users to see additional polygons and lines of special features the four features that we will be allowing the user to enable are high injury network speed limits austin city council districts asmp street level overlay rules the user should only be able to display one overlay on the map at a time all overlays should be inactive by default below is the preliminary design of the vzv map view migrated from | 0 |
681 | 2,564,467,070 | IssuesEvent | 2015-02-06 20:02:26 | nathan-rice/ctools | https://api.github.com/repos/nathan-rice/ctools | opened | Incorporate air infiltration model | Database Modification Dispersion code enhancement Medium | IE will provide new model code. This may involve reading additional inputs from an additional database, where census block level information is used to predict an average in-home exposure based on model ambient air concentrations. | 1.0 | Incorporate air infiltration model - IE will provide new model code. This may involve reading additional inputs from an additional database, where census block level information is used to predict an average in-home exposure based on model ambient air concentrations. | non_priority | incorporate air infiltration model ie will provide new model code this may involve reading additional inputs from an additional database where census block level information is used to predict an average in home exposure based on model ambient air concentrations | 0 |
44,138 | 9,544,238,007 | IssuesEvent | 2019-05-01 13:36:16 | bryangarner/GEOG575_Finalproject | https://api.github.com/repos/bryangarner/GEOG575_Finalproject | closed | Point Clustering | *Kevin* Code Web App | Look into point clustering options. See if it's something we want to implement.
Some links:
https://github.com/adammertel/Leaflet.MarkerCluster.PlacementStrategies
https://adammertel.github.io/Leaflet.MarkerCluster.PlacementStrategies/demo/demo1.html
https://github.com/jawj/OverlappingMarkerSpiderfier-Leaflet
http://jawj.github.io/OverlappingMarkerSpiderfier-Leaflet/demo.html
| 1.0 | Point Clustering - Look into point clustering options. See if it's something we want to implement.
Some links:
https://github.com/adammertel/Leaflet.MarkerCluster.PlacementStrategies
https://adammertel.github.io/Leaflet.MarkerCluster.PlacementStrategies/demo/demo1.html
https://github.com/jawj/OverlappingMarkerSpiderfier-Leaflet
http://jawj.github.io/OverlappingMarkerSpiderfier-Leaflet/demo.html
| non_priority | point clustering look into point clustering options see if it s something we want to implement some links | 0 |
171,046 | 13,214,320,099 | IssuesEvent | 2020-08-16 17:10:01 | duplicati/duplicati | https://api.github.com/repos/duplicati/duplicati | closed | S3 backup whitespace error | needs testing | Running on linux with version 2.0.0.73_preview_2014-11-11.
Fairly regularly, a backup to S3 gives the following error during a backup:
Operation Put with file duplicati-xxxxxx.dblock.zip.aes attempt 1 of 5 failed with message: Whitespace is required between PUBLIC id and SYSTEM id. Line 1, position 63. => Whitespace is required between PUBLIC id and SYSTEM id. Line 1, position 63.
Renaming "duplicati-xxxxxx.dblock.zip.aes" to "duplicati-yyyyyy.dblock.zip.aes"
Compacting remote backup ...
Compacting because there are 1 fully deletable volume(s)
Deleting file duplicati-xxxxxx.dblock.zip.aes ...
Deleted 1 files, which reduced storage by -1 bytes
##
<bountysource-plugin>
---
Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/7713292-s3-backup-whitespace-error?utm_campaign=plugin&utm_content=tracker%2F4870652&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F4870652&utm_medium=issues&utm_source=github).
</bountysource-plugin> | 1.0 | S3 backup whitespace error - Running on linux with version 2.0.0.73_preview_2014-11-11.
Fairly regularly, a backup to S3 gives the following error during a backup:
Operation Put with file duplicati-xxxxxx.dblock.zip.aes attempt 1 of 5 failed with message: Whitespace is required between PUBLIC id and SYSTEM id. Line 1, position 63. => Whitespace is required between PUBLIC id and SYSTEM id. Line 1, position 63.
Renaming "duplicati-xxxxxx.dblock.zip.aes" to "duplicati-yyyyyy.dblock.zip.aes"
Compacting remote backup ...
Compacting because there are 1 fully deletable volume(s)
Deleting file duplicati-xxxxxx.dblock.zip.aes ...
Deleted 1 files, which reduced storage by -1 bytes
##
<bountysource-plugin>
---
Want to back this issue? **[Post a bounty on it!](https://www.bountysource.com/issues/7713292-s3-backup-whitespace-error?utm_campaign=plugin&utm_content=tracker%2F4870652&utm_medium=issues&utm_source=github)** We accept bounties via [Bountysource](https://www.bountysource.com/?utm_campaign=plugin&utm_content=tracker%2F4870652&utm_medium=issues&utm_source=github).
</bountysource-plugin> | non_priority | backup whitespace error running on linux with version preview fairly regularly a backup to gives the following error during a backup operation put with file duplicati xxxxxx dblock zip aes attempt of failed with message whitespace is required between public id and system id line position whitespace is required between public id and system id line position renaming duplicati xxxxxx dblock zip aes to duplicati yyyyyy dblock zip aes compacting remote backup compacting because there are fully deletable volume s deleting file duplicati xxxxxx dblock zip aes deleted files which reduced storage by bytes want to back this issue we accept bounties via | 0 |
32,281 | 13,784,761,918 | IssuesEvent | 2020-10-08 21:26:48 | microsoft/vscode-cpptools | https://api.github.com/repos/microsoft/vscode-cpptools | closed | Add a command to filter out references by "type" | Feature Request Feature: Find All References Language Service Works in VS help wanted more votes needed | Currently all "types" of references are show in the "C/C++: References" output. It would be nice to have a command to filter out unwanted "types" -- however, from my experience, it seems like all the "types" are potentially useful to see...so let us know if you really don't be able to filter stuff out (or if anyone wants to implement this themselves in our open source TypeScript).
Also, we could potentially have a setting that move the types that are not "confirmed references" into the References Results -- but since there's no way to tell what the "types" are that seems like it would be too confusing.
| 1.0 | Add a command to filter out references by "type" - Currently all "types" of references are show in the "C/C++: References" output. It would be nice to have a command to filter out unwanted "types" -- however, from my experience, it seems like all the "types" are potentially useful to see...so let us know if you really don't be able to filter stuff out (or if anyone wants to implement this themselves in our open source TypeScript).
Also, we could potentially have a setting that move the types that are not "confirmed references" into the References Results -- but since there's no way to tell what the "types" are that seems like it would be too confusing.
| non_priority | add a command to filter out references by type currently all types of references are show in the c c references output it would be nice to have a command to filter out unwanted types however from my experience it seems like all the types are potentially useful to see so let us know if you really don t be able to filter stuff out or if anyone wants to implement this themselves in our open source typescript also we could potentially have a setting that move the types that are not confirmed references into the references results but since there s no way to tell what the types are that seems like it would be too confusing | 0 |
193,662 | 22,216,251,637 | IssuesEvent | 2022-06-08 02:11:13 | maddyCode23/linux-4.1.15 | https://api.github.com/repos/maddyCode23/linux-4.1.15 | reopened | CVE-2017-5551 (Medium) detected in linux-stable-rtv4.1.33 | security vulnerability | ## CVE-2017-5551 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
<p>Publish Date: 2017-02-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5551>CVE-2017-5551</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">https://nvd.nist.gov/vuln/detail/CVE-2017-5551</a></p>
<p>Release Date: 2017-02-06</p>
<p>Fix Resolution: 4.9.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2017-5551 (Medium) detected in linux-stable-rtv4.1.33 - ## CVE-2017-5551 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (1)</summary>
<p></p>
<p>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The simple_set_acl function in fs/posix_acl.c in the Linux kernel before 4.9.6 preserves the setgid bit during a setxattr call involving a tmpfs filesystem, which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-7097.
<p>Publish Date: 2017-02-06
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-5551>CVE-2017-5551</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2017-5551">https://nvd.nist.gov/vuln/detail/CVE-2017-5551</a></p>
<p>Release Date: 2017-02-06</p>
<p>Fix Resolution: 4.9.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files vulnerability details the simple set acl function in fs posix acl c in the linux kernel before preserves the setgid bit during a setxattr call involving a tmpfs filesystem which allows local users to gain group privileges by leveraging the existence of a setgid program with restrictions on execute permissions note this vulnerability exists because of an incomplete fix for cve publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
22,638 | 7,196,882,944 | IssuesEvent | 2018-02-05 06:18:55 | ShaikASK/Testing | https://api.github.com/repos/ShaikASK/Testing | closed | Workflow : drag and drop complete folder documents are missing | Build version#5 Defect P1 SumFive Team | Steps To Replicate ::
1.Launch the url :http://192.168.1.197:3000/#
2.Login as HR Admin user
3.Select 'Work Flows' menu
4. Navigate to 'Folders' menu and create a folder with few document
5. Navigate to Work flow menu
6.Click on add (+) symbol displayed adjacent to workflow
7.Click on Add Steps >> Drag complete folder and drop into the step
Experienced Behavior : Observed that only folder got added but the document files inside the folder are missing
Expected Behavior : Ensure that upon adding/dragging and dropping a folder respective documents also should be added into the step
| 1.0 | Workflow : drag and drop complete folder documents are missing - Steps To Replicate ::
1.Launch the url :http://192.168.1.197:3000/#
2.Login as HR Admin user
3.Select 'Work Flows' menu
4. Navigate to 'Folders' menu and create a folder with few document
5. Navigate to Work flow menu
6.Click on add (+) symbol displayed adjacent to workflow
7.Click on Add Steps >> Drag complete folder and drop into the step
Experienced Behavior : Observed that only folder got added but the document files inside the folder are missing
Expected Behavior : Ensure that upon adding/dragging and dropping a folder respective documents also should be added into the step
| non_priority | workflow drag and drop complete folder documents are missing steps to replicate launch the url login as hr admin user select work flows menu navigate to folders menu and create a folder with few document navigate to work flow menu click on add symbol displayed adjacent to workflow click on add steps drag complete folder and drop into the step experienced behavior observed that only folder got added but the document files inside the folder are missing expected behavior ensure that upon adding dragging and dropping a folder respective documents also should be added into the step | 0 |
73,552 | 9,670,203,481 | IssuesEvent | 2019-05-21 19:18:07 | hashicorp/terraform | https://api.github.com/repos/hashicorp/terraform | closed | TF_CLI_CONFIG_FILE not respected | documentation | <!--
Hi there,
Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.
If your issue relates to a specific Terraform provider, please open it in the provider's own repository. The index of providers is at https://github.com/terraform-providers .
-->
### Terraform Version
<!---
Run `terraform -v` to show the version, and paste the result between the ``` marks below.
If you are not running the latest version of Terraform, please try upgrading because your issue may have already been fixed.
-->
```
0.11.14
```
### Debug Output
See line 4
```
2019/05/21 14:28:22 [INFO] Terraform version: 0.11.14
2019/05/21 14:28:22 [INFO] Go runtime version: go1.12.4
2019/05/21 14:28:22 [INFO] CLI args: []string{"/bin/terraform", "init"}
2019/05/21 14:28:22 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
2019/05/21 14:28:22 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019/05/21 14:28:22 [INFO] CLI command args: []string{"init"}
2019/05/21 14:28:22 [DEBUG] plugin: waiting for all plugin processes to complete...
Terraform initialized in an empty directory!
The directory has no Terraform configuration files. You may begin working
with Terraform immediately by creating Terraform configuration files.
```
### Expected Behavior
2019/05/21 14:28:22 [DEBUG] Attempting to open CLI config file: /tmp/foo
### Actual Behavior
2019/05/21 14:28:22 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
### Steps to Reproduce
Run:
```bash
docker run -e TF_CLI_CONFIG_FILE='/tmp/foo' -e TF_LOG=trace hashicorp/terraform:0.11.14 init
```
| 1.0 | TF_CLI_CONFIG_FILE not respected - <!--
Hi there,
Thank you for opening an issue. Please note that we try to keep the Terraform issue tracker reserved for bug reports and feature requests. For general usage questions, please see: https://www.terraform.io/community.html.
If your issue relates to a specific Terraform provider, please open it in the provider's own repository. The index of providers is at https://github.com/terraform-providers .
-->
### Terraform Version
<!---
Run `terraform -v` to show the version, and paste the result between the ``` marks below.
If you are not running the latest version of Terraform, please try upgrading because your issue may have already been fixed.
-->
```
0.11.14
```
### Debug Output
See line 4
```
2019/05/21 14:28:22 [INFO] Terraform version: 0.11.14
2019/05/21 14:28:22 [INFO] Go runtime version: go1.12.4
2019/05/21 14:28:22 [INFO] CLI args: []string{"/bin/terraform", "init"}
2019/05/21 14:28:22 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
2019/05/21 14:28:22 [DEBUG] File doesn't exist, but doesn't need to. Ignoring.
2019/05/21 14:28:22 [INFO] CLI command args: []string{"init"}
2019/05/21 14:28:22 [DEBUG] plugin: waiting for all plugin processes to complete...
Terraform initialized in an empty directory!
The directory has no Terraform configuration files. You may begin working
with Terraform immediately by creating Terraform configuration files.
```
### Expected Behavior
2019/05/21 14:28:22 [DEBUG] Attempting to open CLI config file: /tmp/foo
### Actual Behavior
2019/05/21 14:28:22 [DEBUG] Attempting to open CLI config file: /root/.terraformrc
### Steps to Reproduce
Run:
```bash
docker run -e TF_CLI_CONFIG_FILE='/tmp/foo' -e TF_LOG=trace hashicorp/terraform:0.11.14 init
```
| non_priority | tf cli config file not respected hi there thank you for opening an issue please note that we try to keep the terraform issue tracker reserved for bug reports and feature requests for general usage questions please see if your issue relates to a specific terraform provider please open it in the provider s own repository the index of providers is at terraform version run terraform v to show the version and paste the result between the marks below if you are not running the latest version of terraform please try upgrading because your issue may have already been fixed debug output see line terraform version go runtime version cli args string bin terraform init attempting to open cli config file root terraformrc file doesn t exist but doesn t need to ignoring cli command args string init plugin waiting for all plugin processes to complete terraform initialized in an empty directory the directory has no terraform configuration files you may begin working with terraform immediately by creating terraform configuration files expected behavior attempting to open cli config file tmp foo actual behavior attempting to open cli config file root terraformrc steps to reproduce run bash docker run e tf cli config file tmp foo e tf log trace hashicorp terraform init | 0 |
66,400 | 14,768,308,782 | IssuesEvent | 2021-01-10 11:26:19 | kadirselcuk/core | https://api.github.com/repos/kadirselcuk/core | opened | WS-2018-0084 (High) detected in sshpk-1.13.1.tgz | security vulnerability | ## WS-2018-0084 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sshpk-1.13.1.tgz</b></p></summary>
<p>A library for finding and using SSH public keys</p>
<p>Library home page: <a href="https://registry.npmjs.org/sshpk/-/sshpk-1.13.1.tgz">https://registry.npmjs.org/sshpk/-/sshpk-1.13.1.tgz</a></p>
<p>Path to dependency file: core/turbo-registry-sync/package.json</p>
<p>Path to vulnerable library: core/turbo-registry-sync/node_modules/sshpk/package.json</p>
<p>
Dependency Hierarchy:
- request-2.83.0.tgz (Root Library)
- http-signature-1.2.0.tgz
- :x: **sshpk-1.13.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/core/commit/962fb434fed5d471f8072383c4bc98118bbe16cb">962fb434fed5d471f8072383c4bc98118bbe16cb</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of sshpk before 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
<p>Publish Date: 2018-04-25
<p>URL: <a href=https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17>WS-2018-0084</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/606">https://nodesecurity.io/advisories/606</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 1.14.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2018-0084 (High) detected in sshpk-1.13.1.tgz - ## WS-2018-0084 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>sshpk-1.13.1.tgz</b></p></summary>
<p>A library for finding and using SSH public keys</p>
<p>Library home page: <a href="https://registry.npmjs.org/sshpk/-/sshpk-1.13.1.tgz">https://registry.npmjs.org/sshpk/-/sshpk-1.13.1.tgz</a></p>
<p>Path to dependency file: core/turbo-registry-sync/package.json</p>
<p>Path to vulnerable library: core/turbo-registry-sync/node_modules/sshpk/package.json</p>
<p>
Dependency Hierarchy:
- request-2.83.0.tgz (Root Library)
- http-signature-1.2.0.tgz
- :x: **sshpk-1.13.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kadirselcuk/core/commit/962fb434fed5d471f8072383c4bc98118bbe16cb">962fb434fed5d471f8072383c4bc98118bbe16cb</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of sshpk before 1.14.1 are vulnerable to regular expression denial of service when parsing crafted invalid public keys.
<p>Publish Date: 2018-04-25
<p>URL: <a href=https://github.com/joyent/node-sshpk/blob/v1.13.1/lib/formats/ssh.js#L17>WS-2018-0084</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nodesecurity.io/advisories/606">https://nodesecurity.io/advisories/606</a></p>
<p>Release Date: 2018-01-27</p>
<p>Fix Resolution: 1.14.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws high detected in sshpk tgz ws high severity vulnerability vulnerable library sshpk tgz a library for finding and using ssh public keys library home page a href path to dependency file core turbo registry sync package json path to vulnerable library core turbo registry sync node modules sshpk package json dependency hierarchy request tgz root library http signature tgz x sshpk tgz vulnerable library found in head commit a href found in base branch master vulnerability details versions of sshpk before are vulnerable to regular expression denial of service when parsing crafted invalid public keys publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
32,188 | 26,519,033,121 | IssuesEvent | 2023-01-18 23:58:33 | dotnet/runtime | https://api.github.com/repos/dotnet/runtime | closed | How to build CoreCLR on windows arm64ec using MSVC | question area-Infrastructure-coreclr | ### Description
We try MSVC to run `.\build.cmd -subset clr+libs -c release -arch x64` build on x64, it works. But we tried to build for target arm64ec and run `.\build.cmd -subset clr+libs -c release -arch ARM64EC`, display error:
```
F:\gitP\dotnet\runtime\eng\build.ps1 : Cannot validate argument on parameter 'arch'. The argument "ARM64EC" does not
belong to the set "x86,x64,arm,arm64,wasm" specified by the ValidateSet attribute. Supply an argument that is in the
set and then try the command again.
At line:1 char:76
+ ... tnet\runtime\eng\build.ps1' -subset clr+libs -c release -arch ARM64EC
+ ~~~~~~~
+ CategoryInfo : InvalidData: (:) [build.ps1], ParameterBindingValidationException
+ FullyQualifiedErrorId : ParameterArgumentValidationError,build.ps1
```
How to build CoreCLR on windows arm64ec using MSVC? Thanks in advance.
### Reproduction Steps
1. Open VS2019 x64 tools command
2. set VSCMD_SKIP_SENDTELEMETRY=1 & "C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\Common7\Tools\VsDevCmd.bat" -host_arch=amd64 -arch=arm64
3. git clone https://github.com/dotnet/runtime F:\gitP\dotnet\runtime
4. cd F:\gitP\dotnet\runtime
5. .\build.cmd -subset clr+libs -c release -arch ARM64EC
### Expected behavior
CoreCLR compiler fine on windows arm64ec using MSVC
### Actual behavior
```
F:\gitP\dotnet\runtime\eng\build.ps1 : Cannot validate argument on parameter 'arch'. The argument "ARM64EC" does not
belong to the set "x86,x64,arm,arm64,wasm" specified by the ValidateSet attribute. Supply an argument that is in the
set and then try the command again.
At line:1 char:76
+ ... tnet\runtime\eng\build.ps1' -subset clr+libs -c release -arch ARM64EC
+ ~~~~~~~
+ CategoryInfo : InvalidData: (:) [build.ps1], ParameterBindingValidationException
+ FullyQualifiedErrorId : ParameterArgumentValidationError,build.ps1
```
### Regression?
_No response_
### Known Workarounds
_No response_
### Configuration
_No response_
### Other information
_No response_ | 1.0 | How to build CoreCLR on windows arm64ec using MSVC - ### Description
We try MSVC to run `.\build.cmd -subset clr+libs -c release -arch x64` build on x64, it works. But we tried to build for target arm64ec and run `.\build.cmd -subset clr+libs -c release -arch ARM64EC`, display error:
```
F:\gitP\dotnet\runtime\eng\build.ps1 : Cannot validate argument on parameter 'arch'. The argument "ARM64EC" does not
belong to the set "x86,x64,arm,arm64,wasm" specified by the ValidateSet attribute. Supply an argument that is in the
set and then try the command again.
At line:1 char:76
+ ... tnet\runtime\eng\build.ps1' -subset clr+libs -c release -arch ARM64EC
+ ~~~~~~~
+ CategoryInfo : InvalidData: (:) [build.ps1], ParameterBindingValidationException
+ FullyQualifiedErrorId : ParameterArgumentValidationError,build.ps1
```
How to build CoreCLR on windows arm64ec using MSVC? Thanks in advance.
### Reproduction Steps
1. Open VS2019 x64 tools command
2. set VSCMD_SKIP_SENDTELEMETRY=1 & "C:\Program Files (x86)\Microsoft Visual Studio\2019\Enterprise\Common7\Tools\VsDevCmd.bat" -host_arch=amd64 -arch=arm64
3. git clone https://github.com/dotnet/runtime F:\gitP\dotnet\runtime
4. cd F:\gitP\dotnet\runtime
5. .\build.cmd -subset clr+libs -c release -arch ARM64EC
### Expected behavior
CoreCLR compiler fine on windows arm64ec using MSVC
### Actual behavior
```
F:\gitP\dotnet\runtime\eng\build.ps1 : Cannot validate argument on parameter 'arch'. The argument "ARM64EC" does not
belong to the set "x86,x64,arm,arm64,wasm" specified by the ValidateSet attribute. Supply an argument that is in the
set and then try the command again.
At line:1 char:76
+ ... tnet\runtime\eng\build.ps1' -subset clr+libs -c release -arch ARM64EC
+ ~~~~~~~
+ CategoryInfo : InvalidData: (:) [build.ps1], ParameterBindingValidationException
+ FullyQualifiedErrorId : ParameterArgumentValidationError,build.ps1
```
### Regression?
_No response_
### Known Workarounds
_No response_
### Configuration
_No response_
### Other information
_No response_ | non_priority | how to build coreclr on windows using msvc description we try msvc to run build cmd subset clr libs c release arch build on it works but we tried to build for target and run build cmd subset clr libs c release arch display error f gitp dotnet runtime eng build cannot validate argument on parameter arch the argument does not belong to the set arm wasm specified by the validateset attribute supply an argument that is in the set and then try the command again at line char tnet runtime eng build subset clr libs c release arch categoryinfo invaliddata parameterbindingvalidationexception fullyqualifiederrorid parameterargumentvalidationerror build how to build coreclr on windows using msvc thanks in advance reproduction steps open tools command set vscmd skip sendtelemetry c program files microsoft visual studio enterprise tools vsdevcmd bat host arch arch git clone f gitp dotnet runtime cd f gitp dotnet runtime build cmd subset clr libs c release arch expected behavior coreclr compiler fine on windows using msvc actual behavior f gitp dotnet runtime eng build cannot validate argument on parameter arch the argument does not belong to the set arm wasm specified by the validateset attribute supply an argument that is in the set and then try the command again at line char tnet runtime eng build subset clr libs c release arch categoryinfo invaliddata parameterbindingvalidationexception fullyqualifiederrorid parameterargumentvalidationerror build regression no response known workarounds no response configuration no response other information no response | 0 |
251,948 | 21,528,981,683 | IssuesEvent | 2022-04-28 21:40:55 | damccorm/test-migration-target | https://api.github.com/repos/damccorm/test-migration-target | opened | PubsubTableProviderIT.testSQLSelectsArrayAttributes[0] failing in SQL PostCommit | bug test-failures P3 dsl-sql |
Failing since https://ci-beam.apache.org/job/beam_PostCommit_SQL/6260/
```
java.lang.AssertionError: Did not receive signal on projects/apache-beam-testing/subscriptions/result-subscription--1731534761628855545
in 60s
at org.apache.beam.sdk.io.gcp.pubsub.TestPubsubSignal.pollForResultForDuration(TestPubsubSignal.java:341)
at
org.apache.beam.sdk.io.gcp.pubsub.TestPubsubSignal.waitForSuccess(TestPubsubSignal.java:288)
at org.apache.beam.sdk.extensions.sql.meta.provider.pubsub.PubsubTableProviderIT.testSQLSelectsArrayAttributes(PubsubTableProviderIT.java:256)
```
Imported from Jira [BEAM-12320](https://issues.apache.org/jira/browse/BEAM-12320). Original Jira may contain additional context.
Reported by: bhulette. | 1.0 | PubsubTableProviderIT.testSQLSelectsArrayAttributes[0] failing in SQL PostCommit -
Failing since https://ci-beam.apache.org/job/beam_PostCommit_SQL/6260/
```
java.lang.AssertionError: Did not receive signal on projects/apache-beam-testing/subscriptions/result-subscription--1731534761628855545
in 60s
at org.apache.beam.sdk.io.gcp.pubsub.TestPubsubSignal.pollForResultForDuration(TestPubsubSignal.java:341)
at
org.apache.beam.sdk.io.gcp.pubsub.TestPubsubSignal.waitForSuccess(TestPubsubSignal.java:288)
at org.apache.beam.sdk.extensions.sql.meta.provider.pubsub.PubsubTableProviderIT.testSQLSelectsArrayAttributes(PubsubTableProviderIT.java:256)
```
Imported from Jira [BEAM-12320](https://issues.apache.org/jira/browse/BEAM-12320). Original Jira may contain additional context.
Reported by: bhulette. | non_priority | pubsubtableproviderit testsqlselectsarrayattributes failing in sql postcommit failing since java lang assertionerror did not receive signal on projects apache beam testing subscriptions result subscription in at org apache beam sdk io gcp pubsub testpubsubsignal pollforresultforduration testpubsubsignal java at org apache beam sdk io gcp pubsub testpubsubsignal waitforsuccess testpubsubsignal java at org apache beam sdk extensions sql meta provider pubsub pubsubtableproviderit testsqlselectsarrayattributes pubsubtableproviderit java imported from jira original jira may contain additional context reported by bhulette | 0 |
12,973 | 9,818,511,209 | IssuesEvent | 2019-06-13 19:26:43 | Azure/azure-sdk-for-java | https://api.github.com/repos/Azure/azure-sdk-for-java | closed | Retrieving the Diagnostics Storage account for an Azure SQL Database | Question SQL Service Attention | Looking for a way to get the Storage account which stores the diagnostics data for an Azure SQL Database.
We have added a diagnostic setting to an Azure SQL Database to archive its metrics to a Storage account as shown below.
<img width="953" alt="screenshot 185" src="https://user-images.githubusercontent.com/28895501/35213121-8ab5674c-ff82-11e7-9a71-c30e76a8b8dc.png">
Using Azure sdk for java, we would like to get the storage account name into which the metrics are archived.
Please provide us with a solution for doing the same.
| 1.0 | Retrieving the Diagnostics Storage account for an Azure SQL Database - Looking for a way to get the Storage account which stores the diagnostics data for an Azure SQL Database.
We have added a diagnostic setting to an Azure SQL Database to archive its metrics to a Storage account as shown below.
<img width="953" alt="screenshot 185" src="https://user-images.githubusercontent.com/28895501/35213121-8ab5674c-ff82-11e7-9a71-c30e76a8b8dc.png">
Using Azure sdk for java, we would like to get the storage account name into which the metrics are archived.
Please provide us with a solution for doing the same.
| non_priority | retrieving the diagnostics storage account for an azure sql database looking for a way to get the storage account which stores the diagnostics data for an azure sql database we have added a diagnostic setting to an azure sql database to archive its metrics to a storage account as shown below img width alt screenshot src using azure sdk for java we would like to get the storage account name into which the metrics are archived please provide us with a solution for doing the same | 0 |
126,073 | 17,868,825,541 | IssuesEvent | 2021-09-06 12:57:16 | fasttrack-solutions/jQuery-QueryBuilder | https://api.github.com/repos/fasttrack-solutions/jQuery-QueryBuilder | opened | WS-2020-0163 (Medium) detected in marked-0.6.2.tgz | security vulnerability | ## WS-2020-0163 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.6.2.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.6.2.tgz">https://registry.npmjs.org/marked/-/marked-0.6.2.tgz</a></p>
<p>Path to dependency file: jQuery-QueryBuilder/package.json</p>
<p>Path to vulnerable library: jQuery-QueryBuilder/node_modules/marked/package.json</p>
<p>
Dependency Hierarchy:
- foodoc-0.0.9.tgz (Root Library)
- jsdoc-3.6.2.tgz
- :x: **marked-0.6.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fasttrack-solutions/jQuery-QueryBuilder/commit/9291825bff1e01bb64535f99d7badac198ddbca0">9291825bff1e01bb64535f99d7badac198ddbca0</a></p>
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
marked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.
<p>Publish Date: 2020-07-02
<p>URL: <a href=https://github.com/markedjs/marked/commit/bd4f8c464befad2b304d51e33e89e567326e62e0>WS-2020-0163</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/markedjs/marked/releases/tag/v1.1.1">https://github.com/markedjs/marked/releases/tag/v1.1.1</a></p>
<p>Release Date: 2020-07-02</p>
<p>Fix Resolution: marked - 1.1.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2020-0163 (Medium) detected in marked-0.6.2.tgz - ## WS-2020-0163 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>marked-0.6.2.tgz</b></p></summary>
<p>A markdown parser built for speed</p>
<p>Library home page: <a href="https://registry.npmjs.org/marked/-/marked-0.6.2.tgz">https://registry.npmjs.org/marked/-/marked-0.6.2.tgz</a></p>
<p>Path to dependency file: jQuery-QueryBuilder/package.json</p>
<p>Path to vulnerable library: jQuery-QueryBuilder/node_modules/marked/package.json</p>
<p>
Dependency Hierarchy:
- foodoc-0.0.9.tgz (Root Library)
- jsdoc-3.6.2.tgz
- :x: **marked-0.6.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/fasttrack-solutions/jQuery-QueryBuilder/commit/9291825bff1e01bb64535f99d7badac198ddbca0">9291825bff1e01bb64535f99d7badac198ddbca0</a></p>
<p>Found in base branch: <b>dev</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
marked before 1.1.1 is vulnerable to Regular Expression Denial of Service (REDoS). rules.js have multiple unused capture groups which can lead to a Denial of Service.
<p>Publish Date: 2020-07-02
<p>URL: <a href=https://github.com/markedjs/marked/commit/bd4f8c464befad2b304d51e33e89e567326e62e0>WS-2020-0163</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/markedjs/marked/releases/tag/v1.1.1">https://github.com/markedjs/marked/releases/tag/v1.1.1</a></p>
<p>Release Date: 2020-07-02</p>
<p>Fix Resolution: marked - 1.1.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in marked tgz ws medium severity vulnerability vulnerable library marked tgz a markdown parser built for speed library home page a href path to dependency file jquery querybuilder package json path to vulnerable library jquery querybuilder node modules marked package json dependency hierarchy foodoc tgz root library jsdoc tgz x marked tgz vulnerable library found in head commit a href found in base branch dev vulnerability details marked before is vulnerable to regular expression denial of service redos rules js have multiple unused capture groups which can lead to a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution marked step up your open source security game with whitesource | 0 |
27,842 | 8,041,621,403 | IssuesEvent | 2018-07-31 04:06:44 | opencv/opencv | https://api.github.com/repos/opencv/opencv | closed | OpenCV 3.4.1 with CUDA 8.0.44 ld issue | category: build/install category: gpu (cuda) | <!--
If you have a question rather than reporting a bug please go to http://answers.opencv.org where you get much faster responses.
If you need further assistance please read [How To Contribute](https://github.com/opencv/opencv/wiki/How_to_contribute).
This is a template helping you to create an issue which can be processed as quickly as possible. This is the bug reporting section for the OpenCV library.
-->
##### System information (version)
<!-- Example
- OpenCV => 3.4.1
- Operating System / Platform => Debian stretch
- Compiler => gcc 6.3.0
-->
- OpenCV => 3.4.1
- Operating System / Platform => Debian Stretch
- Compiler => GCC 6.3.0 and GCC 4.9.2
##### Detailed description
I am unable to compile `opencv_test_cudev`. I am using `GCC 4.9.2` as `CUDA_HOST_COMPILER` since `NVCC 8.0.44` does not support `GCC 6`. I am also setting the `CUDA_NVCC_FLAGS` to `-ccbin gcc-4.9` without any success. The linker complains.
##### Steps to reproduce
<!-- to add code example fence it with triple backticks and optional file extension
```.cpp
// C++ code example
```
or attach as .txt or .zip file
-->
Here is my configuration :
> Looking for ccache - not found
> Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found suitable version "1.2.8", minimum required is "1.2.3")
> Could NOT find Jasper (missing: JASPER_LIBRARIES JASPER_INCLUDE_DIR)
> Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found version "1.2.8")
> Looking for linux/videodev.h
> Looking for linux/videodev.h - not found
> Looking for linux/videodev2.h
> Looking for linux/videodev2.h - found
> Looking for sys/videoio.h
> Looking for sys/videoio.h - not found
> Checking for module 'libavresample'
> No package 'libavresample' found
> Checking for module 'libgphoto2'
> No package 'libgphoto2' found
> Found TBB (env): /usr/lib/x86_64-linux-gnu/libtbb.so
> found Intel IPP (ICV version): 2017.0.3 [2017.0.3]
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippicv_lnx
> found Intel IPP IW sources: 2017.0.3
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippiw_lnx
> CUDA detected: 8.0
> CUDA NVCC target flags: -ccbin gcc-4.9;-gencode;arch=compute_20,code=sm_20;-gencode;arch=compute_30,code=sm_30;-gencode;arch=compute_35,code=sm_35;-gencode;arch=compute_37,code=sm_37;-gencode;arch=compute_50,code=sm_50;-gencode;arch=compute_52,code=sm_52;-gencode;arch=compute_60,code=sm_60;-gencode;arch=compute_61,code=sm_61;-D_FORCE_INLINES
> Could not find OpenBLAS include. Turning OpenBLAS_FOUND off
> Could not find OpenBLAS lib. Turning OpenBLAS_FOUND off
> Could NOT find Atlas (missing: Atlas_CBLAS_INCLUDE_DIR Atlas_CLAPACK_INCLUDE_DIR Atlas_CBLAS_LIBRARY Atlas_BLAS_LIBRARY Atlas_LAPACK_LIBRARY)
> A library with BLAS API not found. Please specify library location.
> LAPACK requires BLAS
> A library with LAPACK API not found. Please specify library location.
> Found apache ant: /usr/bin/ant (1.9.9)
> Could NOT find JNI (missing: JAVA_INCLUDE_PATH JAVA_INCLUDE_PATH2 JAVA_AWT_INCLUDE_PATH)
> VTK is not found. Please set -DVTK_DIR in CMake to VTK build directory, or to VTK install subdirectory with VTKConfig.cmake file
> Caffe: NO
> Protobuf: NO
> Glog: NO
> Looking for tiny_dnn.h
> Looking for tiny_dnn.h - found
> Found tiny-dnn in: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/tinydnn/tiny-dnn-1.0.0a3
> The protocol buffer compiler is not found (PROTOBUF_PROTOC_EXECUTABLE='')
> freetype2: YES
> harfbuzz: YES
> Could NOT find HDF5 (missing: HDF5_LIBRARIES HDF5_INCLUDE_DIRS)
> CMake Warning at /home/hadi/Desktop/opencv-3.4.1/opencv_contrib-3.4.1/opencv_contrib-3.4.1/modules/matlab/CMakeLists.txt:54 (message):
> A required dependency of the matlab module (Python Jinja2 package) was not
> found (installation command: "pip install jinja2"). Disabling Matlab
> bindings...
>
>
> Module opencv_ovis disabled because OGRE3D was not found
> No preference for use of exported gflags CMake configuration set, and no hints for include/library directories provided. Defaulting to preferring an installed/exported gflags CMake configuration if available.
> Failed to find installed gflags CMake configuration, searching for gflags build directories exported with CMake.
> Failed to find gflags - Failed to find an installed/exported CMake configuration for gflags, will perform search for installed gflags components.
> Failed to find gflags - Could not find gflags include directory, set GFLAGS_INCLUDE_DIR to directory containing gflags/gflags.h
> Failed to find glog - Could not find glog include directory, set GLOG_INCLUDE_DIR to directory containing glog/logging.h
> Module opencv_sfm disabled because the following dependencies are not found: Eigen Glog/Gflags
> freetype2: YES
> harfbuzz: YES
> Checking for modules 'tesseract;lept'
> No package 'tesseract' found
> No package 'lept' found
> Tesseract: NO
>
> General configuration for OpenCV 3.4.1 =====================================
> Version control: unknown
>
> Extra modules:
> Location (extra): /home/hadi/Desktop/opencv-3.4.1/opencv_contrib-3.4.1/opencv_contrib-3.4.1/modules
> Version control (extra): unknown
>
> Platform:
> Timestamp: 2018-07-01T18:09:10Z
> Host: Linux 4.9.0-6-amd64 x86_64
> CMake: 3.7.2
> CMake generator: Unix Makefiles
> CMake build tool: /usr/bin/make
> Configuration: Release
>
> CPU/HW features:
> Baseline: SSE SSE2 SSE3
> requested: SSE3
> Dispatched code generation: SSE4_1 SSE4_2 FP16 AVX AVX2 AVX512_SKX
> requested: SSE4_1 SSE4_2 AVX FP16 AVX2 AVX512_SKX
> SSE4_1 (3 files): + SSSE3 SSE4_1
> SSE4_2 (1 files): + SSSE3 SSE4_1 POPCNT SSE4_2
> FP16 (2 files): + SSSE3 SSE4_1 POPCNT SSE4_2 FP16 AVX
> AVX (5 files): + SSSE3 SSE4_1 POPCNT SSE4_2 AVX
> AVX2 (9 files): + SSSE3 SSE4_1 POPCNT SSE4_2 FP16 FMA3 AVX AVX2
> AVX512_SKX (1 files): + SSSE3 SSE4_1 POPCNT SSE4_2 FP16 FMA3 AVX AVX2 AVX_512F AVX512_SKX
>
> C/C++:
> Built as dynamic libs?: YES
> C++11: YES
> C++ Compiler: /usr/bin/c++ (ver 6.3.0)
> C++ flags (Release): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wundef -Winit-self -Wpointer-arith -Wshadow -Wsign-promo -Wuninitialized -Winit-self -Wno-narrowing -Wno-delete-non-virtual-dtor -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -fvisibility-inlines-hidden -O3 -DNDEBUG -DNDEBUG
> C++ flags (Debug): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wundef -Winit-self -Wpointer-arith -Wshadow -Wsign-promo -Wuninitialized -Winit-self -Wno-narrowing -Wno-delete-non-virtual-dtor -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -fvisibility-inlines-hidden -g -O0 -DDEBUG -D_DEBUG
> C Compiler: /usr/bin/cc
> C flags (Release): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wmissing-prototypes -Wstrict-prototypes -Wundef -Winit-self -Wpointer-arith -Wshadow -Wuninitialized -Winit-self -Wno-narrowing -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -O3 -DNDEBUG -DNDEBUG
> C flags (Debug): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wmissing-prototypes -Wstrict-prototypes -Wundef -Winit-self -Wpointer-arith -Wshadow -Wuninitialized -Winit-self -Wno-narrowing -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -g -O0 -DDEBUG -D_DEBUG
> Linker flags (Release):
> Linker flags (Debug):
> ccache: NO
> Precompiled headers: YES
> Extra dependencies: dl m pthread rt /usr/lib/x86_64-linux-gnu/libtbb.so cudart nppc nppial nppicc nppicom nppidei nppif nppig nppim nppist nppisu nppitc npps cublas cufft -L/usr/lib/x86_64-linux-gnu
> 3rdparty dependencies:
>
> OpenCV modules:
> To be built: aruco bgsegm bioinspired calib3d ccalib core cudaarithm cudabgsegm cudacodec cudafeatures2d cudafilters cudaimgproc cudalegacy cudaobjdetect cudaoptflow cudastereo cudawarping cudev cvv datasets dnn dnn_objdetect dpm face features2d flann freetype fuzzy hfs highgui img_hash imgcodecs imgproc java_bindings_generator line_descriptor ml objdetect optflow phase_unwrapping photo plot python2 python3 python_bindings_generator reg rgbd saliency shape stereo stitching structured_light superres surface_matching text tracking ts video videoio videostab xfeatures2d ximgproc xobjdetect xphoto
> Disabled: js world
> Disabled by dependency: -
> Unavailable: cnn_3dobj dnn_modern hdf java matlab ovis sfm viz
> Applications: tests perf_tests apps
> Documentation: NO
> Non-free algorithms: NO
>
> GUI:
> QT: YES (ver 5.9.5)
> QT OpenGL support: NO
> GTK+: NO
> VTK support: NO
>
> Media I/O:
> ZLib: /usr/lib/x86_64-linux-gnu/libz.so (ver 1.2.8)
> JPEG: /usr/lib/x86_64-linux-gnu/libjpeg.so (ver )
> WEBP: build (ver encoder: 0x020e)
> PNG: /usr/lib/x86_64-linux-gnu/libpng.so (ver 1.6.28)
> TIFF: /usr/lib/x86_64-linux-gnu/libtiff.so (ver 42 / 4.0.8)
> JPEG 2000: build (ver 1.900.1)
> OpenEXR: build (ver 1.7.1)
>
> Video I/O:
> DC1394: YES (ver 2.2.5)
> FFMPEG: YES
> avcodec: YES (ver 57.64.101)
> avformat: YES (ver 57.56.101)
> avutil: YES (ver 55.34.101)
> swscale: YES (ver 4.2.100)
> avresample: NO
> GStreamer:
> base: YES (ver 1.10.4)
> video: YES (ver 1.10.4)
> app: YES (ver 1.10.4)
> riff: YES (ver 1.10.4)
> pbutils: YES (ver 1.10.4)
> libv4l/libv4l2: NO
> v4l/v4l2: linux/videodev2.h
> gPhoto2: NO
>
> Parallel framework: TBB (ver 4.3 interface 8006)
>
> Trace: YES (with Intel ITT)
>
> Other third-party libraries:
> Intel IPP: 2017.0.3 [2017.0.3]
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippicv_lnx
> Intel IPP IW: sources (2017.0.3)
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippiw_lnx
> Lapack: NO
> Eigen: NO
> Custom HAL: NO
> Protobuf: build (3.5.1)
>
> NVIDIA CUDA: YES (ver 8.0, CUFFT CUBLAS NVCUVID)
> NVIDIA GPU arch: 20 30 35 37 50 52 60 61
> NVIDIA PTX archs:
>
> OpenCL: YES (no extra features)
> Include path: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/3rdparty/include/opencl/1.2
> Link libraries: Dynamic load
>
> Python 2:
> Interpreter: /usr/bin/python2.7 (ver 2.7.13)
> Libraries: /usr/lib/x86_64-linux-gnu/libpython2.7.so (ver 2.7.13)
> numpy: /usr/lib/python2.7/dist-packages/numpy/core/include (ver 1.12.1)
> packages path: lib/python2.7/dist-packages
>
> Python 3:
> Interpreter: /usr/bin/python3 (ver 3.5.3)
> Libraries: /usr/lib/x86_64-linux-gnu/libpython3.5m.so (ver 3.5.3)
> numpy: /usr/lib/python3/dist-packages/numpy/core/include (ver 1.12.1)
> packages path: lib/python3.5/dist-packages
>
> Python (for build): /usr/bin/python2.7
>
> Java:
> ant: /usr/bin/ant (ver 1.9.9)
> JNI: NO
> Java wrappers: NO
> Java tests: NO
>
> Matlab:
>
> YES
> mex: /usr/local/MATLAB/R2017b/bin/mex
> Compiler/generator: Not working (bindings will not be generated)
>
> Install to: /usr/local
> -----------------------------------------------------------------
Here is my configuration script (cmake-gui):
[CMakeCache.txt](https://github.com/opencv/opencv/files/2153340/CMakeCache.txt)
And the error produced:
> hadi@debian:~/Desktop/opencv-3.4.1/opencv-3.4.1/build$ make
> [ 0%] Built target gen-pkgconfig
> [ 5%] Built target libwebp
> [ 6%] Built target libjasper
> [ 9%] Built target IlmImf
> [ 10%] Built target ippiw
> [ 13%] Built target libprotobuf
> [ 13%] Built target ittnotify
> [ 13%] Built target opencv_cudev
> [ 13%] Built target opencv_ts_pch_dephelp
> [ 13%] Built target pch_Generate_opencv_ts
> [ 13%] Built target opencv_core_pch_dephelp
> [ 13%] Built target pch_Generate_opencv_core
> [ 13%] Building NVCC (Device) object modules/core/CMakeFiles/cuda_compile.dir/src/cuda/cuda_compile_generated_gpu_mat.cu.o
> [ 13%] Linking CXX shared library ../../lib/libopencv_core.so
> [ 16%] Built target opencv_core
> [ 16%] Built target opencv_imgproc_pch_dephelp
> [ 16%] Built target pch_Generate_opencv_imgproc
> [ 16%] Linking CXX shared library ../../lib/libopencv_imgproc.so
> [ 19%] Built target opencv_imgproc
> [ 19%] Built target opencv_imgcodecs_pch_dephelp
> [ 19%] Built target pch_Generate_opencv_imgcodecs
> [ 19%] Linking CXX shared library ../../lib/libopencv_imgcodecs.so
> [ 20%] Built target opencv_imgcodecs
> [ 20%] Built target opencv_videoio_pch_dephelp
> [ 20%] Built target pch_Generate_opencv_videoio
> [ 20%] Linking CXX shared library ../../lib/libopencv_videoio.so
> [ 20%] Built target opencv_videoio
> [ 20%] Built target opencv_highgui_pch_dephelp
> [ 20%] Built target pch_Generate_opencv_highgui
> [ 20%] Linking CXX shared library ../../lib/libopencv_highgui.so
> [ 20%] Built target opencv_highgui
> [ 21%] Built target opencv_ts
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_transpose.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_func.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_op.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_bitwize_op.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cmp_op.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_color_cvt.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cvt.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_deriv.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_integral.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_lut.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_pyramids.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_reduction.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_split_merge.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_warp.cu.o
> [ 21%] Linking CXX executable ../../../bin/opencv_test_cudev
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_func.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_op.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_bitwize_op.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cmp_op.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_color_cvt.cu.o: relocation R_X86_64_32 against `.rodata._ZZN24CvtColor_BGR_to_RGB_Test8TestBodyEvE24__cv_trace_location_fn85' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cvt.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_deriv.cu.o: relocation R_X86_64_32 against `.rodata._ZZN19Sobel_Accuracy_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_integral.cu.o: relocation R_X86_64_32 against `.rodata._ZZN17Integral__8u_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_lut.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_pyramids.cu.o: relocation R_X86_64_32 against `.rodata._ZZN18PyrDown__8uc1_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_reduction.cu.o: relocation R_X86_64_32 against `.rodata._ZZN15Sum_GpuMat_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_split_merge.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_warp.cu.o: relocation R_X86_64_32 against `.rodata._ZZN19Resize_Upscale_Test8TestBodyEvE25__cv_trace_location_fn136' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_transpose.cu.o: relocation R_X86_64_32 against `.rodata._ZZN20Transpose__8uc1_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: final link failed: Nonrepresentable section on output
> collect2: error: ld returned 1 exit status
> modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/build.make:5760: recipe for target 'bin/opencv_test_cudev' failed
> make[2]: *** [bin/opencv_test_cudev] Error 1
> CMakeFiles/Makefile2:2582: recipe for target 'modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/all' failed
> make[1]: *** [modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/all] Error 2
> Makefile:160: recipe for target 'all' failed
> make: *** [all] Error 2
| 1.0 | OpenCV 3.4.1 with CUDA 8.0.44 ld issue - <!--
If you have a question rather than reporting a bug please go to http://answers.opencv.org where you get much faster responses.
If you need further assistance please read [How To Contribute](https://github.com/opencv/opencv/wiki/How_to_contribute).
This is a template helping you to create an issue which can be processed as quickly as possible. This is the bug reporting section for the OpenCV library.
-->
##### System information (version)
<!-- Example
- OpenCV => 3.4.1
- Operating System / Platform => Debian stretch
- Compiler => gcc 6.3.0
-->
- OpenCV => 3.4.1
- Operating System / Platform => Debian Stretch
- Compiler => GCC 6.3.0 and GCC 4.9.2
##### Detailed description
I am unable to compile `opencv_test_cudev`. I am using `GCC 4.9.2` as `CUDA_HOST_COMPILER` since `NVCC 8.0.44` does not support `GCC 6`. I am also setting the `CUDA_NVCC_FLAGS` to `-ccbin gcc-4.9` without any success. The linker complains.
##### Steps to reproduce
<!-- to add code example fence it with triple backticks and optional file extension
```.cpp
// C++ code example
```
or attach as .txt or .zip file
-->
Here is my configuration :
> Looking for ccache - not found
> Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found suitable version "1.2.8", minimum required is "1.2.3")
> Could NOT find Jasper (missing: JASPER_LIBRARIES JASPER_INCLUDE_DIR)
> Found ZLIB: /usr/lib/x86_64-linux-gnu/libz.so (found version "1.2.8")
> Looking for linux/videodev.h
> Looking for linux/videodev.h - not found
> Looking for linux/videodev2.h
> Looking for linux/videodev2.h - found
> Looking for sys/videoio.h
> Looking for sys/videoio.h - not found
> Checking for module 'libavresample'
> No package 'libavresample' found
> Checking for module 'libgphoto2'
> No package 'libgphoto2' found
> Found TBB (env): /usr/lib/x86_64-linux-gnu/libtbb.so
> found Intel IPP (ICV version): 2017.0.3 [2017.0.3]
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippicv_lnx
> found Intel IPP IW sources: 2017.0.3
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippiw_lnx
> CUDA detected: 8.0
> CUDA NVCC target flags: -ccbin gcc-4.9;-gencode;arch=compute_20,code=sm_20;-gencode;arch=compute_30,code=sm_30;-gencode;arch=compute_35,code=sm_35;-gencode;arch=compute_37,code=sm_37;-gencode;arch=compute_50,code=sm_50;-gencode;arch=compute_52,code=sm_52;-gencode;arch=compute_60,code=sm_60;-gencode;arch=compute_61,code=sm_61;-D_FORCE_INLINES
> Could not find OpenBLAS include. Turning OpenBLAS_FOUND off
> Could not find OpenBLAS lib. Turning OpenBLAS_FOUND off
> Could NOT find Atlas (missing: Atlas_CBLAS_INCLUDE_DIR Atlas_CLAPACK_INCLUDE_DIR Atlas_CBLAS_LIBRARY Atlas_BLAS_LIBRARY Atlas_LAPACK_LIBRARY)
> A library with BLAS API not found. Please specify library location.
> LAPACK requires BLAS
> A library with LAPACK API not found. Please specify library location.
> Found apache ant: /usr/bin/ant (1.9.9)
> Could NOT find JNI (missing: JAVA_INCLUDE_PATH JAVA_INCLUDE_PATH2 JAVA_AWT_INCLUDE_PATH)
> VTK is not found. Please set -DVTK_DIR in CMake to VTK build directory, or to VTK install subdirectory with VTKConfig.cmake file
> Caffe: NO
> Protobuf: NO
> Glog: NO
> Looking for tiny_dnn.h
> Looking for tiny_dnn.h - found
> Found tiny-dnn in: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/tinydnn/tiny-dnn-1.0.0a3
> The protocol buffer compiler is not found (PROTOBUF_PROTOC_EXECUTABLE='')
> freetype2: YES
> harfbuzz: YES
> Could NOT find HDF5 (missing: HDF5_LIBRARIES HDF5_INCLUDE_DIRS)
> CMake Warning at /home/hadi/Desktop/opencv-3.4.1/opencv_contrib-3.4.1/opencv_contrib-3.4.1/modules/matlab/CMakeLists.txt:54 (message):
> A required dependency of the matlab module (Python Jinja2 package) was not
> found (installation command: "pip install jinja2"). Disabling Matlab
> bindings...
>
>
> Module opencv_ovis disabled because OGRE3D was not found
> No preference for use of exported gflags CMake configuration set, and no hints for include/library directories provided. Defaulting to preferring an installed/exported gflags CMake configuration if available.
> Failed to find installed gflags CMake configuration, searching for gflags build directories exported with CMake.
> Failed to find gflags - Failed to find an installed/exported CMake configuration for gflags, will perform search for installed gflags components.
> Failed to find gflags - Could not find gflags include directory, set GFLAGS_INCLUDE_DIR to directory containing gflags/gflags.h
> Failed to find glog - Could not find glog include directory, set GLOG_INCLUDE_DIR to directory containing glog/logging.h
> Module opencv_sfm disabled because the following dependencies are not found: Eigen Glog/Gflags
> freetype2: YES
> harfbuzz: YES
> Checking for modules 'tesseract;lept'
> No package 'tesseract' found
> No package 'lept' found
> Tesseract: NO
>
> General configuration for OpenCV 3.4.1 =====================================
> Version control: unknown
>
> Extra modules:
> Location (extra): /home/hadi/Desktop/opencv-3.4.1/opencv_contrib-3.4.1/opencv_contrib-3.4.1/modules
> Version control (extra): unknown
>
> Platform:
> Timestamp: 2018-07-01T18:09:10Z
> Host: Linux 4.9.0-6-amd64 x86_64
> CMake: 3.7.2
> CMake generator: Unix Makefiles
> CMake build tool: /usr/bin/make
> Configuration: Release
>
> CPU/HW features:
> Baseline: SSE SSE2 SSE3
> requested: SSE3
> Dispatched code generation: SSE4_1 SSE4_2 FP16 AVX AVX2 AVX512_SKX
> requested: SSE4_1 SSE4_2 AVX FP16 AVX2 AVX512_SKX
> SSE4_1 (3 files): + SSSE3 SSE4_1
> SSE4_2 (1 files): + SSSE3 SSE4_1 POPCNT SSE4_2
> FP16 (2 files): + SSSE3 SSE4_1 POPCNT SSE4_2 FP16 AVX
> AVX (5 files): + SSSE3 SSE4_1 POPCNT SSE4_2 AVX
> AVX2 (9 files): + SSSE3 SSE4_1 POPCNT SSE4_2 FP16 FMA3 AVX AVX2
> AVX512_SKX (1 files): + SSSE3 SSE4_1 POPCNT SSE4_2 FP16 FMA3 AVX AVX2 AVX_512F AVX512_SKX
>
> C/C++:
> Built as dynamic libs?: YES
> C++11: YES
> C++ Compiler: /usr/bin/c++ (ver 6.3.0)
> C++ flags (Release): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wundef -Winit-self -Wpointer-arith -Wshadow -Wsign-promo -Wuninitialized -Winit-self -Wno-narrowing -Wno-delete-non-virtual-dtor -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -fvisibility-inlines-hidden -O3 -DNDEBUG -DNDEBUG
> C++ flags (Debug): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wundef -Winit-self -Wpointer-arith -Wshadow -Wsign-promo -Wuninitialized -Winit-self -Wno-narrowing -Wno-delete-non-virtual-dtor -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -fvisibility-inlines-hidden -g -O0 -DDEBUG -D_DEBUG
> C Compiler: /usr/bin/cc
> C flags (Release): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wmissing-prototypes -Wstrict-prototypes -Wundef -Winit-self -Wpointer-arith -Wshadow -Wuninitialized -Winit-self -Wno-narrowing -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -O3 -DNDEBUG -DNDEBUG
> C flags (Debug): -fsigned-char -W -Wall -Werror=return-type -Werror=non-virtual-dtor -Werror=address -Werror=sequence-point -Wformat -Werror=format-security -Wmissing-declarations -Wmissing-prototypes -Wstrict-prototypes -Wundef -Winit-self -Wpointer-arith -Wshadow -Wuninitialized -Winit-self -Wno-narrowing -Wno-comment -fdiagnostics-show-option -Wno-long-long -pthread -fomit-frame-pointer -ffunction-sections -fdata-sections -msse -msse2 -msse3 -fvisibility=hidden -g -O0 -DDEBUG -D_DEBUG
> Linker flags (Release):
> Linker flags (Debug):
> ccache: NO
> Precompiled headers: YES
> Extra dependencies: dl m pthread rt /usr/lib/x86_64-linux-gnu/libtbb.so cudart nppc nppial nppicc nppicom nppidei nppif nppig nppim nppist nppisu nppitc npps cublas cufft -L/usr/lib/x86_64-linux-gnu
> 3rdparty dependencies:
>
> OpenCV modules:
> To be built: aruco bgsegm bioinspired calib3d ccalib core cudaarithm cudabgsegm cudacodec cudafeatures2d cudafilters cudaimgproc cudalegacy cudaobjdetect cudaoptflow cudastereo cudawarping cudev cvv datasets dnn dnn_objdetect dpm face features2d flann freetype fuzzy hfs highgui img_hash imgcodecs imgproc java_bindings_generator line_descriptor ml objdetect optflow phase_unwrapping photo plot python2 python3 python_bindings_generator reg rgbd saliency shape stereo stitching structured_light superres surface_matching text tracking ts video videoio videostab xfeatures2d ximgproc xobjdetect xphoto
> Disabled: js world
> Disabled by dependency: -
> Unavailable: cnn_3dobj dnn_modern hdf java matlab ovis sfm viz
> Applications: tests perf_tests apps
> Documentation: NO
> Non-free algorithms: NO
>
> GUI:
> QT: YES (ver 5.9.5)
> QT OpenGL support: NO
> GTK+: NO
> VTK support: NO
>
> Media I/O:
> ZLib: /usr/lib/x86_64-linux-gnu/libz.so (ver 1.2.8)
> JPEG: /usr/lib/x86_64-linux-gnu/libjpeg.so (ver )
> WEBP: build (ver encoder: 0x020e)
> PNG: /usr/lib/x86_64-linux-gnu/libpng.so (ver 1.6.28)
> TIFF: /usr/lib/x86_64-linux-gnu/libtiff.so (ver 42 / 4.0.8)
> JPEG 2000: build (ver 1.900.1)
> OpenEXR: build (ver 1.7.1)
>
> Video I/O:
> DC1394: YES (ver 2.2.5)
> FFMPEG: YES
> avcodec: YES (ver 57.64.101)
> avformat: YES (ver 57.56.101)
> avutil: YES (ver 55.34.101)
> swscale: YES (ver 4.2.100)
> avresample: NO
> GStreamer:
> base: YES (ver 1.10.4)
> video: YES (ver 1.10.4)
> app: YES (ver 1.10.4)
> riff: YES (ver 1.10.4)
> pbutils: YES (ver 1.10.4)
> libv4l/libv4l2: NO
> v4l/v4l2: linux/videodev2.h
> gPhoto2: NO
>
> Parallel framework: TBB (ver 4.3 interface 8006)
>
> Trace: YES (with Intel ITT)
>
> Other third-party libraries:
> Intel IPP: 2017.0.3 [2017.0.3]
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippicv_lnx
> Intel IPP IW: sources (2017.0.3)
> at: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/build/3rdparty/ippicv/ippiw_lnx
> Lapack: NO
> Eigen: NO
> Custom HAL: NO
> Protobuf: build (3.5.1)
>
> NVIDIA CUDA: YES (ver 8.0, CUFFT CUBLAS NVCUVID)
> NVIDIA GPU arch: 20 30 35 37 50 52 60 61
> NVIDIA PTX archs:
>
> OpenCL: YES (no extra features)
> Include path: /home/hadi/Desktop/opencv-3.4.1/opencv-3.4.1/3rdparty/include/opencl/1.2
> Link libraries: Dynamic load
>
> Python 2:
> Interpreter: /usr/bin/python2.7 (ver 2.7.13)
> Libraries: /usr/lib/x86_64-linux-gnu/libpython2.7.so (ver 2.7.13)
> numpy: /usr/lib/python2.7/dist-packages/numpy/core/include (ver 1.12.1)
> packages path: lib/python2.7/dist-packages
>
> Python 3:
> Interpreter: /usr/bin/python3 (ver 3.5.3)
> Libraries: /usr/lib/x86_64-linux-gnu/libpython3.5m.so (ver 3.5.3)
> numpy: /usr/lib/python3/dist-packages/numpy/core/include (ver 1.12.1)
> packages path: lib/python3.5/dist-packages
>
> Python (for build): /usr/bin/python2.7
>
> Java:
> ant: /usr/bin/ant (ver 1.9.9)
> JNI: NO
> Java wrappers: NO
> Java tests: NO
>
> Matlab:
>
> YES
> mex: /usr/local/MATLAB/R2017b/bin/mex
> Compiler/generator: Not working (bindings will not be generated)
>
> Install to: /usr/local
> -----------------------------------------------------------------
Here is my configuration script (cmake-gui):
[CMakeCache.txt](https://github.com/opencv/opencv/files/2153340/CMakeCache.txt)
And the error produced:
> hadi@debian:~/Desktop/opencv-3.4.1/opencv-3.4.1/build$ make
> [ 0%] Built target gen-pkgconfig
> [ 5%] Built target libwebp
> [ 6%] Built target libjasper
> [ 9%] Built target IlmImf
> [ 10%] Built target ippiw
> [ 13%] Built target libprotobuf
> [ 13%] Built target ittnotify
> [ 13%] Built target opencv_cudev
> [ 13%] Built target opencv_ts_pch_dephelp
> [ 13%] Built target pch_Generate_opencv_ts
> [ 13%] Built target opencv_core_pch_dephelp
> [ 13%] Built target pch_Generate_opencv_core
> [ 13%] Building NVCC (Device) object modules/core/CMakeFiles/cuda_compile.dir/src/cuda/cuda_compile_generated_gpu_mat.cu.o
> [ 13%] Linking CXX shared library ../../lib/libopencv_core.so
> [ 16%] Built target opencv_core
> [ 16%] Built target opencv_imgproc_pch_dephelp
> [ 16%] Built target pch_Generate_opencv_imgproc
> [ 16%] Linking CXX shared library ../../lib/libopencv_imgproc.so
> [ 19%] Built target opencv_imgproc
> [ 19%] Built target opencv_imgcodecs_pch_dephelp
> [ 19%] Built target pch_Generate_opencv_imgcodecs
> [ 19%] Linking CXX shared library ../../lib/libopencv_imgcodecs.so
> [ 20%] Built target opencv_imgcodecs
> [ 20%] Built target opencv_videoio_pch_dephelp
> [ 20%] Built target pch_Generate_opencv_videoio
> [ 20%] Linking CXX shared library ../../lib/libopencv_videoio.so
> [ 20%] Built target opencv_videoio
> [ 20%] Built target opencv_highgui_pch_dephelp
> [ 20%] Built target pch_Generate_opencv_highgui
> [ 20%] Linking CXX shared library ../../lib/libopencv_highgui.so
> [ 20%] Built target opencv_highgui
> [ 21%] Built target opencv_ts
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_transpose.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_func.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_op.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_bitwize_op.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cmp_op.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_color_cvt.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cvt.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_deriv.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_integral.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_lut.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_pyramids.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_reduction.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_split_merge.cu.o
> [ 21%] Building NVCC (Device) object modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_warp.cu.o
> [ 21%] Linking CXX executable ../../../bin/opencv_test_cudev
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_func.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_arithm_op.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_bitwize_op.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cmp_op.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_color_cvt.cu.o: relocation R_X86_64_32 against `.rodata._ZZN24CvtColor_BGR_to_RGB_Test8TestBodyEvE24__cv_trace_location_fn85' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_cvt.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_deriv.cu.o: relocation R_X86_64_32 against `.rodata._ZZN19Sobel_Accuracy_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_integral.cu.o: relocation R_X86_64_32 against `.rodata._ZZN17Integral__8u_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_lut.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_pyramids.cu.o: relocation R_X86_64_32 against `.rodata._ZZN18PyrDown__8uc1_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_reduction.cu.o: relocation R_X86_64_32 against `.rodata._ZZN15Sum_GpuMat_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_split_merge.cu.o: relocation R_X86_64_32S against `.bss._ZL20__cudaFatCubinHandle' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_test_warp.cu.o: relocation R_X86_64_32 against `.rodata._ZZN19Resize_Upscale_Test8TestBodyEvE25__cv_trace_location_fn136' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: CMakeFiles/opencv_test_cudev.dir/opencv_test_cudev_generated_transpose.cu.o: relocation R_X86_64_32 against `.rodata._ZZN20Transpose__8uc1_Test8TestBodyEvE24__cv_trace_location_fn51' can not be used when making a shared object; recompile with -fPIC
> /usr/bin/ld: final link failed: Nonrepresentable section on output
> collect2: error: ld returned 1 exit status
> modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/build.make:5760: recipe for target 'bin/opencv_test_cudev' failed
> make[2]: *** [bin/opencv_test_cudev] Error 1
> CMakeFiles/Makefile2:2582: recipe for target 'modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/all' failed
> make[1]: *** [modules/cudev/test/CMakeFiles/opencv_test_cudev.dir/all] Error 2
> Makefile:160: recipe for target 'all' failed
> make: *** [all] Error 2
| non_priority | opencv with cuda ld issue if you have a question rather than reporting a bug please go to where you get much faster responses if you need further assistance please read this is a template helping you to create an issue which can be processed as quickly as possible this is the bug reporting section for the opencv library system information version example opencv operating system platform debian stretch compiler gcc opencv operating system platform debian stretch compiler gcc and gcc detailed description i am unable to compile opencv test cudev i am using gcc as cuda host compiler since nvcc does not support gcc i am also setting the cuda nvcc flags to ccbin gcc without any success the linker complains steps to reproduce to add code example fence it with triple backticks and optional file extension cpp c code example or attach as txt or zip file here is my configuration looking for ccache not found found zlib usr lib linux gnu libz so found suitable version minimum required is could not find jasper missing jasper libraries jasper include dir found zlib usr lib linux gnu libz so found version looking for linux videodev h looking for linux videodev h not found looking for linux h looking for linux h found looking for sys videoio h looking for sys videoio h not found checking for module libavresample no package libavresample found checking for module no package found found tbb env usr lib linux gnu libtbb so found intel ipp icv version at home hadi desktop opencv opencv build ippicv ippicv lnx found intel ipp iw sources at home hadi desktop opencv opencv build ippicv ippiw lnx cuda detected cuda nvcc target flags ccbin gcc gencode arch compute code sm gencode arch compute code sm gencode arch compute code sm gencode arch compute code sm gencode arch compute code sm gencode arch compute code sm gencode arch compute code sm gencode arch compute code sm d force inlines could not find openblas include turning openblas found off could not find openblas lib turning openblas found off could not find atlas missing atlas cblas include dir atlas clapack include dir atlas cblas library atlas blas library atlas lapack library a library with blas api not found please specify library location lapack requires blas a library with lapack api not found please specify library location found apache ant usr bin ant could not find jni missing java include path java include java awt include path vtk is not found please set dvtk dir in cmake to vtk build directory or to vtk install subdirectory with vtkconfig cmake file caffe no protobuf no glog no looking for tiny dnn h looking for tiny dnn h found found tiny dnn in home hadi desktop opencv opencv build tinydnn tiny dnn the protocol buffer compiler is not found protobuf protoc executable yes harfbuzz yes could not find missing libraries include dirs cmake warning at home hadi desktop opencv opencv contrib opencv contrib modules matlab cmakelists txt message a required dependency of the matlab module python package was not found installation command pip install disabling matlab bindings module opencv ovis disabled because was not found no preference for use of exported gflags cmake configuration set and no hints for include library directories provided defaulting to preferring an installed exported gflags cmake configuration if available failed to find installed gflags cmake configuration searching for gflags build directories exported with cmake failed to find gflags failed to find an installed exported cmake configuration for gflags will perform search for installed gflags components failed to find gflags could not find gflags include directory set gflags include dir to directory containing gflags gflags h failed to find glog could not find glog include directory set glog include dir to directory containing glog logging h module opencv sfm disabled because the following dependencies are not found eigen glog gflags yes harfbuzz yes checking for modules tesseract lept no package tesseract found no package lept found tesseract no general configuration for opencv version control unknown extra modules location extra home hadi desktop opencv opencv contrib opencv contrib modules version control extra unknown platform timestamp host linux cmake cmake generator unix makefiles cmake build tool usr bin make configuration release cpu hw features baseline sse requested dispatched code generation avx skx requested avx skx files files popcnt files popcnt avx avx files popcnt avx files popcnt avx skx files popcnt avx avx skx c c built as dynamic libs yes c yes c compiler usr bin c ver c flags release fsigned char w wall werror return type werror non virtual dtor werror address werror sequence point wformat werror format security wmissing declarations wundef winit self wpointer arith wshadow wsign promo wuninitialized winit self wno narrowing wno delete non virtual dtor wno comment fdiagnostics show option wno long long pthread fomit frame pointer ffunction sections fdata sections msse fvisibility hidden fvisibility inlines hidden dndebug dndebug c flags debug fsigned char w wall werror return type werror non virtual dtor werror address werror sequence point wformat werror format security wmissing declarations wundef winit self wpointer arith wshadow wsign promo wuninitialized winit self wno narrowing wno delete non virtual dtor wno comment fdiagnostics show option wno long long pthread fomit frame pointer ffunction sections fdata sections msse fvisibility hidden fvisibility inlines hidden g ddebug d debug c compiler usr bin cc c flags release fsigned char w wall werror return type werror non virtual dtor werror address werror sequence point wformat werror format security wmissing declarations wmissing prototypes wstrict prototypes wundef winit self wpointer arith wshadow wuninitialized winit self wno narrowing wno comment fdiagnostics show option wno long long pthread fomit frame pointer ffunction sections fdata sections msse fvisibility hidden dndebug dndebug c flags debug fsigned char w wall werror return type werror non virtual dtor werror address werror sequence point wformat werror format security wmissing declarations wmissing prototypes wstrict prototypes wundef winit self wpointer arith wshadow wuninitialized winit self wno narrowing wno comment fdiagnostics show option wno long long pthread fomit frame pointer ffunction sections fdata sections msse fvisibility hidden g ddebug d debug linker flags release linker flags debug ccache no precompiled headers yes extra dependencies dl m pthread rt usr lib linux gnu libtbb so cudart nppc nppial nppicc nppicom nppidei nppif nppig nppim nppist nppisu nppitc npps cublas cufft l usr lib linux gnu dependencies opencv modules to be built aruco bgsegm bioinspired ccalib core cudaarithm cudabgsegm cudacodec cudafilters cudaimgproc cudalegacy cudaobjdetect cudaoptflow cudastereo cudawarping cudev cvv datasets dnn dnn objdetect dpm face flann freetype fuzzy hfs highgui img hash imgcodecs imgproc java bindings generator line descriptor ml objdetect optflow phase unwrapping photo plot python bindings generator reg rgbd saliency shape stereo stitching structured light superres surface matching text tracking ts video videoio videostab ximgproc xobjdetect xphoto disabled js world disabled by dependency unavailable cnn dnn modern hdf java matlab ovis sfm viz applications tests perf tests apps documentation no non free algorithms no gui qt yes ver qt opengl support no gtk no vtk support no media i o zlib usr lib linux gnu libz so ver jpeg usr lib linux gnu libjpeg so ver webp build ver encoder png usr lib linux gnu libpng so ver tiff usr lib linux gnu libtiff so ver jpeg build ver openexr build ver video i o yes ver ffmpeg yes avcodec yes ver avformat yes ver avutil yes ver swscale yes ver avresample no gstreamer base yes ver video yes ver app yes ver riff yes ver pbutils yes ver no linux h no parallel framework tbb ver interface trace yes with intel itt other third party libraries intel ipp at home hadi desktop opencv opencv build ippicv ippicv lnx intel ipp iw sources at home hadi desktop opencv opencv build ippicv ippiw lnx lapack no eigen no custom hal no protobuf build nvidia cuda yes ver cufft cublas nvcuvid nvidia gpu arch nvidia ptx archs opencl yes no extra features include path home hadi desktop opencv opencv include opencl link libraries dynamic load python interpreter usr bin ver libraries usr lib linux gnu so ver numpy usr lib dist packages numpy core include ver packages path lib dist packages python interpreter usr bin ver libraries usr lib linux gnu so ver numpy usr lib dist packages numpy core include ver packages path lib dist packages python for build usr bin java ant usr bin ant ver jni no java wrappers no java tests no matlab yes mex usr local matlab bin mex compiler generator not working bindings will not be generated install to usr local here is my configuration script cmake gui and the error produced hadi debian desktop opencv opencv build make built target gen pkgconfig built target libwebp built target libjasper built target ilmimf built target ippiw built target libprotobuf built target ittnotify built target opencv cudev built target opencv ts pch dephelp built target pch generate opencv ts built target opencv core pch dephelp built target pch generate opencv core building nvcc device object modules core cmakefiles cuda compile dir src cuda cuda compile generated gpu mat cu o linking cxx shared library lib libopencv core so built target opencv core built target opencv imgproc pch dephelp built target pch generate opencv imgproc linking cxx shared library lib libopencv imgproc so built target opencv imgproc built target opencv imgcodecs pch dephelp built target pch generate opencv imgcodecs linking cxx shared library lib libopencv imgcodecs so built target opencv imgcodecs built target opencv videoio pch dephelp built target pch generate opencv videoio linking cxx shared library lib libopencv videoio so built target opencv videoio built target opencv highgui pch dephelp built target pch generate opencv highgui linking cxx shared library lib libopencv highgui so built target opencv highgui built target opencv ts building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated transpose cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test arithm func cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test arithm op cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test bitwize op cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test cmp op cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test color cvt cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test cvt cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test deriv cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test integral cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test lut cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test pyramids cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test reduction cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test split merge cu o building nvcc device object modules cudev test cmakefiles opencv test cudev dir opencv test cudev generated test warp cu o linking cxx executable bin opencv test cudev usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test arithm func cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test arithm op cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test bitwize op cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test cmp op cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test color cvt cu o relocation r against rodata bgr to rgb cv trace location can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test cvt cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test deriv cu o relocation r against rodata accuracy cv trace location can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test integral cu o relocation r against rodata cv trace location can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test lut cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test pyramids cu o relocation r against rodata cv trace location can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test reduction cu o relocation r against rodata gpumat cv trace location can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test split merge cu o relocation r against bss cudafatcubinhandle can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated test warp cu o relocation r against rodata upscale cv trace location can not be used when making a shared object recompile with fpic usr bin ld cmakefiles opencv test cudev dir opencv test cudev generated transpose cu o relocation r against rodata cv trace location can not be used when making a shared object recompile with fpic usr bin ld final link failed nonrepresentable section on output error ld returned exit status modules cudev test cmakefiles opencv test cudev dir build make recipe for target bin opencv test cudev failed make error cmakefiles recipe for target modules cudev test cmakefiles opencv test cudev dir all failed make error makefile recipe for target all failed make error | 0 |
2,580 | 2,747,244,530 | IssuesEvent | 2015-04-23 00:16:22 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | wrong creation-timestamp set when article-save2copy | No Code Attached Yet | #### Steps to reproduce the issue
Go into the article-manager
Edit an article
Make a new article by save as copy button. [save2copy - function]
Look to the article option (creation-date/-time, saving-date/-time)
You will find:
creation-date/-time is the **source date/time.** .... and that is wrong !!!!!!!!
saving-date/-time is the saved date/time
#### Expected result
The creation-date/-time of the new article has to be set to the actual date/-time.
The new article has a new id and has never been saved explicitly, except for the saving to create it. Therefor it has to be handled like a very new one.
The saving-date/-time must be empty at that time.
#### Actual result
The creation-date of the new article is set to the one by the old-article.
That is wrong, because the new article has a new id and has never exist before.
The saving-date is set to the actual date.
#### System information (as much as possible)
J 3.4.1
My be so in older and future versions too.
#### Additional comments
The result must be the same, as when we do it in single steps
creation-date/-time is the actual date/time.
saving-date/-time is the saved date/time.
When doing it via "save2copy"
creation-date/-time is the **source date/time.** .... and that is wrong !!!!!!!!
saving-date/-time is the saved date/time
Another problem is, that the so created "new" articles are not shown in the list of the latest articles. | 1.0 | wrong creation-timestamp set when article-save2copy - #### Steps to reproduce the issue
Go into the article-manager
Edit an article
Make a new article by save as copy button. [save2copy - function]
Look to the article option (creation-date/-time, saving-date/-time)
You will find:
creation-date/-time is the **source date/time.** .... and that is wrong !!!!!!!!
saving-date/-time is the saved date/time
#### Expected result
The creation-date/-time of the new article has to be set to the actual date/-time.
The new article has a new id and has never been saved explicitly, except for the saving to create it. Therefor it has to be handled like a very new one.
The saving-date/-time must be empty at that time.
#### Actual result
The creation-date of the new article is set to the one by the old-article.
That is wrong, because the new article has a new id and has never exist before.
The saving-date is set to the actual date.
#### System information (as much as possible)
J 3.4.1
My be so in older and future versions too.
#### Additional comments
The result must be the same, as when we do it in single steps
creation-date/-time is the actual date/time.
saving-date/-time is the saved date/time.
When doing it via "save2copy"
creation-date/-time is the **source date/time.** .... and that is wrong !!!!!!!!
saving-date/-time is the saved date/time
Another problem is, that the so created "new" articles are not shown in the list of the latest articles. | non_priority | wrong creation timestamp set when article steps to reproduce the issue go into the article manager edit an article make a new article by save as copy button look to the article option creation date time saving date time you will find creation date time is the source date time and that is wrong saving date time is the saved date time expected result the creation date time of the new article has to be set to the actual date time the new article has a new id and has never been saved explicitly except for the saving to create it therefor it has to be handled like a very new one the saving date time must be empty at that time actual result the creation date of the new article is set to the one by the old article that is wrong because the new article has a new id and has never exist before the saving date is set to the actual date system information as much as possible j my be so in older and future versions too additional comments the result must be the same as when we do it in single steps creation date time is the actual date time saving date time is the saved date time when doing it via creation date time is the source date time and that is wrong saving date time is the saved date time another problem is that the so created new articles are not shown in the list of the latest articles | 0 |
281,573 | 21,315,416,575 | IssuesEvent | 2022-04-16 07:22:59 | Denniszedead/pe | https://api.github.com/repos/Denniszedead/pe | opened | Appendix: Instructions for manual testing in the DG not complete | type.DocumentationBug severity.Medium | 
The appendix is not completed as all the commands as stated in the UG are not inside the appendix for the manual tester to stress test, especially when the testes test will refer to this during PE.
<!--session: 1650088129667-4c09a4b0-f002-4cde-8fe0-5f0a90ff3d26-->
<!--Version: Web v3.4.2--> | 1.0 | Appendix: Instructions for manual testing in the DG not complete - 
The appendix is not completed as all the commands as stated in the UG are not inside the appendix for the manual tester to stress test, especially when the testes test will refer to this during PE.
<!--session: 1650088129667-4c09a4b0-f002-4cde-8fe0-5f0a90ff3d26-->
<!--Version: Web v3.4.2--> | non_priority | appendix instructions for manual testing in the dg not complete the appendix is not completed as all the commands as stated in the ug are not inside the appendix for the manual tester to stress test especially when the testes test will refer to this during pe | 0 |
197,632 | 15,686,881,342 | IssuesEvent | 2021-03-25 13:03:50 | r-lib/pkgdown | https://api.github.com/repos/r-lib/pkgdown | closed | Adding basic docs about styling? | documentation help wanted :heart: | (sorry if it's already there and I missed it!)
Docs along the line of the "basics of styling pkgdown" section of https://enpiar.com/2017/12/18/integrating-pkgdown-with-your-personal-website/ would be nice. :smile_cat: | 1.0 | Adding basic docs about styling? - (sorry if it's already there and I missed it!)
Docs along the line of the "basics of styling pkgdown" section of https://enpiar.com/2017/12/18/integrating-pkgdown-with-your-personal-website/ would be nice. :smile_cat: | non_priority | adding basic docs about styling sorry if it s already there and i missed it docs along the line of the basics of styling pkgdown section of would be nice smile cat | 0 |
33,235 | 7,681,141,937 | IssuesEvent | 2018-05-16 06:05:53 | ikigaidojo/cospace | https://api.github.com/repos/ikigaidojo/cospace | closed | Implement the association between an Admin and MembershipType | code implementation | - [ ] write an rspec test that confirms that association between the Admin and MembershipType. The test should cover both bidirectional association. | 1.0 | Implement the association between an Admin and MembershipType - - [ ] write an rspec test that confirms that association between the Admin and MembershipType. The test should cover both bidirectional association. | non_priority | implement the association between an admin and membershiptype write an rspec test that confirms that association between the admin and membershiptype the test should cover both bidirectional association | 0 |
70,295 | 13,447,613,929 | IssuesEvent | 2020-09-08 14:27:34 | e4exp/paper_manager_abstract | https://api.github.com/repos/e4exp/paper_manager_abstract | closed | Visual Compiler: Towards Translating Digital UI Design Draft to Front-End Code Automatically | 2020 Code Generation Pix2code UI Design _read_later | * https://link.springer.com/chapter/10.1007/978-3-030-50017-7_28
* HCII 2020: Human Interface and the Management of Information. Interacting with Information pp 385-394
フロントエンドエンジニアの仕事の一つに、UI(ユーザーインターフェース)設計案をプログラム互換性のあるアレンジに変換することがあります。
顧客の要求を満たすために、エンジニアは通常、画面サイズの幅が広いなど、さまざまな端末デバイスに対応するためのさまざまな要素を考慮する必要があります。
このような作業は、通常、面倒な作業が多く、その多くは機械でできる繰り返しの作業である。
本論文では、UIデザイン案とフロントエンドコードのギャップを埋めるツールとして、Visual Compilerを提案する。
本研究では、エキスパートヒューリスティックとコンピュータビジョンの技術を組み合わせ、生成されたコードの可読性とユーザビリティを向上させ、生成プロセスをよりインテリジェントなものにする。
実際には、ユーザはUI設計者から得たデザイン案を入力するだけで、我々の手法はクリーンで整然としたフロントエンドコードを生成することができます。
既存のアプローチと比較して、Visual Compiler は、オリジナルのドラフトと同じ外観を維持しながら、出力ファイルのサイズを約 80% 削減することができます。
このツールが、UI 設計者とフロントエンド開発者のコラボレーションの効率化に役立つことを期待しています。
| 2.0 | Visual Compiler: Towards Translating Digital UI Design Draft to Front-End Code Automatically - * https://link.springer.com/chapter/10.1007/978-3-030-50017-7_28
* HCII 2020: Human Interface and the Management of Information. Interacting with Information pp 385-394
フロントエンドエンジニアの仕事の一つに、UI(ユーザーインターフェース)設計案をプログラム互換性のあるアレンジに変換することがあります。
顧客の要求を満たすために、エンジニアは通常、画面サイズの幅が広いなど、さまざまな端末デバイスに対応するためのさまざまな要素を考慮する必要があります。
このような作業は、通常、面倒な作業が多く、その多くは機械でできる繰り返しの作業である。
本論文では、UIデザイン案とフロントエンドコードのギャップを埋めるツールとして、Visual Compilerを提案する。
本研究では、エキスパートヒューリスティックとコンピュータビジョンの技術を組み合わせ、生成されたコードの可読性とユーザビリティを向上させ、生成プロセスをよりインテリジェントなものにする。
実際には、ユーザはUI設計者から得たデザイン案を入力するだけで、我々の手法はクリーンで整然としたフロントエンドコードを生成することができます。
既存のアプローチと比較して、Visual Compiler は、オリジナルのドラフトと同じ外観を維持しながら、出力ファイルのサイズを約 80% 削減することができます。
このツールが、UI 設計者とフロントエンド開発者のコラボレーションの効率化に役立つことを期待しています。
| non_priority | visual compiler towards translating digital ui design draft to front end code automatically hcii human interface and the management of information interacting with information pp フロントエンドエンジニアの仕事の一つに、ui(ユーザーインターフェース)設計案をプログラム互換性のあるアレンジに変換することがあります。 顧客の要求を満たすために、エンジニアは通常、画面サイズの幅が広いなど、さまざまな端末デバイスに対応するためのさまざまな要素を考慮する必要があります。 このような作業は、通常、面倒な作業が多く、その多くは機械でできる繰り返しの作業である。 本論文では、uiデザイン案とフロントエンドコードのギャップを埋めるツールとして、visual compilerを提案する。 本研究では、エキスパートヒューリスティックとコンピュータビジョンの技術を組み合わせ、生成されたコードの可読性とユーザビリティを向上させ、生成プロセスをよりインテリジェントなものにする。 実際には、ユーザはui設計者から得たデザイン案を入力するだけで、我々の手法はクリーンで整然としたフロントエンドコードを生成することができます。 既存のアプローチと比較して、visual compiler は、オリジナルのドラフトと同じ外観を維持しながら、出力ファイルのサイズを約 削減することができます。 このツールが、ui 設計者とフロントエンド開発者のコラボレーションの効率化に役立つことを期待しています。 | 0 |
139,009 | 18,817,772,650 | IssuesEvent | 2021-11-10 02:38:02 | raindigi/reaction | https://api.github.com/repos/raindigi/reaction | opened | CVE-2021-3807 (High) detected in ansi-regex-3.0.0.tgz | security vulnerability | ## CVE-2021-3807 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansi-regex-3.0.0.tgz</b></p></summary>
<p>Regular expression for matching ANSI escape codes</p>
<p>Library home page: <a href="https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz">https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz</a></p>
<p>Path to dependency file: reaction/package.json</p>
<p>Path to vulnerable library: reaction/node_modules/string-length/node_modules/ansi-regex/package.json,reaction/node_modules/string-width/node_modules/ansi-regex/package.json,reaction/node_modules/inquirer/node_modules/ansi-regex/package.json,reaction/node_modules/jest-junit/node_modules/ansi-regex/package.json,reaction/node_modules/jest/node_modules/ansi-regex/package.json,reaction/node_modules/eslint/node_modules/ansi-regex/package.json,reaction/node_modules/jest-runtime/node_modules/ansi-regex/package.json,reaction/node_modules/transliteration/node_modules/ansi-regex/package.json,reaction/node_modules/pretty-format/node_modules/ansi-regex/package.json</p>
<p>
Dependency Hierarchy:
- eslint-4.19.1.tgz (Root Library)
- strip-ansi-4.0.0.tgz
- :x: **ansi-regex-3.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/raindigi/reaction/commit/4079302725aa3f1c343da88d0c8d5a11a9b9b10e">4079302725aa3f1c343da88d0c8d5a11a9b9b10e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3807>CVE-2021-3807</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/</a></p>
<p>Release Date: 2021-09-17</p>
<p>Fix Resolution: ansi-regex - 5.0.1,6.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-3807 (High) detected in ansi-regex-3.0.0.tgz - ## CVE-2021-3807 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>ansi-regex-3.0.0.tgz</b></p></summary>
<p>Regular expression for matching ANSI escape codes</p>
<p>Library home page: <a href="https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz">https://registry.npmjs.org/ansi-regex/-/ansi-regex-3.0.0.tgz</a></p>
<p>Path to dependency file: reaction/package.json</p>
<p>Path to vulnerable library: reaction/node_modules/string-length/node_modules/ansi-regex/package.json,reaction/node_modules/string-width/node_modules/ansi-regex/package.json,reaction/node_modules/inquirer/node_modules/ansi-regex/package.json,reaction/node_modules/jest-junit/node_modules/ansi-regex/package.json,reaction/node_modules/jest/node_modules/ansi-regex/package.json,reaction/node_modules/eslint/node_modules/ansi-regex/package.json,reaction/node_modules/jest-runtime/node_modules/ansi-regex/package.json,reaction/node_modules/transliteration/node_modules/ansi-regex/package.json,reaction/node_modules/pretty-format/node_modules/ansi-regex/package.json</p>
<p>
Dependency Hierarchy:
- eslint-4.19.1.tgz (Root Library)
- strip-ansi-4.0.0.tgz
- :x: **ansi-regex-3.0.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/raindigi/reaction/commit/4079302725aa3f1c343da88d0c8d5a11a9b9b10e">4079302725aa3f1c343da88d0c8d5a11a9b9b10e</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
ansi-regex is vulnerable to Inefficient Regular Expression Complexity
<p>Publish Date: 2021-09-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-3807>CVE-2021-3807</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/">https://huntr.dev/bounties/5b3cf33b-ede0-4398-9974-800876dfd994/</a></p>
<p>Release Date: 2021-09-17</p>
<p>Fix Resolution: ansi-regex - 5.0.1,6.0.1</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in ansi regex tgz cve high severity vulnerability vulnerable library ansi regex tgz regular expression for matching ansi escape codes library home page a href path to dependency file reaction package json path to vulnerable library reaction node modules string length node modules ansi regex package json reaction node modules string width node modules ansi regex package json reaction node modules inquirer node modules ansi regex package json reaction node modules jest junit node modules ansi regex package json reaction node modules jest node modules ansi regex package json reaction node modules eslint node modules ansi regex package json reaction node modules jest runtime node modules ansi regex package json reaction node modules transliteration node modules ansi regex package json reaction node modules pretty format node modules ansi regex package json dependency hierarchy eslint tgz root library strip ansi tgz x ansi regex tgz vulnerable library found in head commit a href vulnerability details ansi regex is vulnerable to inefficient regular expression complexity publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution ansi regex step up your open source security game with whitesource | 0 |
222,670 | 24,711,236,899 | IssuesEvent | 2022-10-20 01:06:02 | rgordon95/advanced-react-demo | https://api.github.com/repos/rgordon95/advanced-react-demo | opened | CVE-2022-3517 (High) detected in minimatch-3.0.4.tgz | security vulnerability | ## CVE-2022-3517 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p></summary>
<p>a glob matcher in javascript</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p>
<p>Path to dependency file: /advanced-react-demo/package.json</p>
<p>Path to vulnerable library: /node_modules/minimatch/package.json</p>
<p>
Dependency Hierarchy:
- eslint-4.1.0.tgz (Root Library)
- :x: **minimatch-3.0.4.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
<p>Publish Date: 2022-10-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-3517>CVE-2022-3517</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-10-17</p>
<p>Fix Resolution: minimatch - 3.0.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2022-3517 (High) detected in minimatch-3.0.4.tgz - ## CVE-2022-3517 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>minimatch-3.0.4.tgz</b></p></summary>
<p>a glob matcher in javascript</p>
<p>Library home page: <a href="https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz">https://registry.npmjs.org/minimatch/-/minimatch-3.0.4.tgz</a></p>
<p>Path to dependency file: /advanced-react-demo/package.json</p>
<p>Path to vulnerable library: /node_modules/minimatch/package.json</p>
<p>
Dependency Hierarchy:
- eslint-4.1.0.tgz (Root Library)
- :x: **minimatch-3.0.4.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in the minimatch package. This flaw allows a Regular Expression Denial of Service (ReDoS) when calling the braceExpand function with specific arguments, resulting in a Denial of Service.
<p>Publish Date: 2022-10-17
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-3517>CVE-2022-3517</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2022-10-17</p>
<p>Fix Resolution: minimatch - 3.0.5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in minimatch tgz cve high severity vulnerability vulnerable library minimatch tgz a glob matcher in javascript library home page a href path to dependency file advanced react demo package json path to vulnerable library node modules minimatch package json dependency hierarchy eslint tgz root library x minimatch tgz vulnerable library vulnerability details a vulnerability was found in the minimatch package this flaw allows a regular expression denial of service redos when calling the braceexpand function with specific arguments resulting in a denial of service publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution minimatch step up your open source security game with mend | 0 |
8,776 | 11,899,692,648 | IssuesEvent | 2020-03-30 09:25:24 | prisma/prisma2 | https://api.github.com/repos/prisma/prisma2 | closed | Add `cli` as executable for @prisma/cli? | kind/improvement process/candidate topic: cli | ## Problem
When using npx without having `@prisma/cli` installed before we need to do `npx -p @prisma/cli@alpha prisma2 --version`
## Solution
If we put another name for the executable in the package.json `cli` npx should work like:
`npx @prisma/cli@alpha --version` which is a lot easier (no parameters!)
## Additional context
We may want to test how it's doing with a global install. | 1.0 | Add `cli` as executable for @prisma/cli? - ## Problem
When using npx without having `@prisma/cli` installed before we need to do `npx -p @prisma/cli@alpha prisma2 --version`
## Solution
If we put another name for the executable in the package.json `cli` npx should work like:
`npx @prisma/cli@alpha --version` which is a lot easier (no parameters!)
## Additional context
We may want to test how it's doing with a global install. | non_priority | add cli as executable for prisma cli problem when using npx without having prisma cli installed before we need to do npx p prisma cli alpha version solution if we put another name for the executable in the package json cli npx should work like npx prisma cli alpha version which is a lot easier no parameters additional context we may want to test how it s doing with a global install | 0 |
318,717 | 23,736,951,147 | IssuesEvent | 2022-08-31 08:57:01 | blockscout/blockscout | https://api.github.com/repos/blockscout/blockscout | closed | Add the list of JSON RPC calls Blockscout makes to the node | documentation | Add *.md* document to the `./docs` folder with the list of JSON RPC calls Blockscout makes to Ethereum node | 1.0 | Add the list of JSON RPC calls Blockscout makes to the node - Add *.md* document to the `./docs` folder with the list of JSON RPC calls Blockscout makes to Ethereum node | non_priority | add the list of json rpc calls blockscout makes to the node add md document to the docs folder with the list of json rpc calls blockscout makes to ethereum node | 0 |
152,416 | 12,104,249,452 | IssuesEvent | 2020-04-20 19:52:01 | airween/crs | https://api.github.com/repos/airween/crs | opened | Second issue, with custom LABEL | TEST LABEL FOR MIGRATION | _Issue originally created by user fzipi on date 2020-03-10 14:23:38.
Link to original issue: https://github.com/crstest2/crs/issues/2._
We use a custom label here, to see if this will work. | 1.0 | Second issue, with custom LABEL - _Issue originally created by user fzipi on date 2020-03-10 14:23:38.
Link to original issue: https://github.com/crstest2/crs/issues/2._
We use a custom label here, to see if this will work. | non_priority | second issue with custom label issue originally created by user fzipi on date link to original issue we use a custom label here to see if this will work | 0 |
230,654 | 17,632,232,374 | IssuesEvent | 2021-08-19 09:24:31 | hashicorp/terraform-provider-azurerm | https://api.github.com/repos/hashicorp/terraform-provider-azurerm | closed | Documentation is not clear about azurerm provider definition for version 2.0.0 and features | enhancement question documentation | Hi, I spend few hours try to understand why a so simple code like the following was not working with the lastest azurerm provider :
```
variable "AzureRegion" {
type = string
}
variable "ResourceGroupName" {
type = string
}
# Azure Resource Group
resource "azurerm_resource_group" "Terra-RG-Stan1" {
name = var.ResourceGroupName
location = var.AzureRegion
}
```
If I run `terraform plan` and then type the values of AzureRegion and ResourceGroupName, I get the following error message : **Error: "features": required field is not set**
Fixing the azurerm provider to a 1.x version using the following code, solve the issue :
```
provider "azurerm" {
version = "=1.44.0"
}
```
Try to change with version 2.0.0 doesn't solve the issue :
```
provider "azurerm" {
version = "=2.0.0"
}
```
Adding feature{} to provider block, solve the issue:
```
provider "azurerm" {
version = "=2.0.0"
**features {}**
}
```
**So one thing to improve is probably to explain that now it s mandatory to define azurem provider block in terraform code** in beginning of documentation https://www.terraform.io/docs/providers/azurerm/index.html and insist about **required features {}** | 1.0 | Documentation is not clear about azurerm provider definition for version 2.0.0 and features - Hi, I spend few hours try to understand why a so simple code like the following was not working with the lastest azurerm provider :
```
variable "AzureRegion" {
type = string
}
variable "ResourceGroupName" {
type = string
}
# Azure Resource Group
resource "azurerm_resource_group" "Terra-RG-Stan1" {
name = var.ResourceGroupName
location = var.AzureRegion
}
```
If I run `terraform plan` and then type the values of AzureRegion and ResourceGroupName, I get the following error message : **Error: "features": required field is not set**
Fixing the azurerm provider to a 1.x version using the following code, solve the issue :
```
provider "azurerm" {
version = "=1.44.0"
}
```
Try to change with version 2.0.0 doesn't solve the issue :
```
provider "azurerm" {
version = "=2.0.0"
}
```
Adding feature{} to provider block, solve the issue:
```
provider "azurerm" {
version = "=2.0.0"
**features {}**
}
```
**So one thing to improve is probably to explain that now it s mandatory to define azurem provider block in terraform code** in beginning of documentation https://www.terraform.io/docs/providers/azurerm/index.html and insist about **required features {}** | non_priority | documentation is not clear about azurerm provider definition for version and features hi i spend few hours try to understand why a so simple code like the following was not working with the lastest azurerm provider variable azureregion type string variable resourcegroupname type string azure resource group resource azurerm resource group terra rg name var resourcegroupname location var azureregion if i run terraform plan and then type the values of azureregion and resourcegroupname i get the following error message error features required field is not set fixing the azurerm provider to a x version using the following code solve the issue provider azurerm version try to change with version doesn t solve the issue provider azurerm version adding feature to provider block solve the issue provider azurerm version features so one thing to improve is probably to explain that now it s mandatory to define azurem provider block in terraform code in beginning of documentation and insist about required features | 0 |
9,797 | 4,644,055,997 | IssuesEvent | 2016-09-30 15:16:03 | mitchellh/packer | https://api.github.com/repos/mitchellh/packer | closed | Error 2 when trying to compile | build-failure question | Here is what I am doing:
$ export GOPATH=`pwd`
$ go get -u github.com/mitchellh/gox
$ go get github.com/mitchellh/packer
$ cd $GOPATH/src/github.com/mitchellh/packer
$ make updatedeps
go get -u github.com/mitchellh/gox
go get -u golang.org/x/tools/cmd/stringer
INFO: Packer deps are managed by godep. See CONTRIBUTING.md
$ make bin
go get github.com/mitchellh/gox
go get golang.org/x/tools/cmd/stringer
WARN: 'make bin' is for debug / test builds only. Use 'make release' for release builds.
==> Removing old directory...
==> Building...
Number of parallel builds: 11
--> darwin/386: github.com/mitchellh/packer
--> openbsd/amd64: github.com/mitchellh/packer
--> darwin/arm: github.com/mitchellh/packer
--> linux/amd64: github.com/mitchellh/packer
--> darwin/amd64: github.com/mitchellh/packer
--> freebsd/amd64: github.com/mitchellh/packer
--> freebsd/386: github.com/mitchellh/packer
--> windows/386: github.com/mitchellh/packer
--> freebsd/arm: github.com/mitchellh/packer
--> windows/amd64: github.com/mitchellh/packer
--> linux/386: github.com/mitchellh/packer
--> openbsd/386: github.com/mitchellh/packer
--> linux/arm: github.com/mitchellh/packer
1 errors occurred:
**--> darwin/arm error: exit status 2**
Stderr: # github.com/mitchellh/packer
runtime.load_g: call to external function runtime.read_tls_fallback
runtime._initcgo: call to external function runtime.read_tls_fallback
runtime.save_g: runtime.read_tls_fallback: not defined
runtime.load_g: runtime.read_tls_fallback: not defined
runtime._initcgo: runtime.read_tls_fallback: not defined
runtime.save_g: undefined: runtime.read_tls_fallback
runtime.load_g: undefined: runtime.read_tls_fallback
runtime._initcgo: undefined: runtime.read_tls_fallback
==> Copying binaries for this platform...
==> Results:
total 42M
-rwxr-xr-x 1 emo3 emo3 42M Sep 7 19:16 packer
What do I need to fix to solve this error? | 1.0 | Error 2 when trying to compile - Here is what I am doing:
$ export GOPATH=`pwd`
$ go get -u github.com/mitchellh/gox
$ go get github.com/mitchellh/packer
$ cd $GOPATH/src/github.com/mitchellh/packer
$ make updatedeps
go get -u github.com/mitchellh/gox
go get -u golang.org/x/tools/cmd/stringer
INFO: Packer deps are managed by godep. See CONTRIBUTING.md
$ make bin
go get github.com/mitchellh/gox
go get golang.org/x/tools/cmd/stringer
WARN: 'make bin' is for debug / test builds only. Use 'make release' for release builds.
==> Removing old directory...
==> Building...
Number of parallel builds: 11
--> darwin/386: github.com/mitchellh/packer
--> openbsd/amd64: github.com/mitchellh/packer
--> darwin/arm: github.com/mitchellh/packer
--> linux/amd64: github.com/mitchellh/packer
--> darwin/amd64: github.com/mitchellh/packer
--> freebsd/amd64: github.com/mitchellh/packer
--> freebsd/386: github.com/mitchellh/packer
--> windows/386: github.com/mitchellh/packer
--> freebsd/arm: github.com/mitchellh/packer
--> windows/amd64: github.com/mitchellh/packer
--> linux/386: github.com/mitchellh/packer
--> openbsd/386: github.com/mitchellh/packer
--> linux/arm: github.com/mitchellh/packer
1 errors occurred:
**--> darwin/arm error: exit status 2**
Stderr: # github.com/mitchellh/packer
runtime.load_g: call to external function runtime.read_tls_fallback
runtime._initcgo: call to external function runtime.read_tls_fallback
runtime.save_g: runtime.read_tls_fallback: not defined
runtime.load_g: runtime.read_tls_fallback: not defined
runtime._initcgo: runtime.read_tls_fallback: not defined
runtime.save_g: undefined: runtime.read_tls_fallback
runtime.load_g: undefined: runtime.read_tls_fallback
runtime._initcgo: undefined: runtime.read_tls_fallback
==> Copying binaries for this platform...
==> Results:
total 42M
-rwxr-xr-x 1 emo3 emo3 42M Sep 7 19:16 packer
What do I need to fix to solve this error? | non_priority | error when trying to compile here is what i am doing export gopath pwd go get u github com mitchellh gox go get github com mitchellh packer cd gopath src github com mitchellh packer make updatedeps go get u github com mitchellh gox go get u golang org x tools cmd stringer info packer deps are managed by godep see contributing md make bin go get github com mitchellh gox go get golang org x tools cmd stringer warn make bin is for debug test builds only use make release for release builds removing old directory building number of parallel builds darwin github com mitchellh packer openbsd github com mitchellh packer darwin arm github com mitchellh packer linux github com mitchellh packer darwin github com mitchellh packer freebsd github com mitchellh packer freebsd github com mitchellh packer windows github com mitchellh packer freebsd arm github com mitchellh packer windows github com mitchellh packer linux github com mitchellh packer openbsd github com mitchellh packer linux arm github com mitchellh packer errors occurred darwin arm error exit status stderr github com mitchellh packer runtime load g call to external function runtime read tls fallback runtime initcgo call to external function runtime read tls fallback runtime save g runtime read tls fallback not defined runtime load g runtime read tls fallback not defined runtime initcgo runtime read tls fallback not defined runtime save g undefined runtime read tls fallback runtime load g undefined runtime read tls fallback runtime initcgo undefined runtime read tls fallback copying binaries for this platform results total rwxr xr x sep packer what do i need to fix to solve this error | 0 |
114,339 | 17,199,717,500 | IssuesEvent | 2021-07-17 01:40:53 | teamhephy/docker-base | https://api.github.com/repos/teamhephy/docker-base | closed | rethink "statically tagged" images | proposal security | _From @bacongobbler on September 23, 2016 9:0_
Our current tagging workflow for docker-base goes like this:
- PR a few new features
- tag it
- :shipit:
One use case isn't addressed by this however, and that's to do with Ubuntu security updates. After #11 is merged and released, no code changes are required to upgrade packages which have CVE exploits and patches released. This becomes a problem because our idea of a "static" tag no longer holds when we need to update libssl in a future release.
For example:
- I am running docker-base v0.3.2, tagged shortly after merging #11
- In docker-base v0.3.2, libssl1.0.0 1.0.2g-1ubuntu4.4 is installed
- A new CVE is released, and the patch is in 1.0.2g-1ubuntu4.6
Since no code changes are required to rebuild the image with this new package, we do not need to create a new tag for docker-base. Instead, v0.3.2 would be re-pushed with the new package. This is different than our usual workflow of "once it's released, don't change it".
Perhaps we should re-think the tagging workflow for docker-base and instead continue to use the same tagging scheme as the upstream image ubuntu-slim relies on (the distro release):
```
docker pull quay.io/deis/base:16.04
```
Or perhaps a more dynamic "build number" scheme is required:
```
docker pull quay.io/deis/base:v0.3.2-160923-020215
```
Where the "build number" in this case is the date (yymmdd) followed by time (hhmmss). We can then continue to use v0.3.2 normally as a "rolling tag", but it allows us to release point-in-time builds for the docker-base image when security fixes are released.
_Copied from original issue: deis/docker-base#12_ | True | rethink "statically tagged" images - _From @bacongobbler on September 23, 2016 9:0_
Our current tagging workflow for docker-base goes like this:
- PR a few new features
- tag it
- :shipit:
One use case isn't addressed by this however, and that's to do with Ubuntu security updates. After #11 is merged and released, no code changes are required to upgrade packages which have CVE exploits and patches released. This becomes a problem because our idea of a "static" tag no longer holds when we need to update libssl in a future release.
For example:
- I am running docker-base v0.3.2, tagged shortly after merging #11
- In docker-base v0.3.2, libssl1.0.0 1.0.2g-1ubuntu4.4 is installed
- A new CVE is released, and the patch is in 1.0.2g-1ubuntu4.6
Since no code changes are required to rebuild the image with this new package, we do not need to create a new tag for docker-base. Instead, v0.3.2 would be re-pushed with the new package. This is different than our usual workflow of "once it's released, don't change it".
Perhaps we should re-think the tagging workflow for docker-base and instead continue to use the same tagging scheme as the upstream image ubuntu-slim relies on (the distro release):
```
docker pull quay.io/deis/base:16.04
```
Or perhaps a more dynamic "build number" scheme is required:
```
docker pull quay.io/deis/base:v0.3.2-160923-020215
```
Where the "build number" in this case is the date (yymmdd) followed by time (hhmmss). We can then continue to use v0.3.2 normally as a "rolling tag", but it allows us to release point-in-time builds for the docker-base image when security fixes are released.
_Copied from original issue: deis/docker-base#12_ | non_priority | rethink statically tagged images from bacongobbler on september our current tagging workflow for docker base goes like this pr a few new features tag it shipit one use case isn t addressed by this however and that s to do with ubuntu security updates after is merged and released no code changes are required to upgrade packages which have cve exploits and patches released this becomes a problem because our idea of a static tag no longer holds when we need to update libssl in a future release for example i am running docker base tagged shortly after merging in docker base is installed a new cve is released and the patch is in since no code changes are required to rebuild the image with this new package we do not need to create a new tag for docker base instead would be re pushed with the new package this is different than our usual workflow of once it s released don t change it perhaps we should re think the tagging workflow for docker base and instead continue to use the same tagging scheme as the upstream image ubuntu slim relies on the distro release docker pull quay io deis base or perhaps a more dynamic build number scheme is required docker pull quay io deis base where the build number in this case is the date yymmdd followed by time hhmmss we can then continue to use normally as a rolling tag but it allows us to release point in time builds for the docker base image when security fixes are released copied from original issue deis docker base | 0 |
321,313 | 23,850,189,633 | IssuesEvent | 2022-09-06 17:10:11 | pharmaverse/admiral | https://api.github.com/repos/pharmaverse/admiral | closed | Documentation: Typo on derive_vars_dtm | documentation good first issue release 0.8.0 05-Sep-2022 | ### Please select a category the issue is focused on?
_No response_
### Let us know where something needs a refresh or put your idea here!
On the [documentation page ](https://pharmaverse.github.io/admiral/reference/derive_vars_dtm.html) for this function, there is a an example given: impute_dtc(
"2020-11",
min_dates = list(
ymd_hms("2020-12-06T12:12:12"),
ymd_hms("2020-11-11T11:11:11")
),
date_imputation = "first"
)
I think "first" should be changed to "FIRST" as per the rest of the documentation on that page? The same example is also given on [this page](https://pharmaverse.github.io/admiral/reference/derive_vars_dt.html) | 1.0 | Documentation: Typo on derive_vars_dtm - ### Please select a category the issue is focused on?
_No response_
### Let us know where something needs a refresh or put your idea here!
On the [documentation page ](https://pharmaverse.github.io/admiral/reference/derive_vars_dtm.html) for this function, there is a an example given: impute_dtc(
"2020-11",
min_dates = list(
ymd_hms("2020-12-06T12:12:12"),
ymd_hms("2020-11-11T11:11:11")
),
date_imputation = "first"
)
I think "first" should be changed to "FIRST" as per the rest of the documentation on that page? The same example is also given on [this page](https://pharmaverse.github.io/admiral/reference/derive_vars_dt.html) | non_priority | documentation typo on derive vars dtm please select a category the issue is focused on no response let us know where something needs a refresh or put your idea here on the for this function there is a an example given impute dtc min dates list ymd hms ymd hms date imputation first i think first should be changed to first as per the rest of the documentation on that page the same example is also given on | 0 |
228,146 | 17,420,317,880 | IssuesEvent | 2021-08-04 00:06:38 | ISS-Mimic/Mimic | https://api.github.com/repos/ISS-Mimic/Mimic | opened | Spec out 2-ft HDMI cables instead of 3-ft cables | Documentation | The cables listed in the [HDMI Cable BOM](https://github.com/ISS-Mimic/Mimic/wiki/Build-Instruction%3A-Bill-of-Materials#hdmi-cables) are for a 3-pack of 3-ft cables (qty 2). I didn't pay attention and ordered them, but they're really too long.
Suggest changing to [Cable Builders Short HDMI Cable 2-ft [2-Pack]](https://www.amazon.com/Cable-Builders-2-Pack-Ethernet-18GBps/dp/B07LFN7CX6), qty 3. It's a couple of dollars more overall but removes having HDMI cable looping out from the frame.
I plan to return the ones I ordered and replace them with 2-ft cables. | 1.0 | Spec out 2-ft HDMI cables instead of 3-ft cables - The cables listed in the [HDMI Cable BOM](https://github.com/ISS-Mimic/Mimic/wiki/Build-Instruction%3A-Bill-of-Materials#hdmi-cables) are for a 3-pack of 3-ft cables (qty 2). I didn't pay attention and ordered them, but they're really too long.
Suggest changing to [Cable Builders Short HDMI Cable 2-ft [2-Pack]](https://www.amazon.com/Cable-Builders-2-Pack-Ethernet-18GBps/dp/B07LFN7CX6), qty 3. It's a couple of dollars more overall but removes having HDMI cable looping out from the frame.
I plan to return the ones I ordered and replace them with 2-ft cables. | non_priority | spec out ft hdmi cables instead of ft cables the cables listed in the are for a pack of ft cables qty i didn t pay attention and ordered them but they re really too long suggest changing to qty it s a couple of dollars more overall but removes having hdmi cable looping out from the frame i plan to return the ones i ordered and replace them with ft cables | 0 |
28,800 | 12,965,919,216 | IssuesEvent | 2020-07-20 23:28:52 | dart-lang/dart-pad | https://api.github.com/repos/dart-lang/dart-pad | opened | Debug why dart-services fails after serving for a couple of hours | dart-services p1 | For reasons unknown, `dart-services` transitions into a failure state after serving content for a couple of hours. We need to find out why, and build a reproduction case for Dart DevTools team. | 1.0 | Debug why dart-services fails after serving for a couple of hours - For reasons unknown, `dart-services` transitions into a failure state after serving content for a couple of hours. We need to find out why, and build a reproduction case for Dart DevTools team. | non_priority | debug why dart services fails after serving for a couple of hours for reasons unknown dart services transitions into a failure state after serving content for a couple of hours we need to find out why and build a reproduction case for dart devtools team | 0 |
127,408 | 12,322,200,343 | IssuesEvent | 2020-05-13 09:56:50 | alphagov/cyber-security-nessus | https://api.github.com/repos/alphagov/cyber-security-nessus | closed | Create documentation | documentation | We need to have some basic documentation for this project. This will help explain how to work with the service for new team members a refresh the memory of anyone coming back to the project.
The documentation should include the following
- [] [ADR](https://github.com/joelparkerhenderson/architecture_decision_record) records
- [] Simple architecture diagram
- [] Deployment details - accounts / regions / concourse
- [] Important links / supporting resources | 1.0 | Create documentation - We need to have some basic documentation for this project. This will help explain how to work with the service for new team members a refresh the memory of anyone coming back to the project.
The documentation should include the following
- [] [ADR](https://github.com/joelparkerhenderson/architecture_decision_record) records
- [] Simple architecture diagram
- [] Deployment details - accounts / regions / concourse
- [] Important links / supporting resources | non_priority | create documentation we need to have some basic documentation for this project this will help explain how to work with the service for new team members a refresh the memory of anyone coming back to the project the documentation should include the following records simple architecture diagram deployment details accounts regions concourse important links supporting resources | 0 |
18,190 | 5,607,138,621 | IssuesEvent | 2017-04-01 02:20:58 | mcsheaj/SPEasyForms | https://api.github.com/repos/mcsheaj/SPEasyForms | closed | Save button doesn't work on root site | codeplex | **This issue was imported from [CodePlex](http://SPEasyForms.codeplex.com/workitem/8)**
**[ee61re](http://www.codeplex.com/site/users/view/ee61re)** wrote 2014-12-09 at 06:21
Environment is 2010 SP2 with November 2014 CU
web app with single site collection at root - was a 2007 content database attach-upgrade to 2010.
Solution is 2014.00.09.beta2
Account used is Site Collection administrator
On the root site, the Save button doesn't appear to do anything - and if I then navigate elsewhere, my changes are lost.
This occurs on an existing custom list, and also on a newly created Announcements list.
Changes I've tried include visibility changes and also adding a column to the defaultform.
On a subsite in that site collection, it works fine.
On a site collection in the same webapp on a managed path /sites/, it also works fine.
On another web app root site collection (2010 native, not upgraded from 2007) it works fine.
That suggests that the fact that it is upgraded from 2007 is causing the issue??
**[mcsheaj](http://www.codeplex.com/site/users/view/mcsheaj)** wrote 2014-12-09 at 09:33
I'll take a look, but this is probably going to difficult or impossible for me to reproduce. I've seen plenty of screwy problems when a site is upgraded from 2007 to 2010.
There are a couple of things you can try to hopefully get more information:
<ul>
<li>When you're on the SPEasyForms settings page, add '&spEasyFormsVerbose=true' to the end of the URL and hit enter to reload the page. Then make your changes and try to save. You may get a dialog with an error, either from my code or SPServices. If you
do, let me know what the error is. If not, let me know that too. </li><li>You can also try launching developer tools (F12). Make sure the script debugger is started, make your changes and try to save. If it hits an exception, let me know what the exception is and what line of code it is on. Also, look at the console and send
me any messages from there.
</li></ul>
**[ee61re](http://www.codeplex.com/site/users/view/ee61re)** wrote 2014-12-09 at 10:38
Ok - verbose gives me a dialog that says:
The web service returned 409 - CONFLICT. This most likely means you do not have a 'Site Assets' library in the current site with a URL of SiteAssets. This is required before you can load and save SPEasyForms configuration files.
My site collection doesn't have one.
The other site collection in another webapp does, and so does the subsite in the broken site collection.
Sounds like creating a Site Assets library is my next step! :-)
Thanks for the speedy assistance!
**[mcsheaj](http://www.codeplex.com/site/users/view/mcsheaj)** wrote 2014-12-09 at 12:09
No problem. For some reason that must have seemed like a good idea at the time, I hid that dialog unless verbose is on in the latest beta release. I've already gone back to always displaying it in my latest code.
**[karlmarx](http://www.codeplex.com/site/users/view/karlmarx)** wrote 2015-02-20 at 13:35
I had the same problem. Yikes!
I'm glad I googled it before giving up. It's working now!
**[mcsheaj](http://www.codeplex.com/site/users/view/mcsheaj)** wrote 2015-02-22 at 11:16
Great. Yeah, this is one of the most frequently reported problems. Especially on SP 2010. I don't know why some sites don't have a Site Assets folder. I have seen that 2007 site collections that are migrated to 2010 sometimes don't have it. I need to add
a troubleshooting section to the manual. I also need to make sure the dialog box for this pops up without the verbose option; I thought I'd already done that, but it doesn't seem to be working. | 1.0 | Save button doesn't work on root site - **This issue was imported from [CodePlex](http://SPEasyForms.codeplex.com/workitem/8)**
**[ee61re](http://www.codeplex.com/site/users/view/ee61re)** wrote 2014-12-09 at 06:21
Environment is 2010 SP2 with November 2014 CU
web app with single site collection at root - was a 2007 content database attach-upgrade to 2010.
Solution is 2014.00.09.beta2
Account used is Site Collection administrator
On the root site, the Save button doesn't appear to do anything - and if I then navigate elsewhere, my changes are lost.
This occurs on an existing custom list, and also on a newly created Announcements list.
Changes I've tried include visibility changes and also adding a column to the defaultform.
On a subsite in that site collection, it works fine.
On a site collection in the same webapp on a managed path /sites/, it also works fine.
On another web app root site collection (2010 native, not upgraded from 2007) it works fine.
That suggests that the fact that it is upgraded from 2007 is causing the issue??
**[mcsheaj](http://www.codeplex.com/site/users/view/mcsheaj)** wrote 2014-12-09 at 09:33
I'll take a look, but this is probably going to difficult or impossible for me to reproduce. I've seen plenty of screwy problems when a site is upgraded from 2007 to 2010.
There are a couple of things you can try to hopefully get more information:
<ul>
<li>When you're on the SPEasyForms settings page, add '&spEasyFormsVerbose=true' to the end of the URL and hit enter to reload the page. Then make your changes and try to save. You may get a dialog with an error, either from my code or SPServices. If you
do, let me know what the error is. If not, let me know that too. </li><li>You can also try launching developer tools (F12). Make sure the script debugger is started, make your changes and try to save. If it hits an exception, let me know what the exception is and what line of code it is on. Also, look at the console and send
me any messages from there.
</li></ul>
**[ee61re](http://www.codeplex.com/site/users/view/ee61re)** wrote 2014-12-09 at 10:38
Ok - verbose gives me a dialog that says:
The web service returned 409 - CONFLICT. This most likely means you do not have a 'Site Assets' library in the current site with a URL of SiteAssets. This is required before you can load and save SPEasyForms configuration files.
My site collection doesn't have one.
The other site collection in another webapp does, and so does the subsite in the broken site collection.
Sounds like creating a Site Assets library is my next step! :-)
Thanks for the speedy assistance!
**[mcsheaj](http://www.codeplex.com/site/users/view/mcsheaj)** wrote 2014-12-09 at 12:09
No problem. For some reason that must have seemed like a good idea at the time, I hid that dialog unless verbose is on in the latest beta release. I've already gone back to always displaying it in my latest code.
**[karlmarx](http://www.codeplex.com/site/users/view/karlmarx)** wrote 2015-02-20 at 13:35
I had the same problem. Yikes!
I'm glad I googled it before giving up. It's working now!
**[mcsheaj](http://www.codeplex.com/site/users/view/mcsheaj)** wrote 2015-02-22 at 11:16
Great. Yeah, this is one of the most frequently reported problems. Especially on SP 2010. I don't know why some sites don't have a Site Assets folder. I have seen that 2007 site collections that are migrated to 2010 sometimes don't have it. I need to add
a troubleshooting section to the manual. I also need to make sure the dialog box for this pops up without the verbose option; I thought I'd already done that, but it doesn't seem to be working. | non_priority | save button doesn t work on root site this issue was imported from wrote at environment is with november cu web app with single site collection at root was a content database attach upgrade to solution is account used is site collection administrator on the root site the save button doesn t appear to do anything and if i then navigate elsewhere my changes are lost this occurs on an existing custom list and also on a newly created announcements list changes i ve tried include visibility changes and also adding a column to the defaultform on a subsite in that site collection it works fine on a site collection in the same webapp on a managed path sites it also works fine on another web app root site collection native not upgraded from it works fine that suggests that the fact that it is upgraded from is causing the issue wrote at i ll take a look but this is probably going to difficult or impossible for me to reproduce i ve seen plenty of screwy problems when a site is upgraded from to there are a couple of things you can try to hopefully get more information when you re on the speasyforms settings page add speasyformsverbose true to the end of the url and hit enter to reload the page then make your changes and try to save you may get a dialog with an error either from my code or spservices if you do let me know what the error is if not let me know that too you can also try launching developer tools make sure the script debugger is started make your changes and try to save if it hits an exception let me know what the exception is and what line of code it is on also look at the console and send me any messages from there wrote at ok verbose gives me a dialog that says the web service returned conflict this most likely means you do not have a site assets library in the current site with a url of siteassets this is required before you can load and save speasyforms configuration files my site collection doesn t have one the other site collection in another webapp does and so does the subsite in the broken site collection sounds like creating a site assets library is my next step thanks for the speedy assistance wrote at no problem for some reason that must have seemed like a good idea at the time i hid that dialog unless verbose is on in the latest beta release i ve already gone back to always displaying it in my latest code wrote at i had the same problem yikes i m glad i googled it before giving up it s working now wrote at great yeah this is one of the most frequently reported problems especially on sp i don t know why some sites don t have a site assets folder i have seen that site collections that are migrated to sometimes don t have it i need to add a troubleshooting section to the manual i also need to make sure the dialog box for this pops up without the verbose option i thought i d already done that but it doesn t seem to be working | 0 |
21,406 | 17,028,661,220 | IssuesEvent | 2021-07-04 04:46:00 | home-climate-control/dz | https://api.github.com/repos/home-climate-control/dz | opened | Make PID_Controller visible to JMX | JMX bug instrumentation usability | ### Expected Behavior
When added to `JmxWrapper`, the `PID_Controller` is accessible via `jconsole`.
### Actual Behavior
`PID_Controller` is not visible at `jconsole`.
### Root Cause
Not passing the JMX name to `AbstractPidController`. | True | Make PID_Controller visible to JMX - ### Expected Behavior
When added to `JmxWrapper`, the `PID_Controller` is accessible via `jconsole`.
### Actual Behavior
`PID_Controller` is not visible at `jconsole`.
### Root Cause
Not passing the JMX name to `AbstractPidController`. | non_priority | make pid controller visible to jmx expected behavior when added to jmxwrapper the pid controller is accessible via jconsole actual behavior pid controller is not visible at jconsole root cause not passing the jmx name to abstractpidcontroller | 0 |
235 | 2,587,974,420 | IssuesEvent | 2015-02-17 21:50:10 | uProxy/uproxy | https://api.github.com/repos/uProxy/uproxy | closed | month is wrong in logging timestamps | C:ServiceOrInfrastructure P2 | Logs from running Simple SOCKS this morning:
```
simple-socks I [1/17 12:46:21.356] SocksToRtc listening on: {"address":"127.0.0.1","port":9999}
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [1/17 12:46:21.357] curl -x socks5h://127.0.0.1:9999 www.example.com
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [1/17 12:46:21.361] RtcToNet ready
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:26.416] created new session c0
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:26.476] discarded session c0 (0 remaining)
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:28.255] created new session c1
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:28.293] discarded session c1 (0 remaining)
```
Great, except that it's February and it's not exactly intuitive that months start from zero.
Suggest we use the shortened form of the string, i.e.:
```
simple-socks I [Feb 17 12:46:21.356] SocksToRtc listening on: {"address":"127.0.0.1","port":9999}
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [Feb 17 12:46:21.357] curl -x socks5h://127.0.0.1:9999 www.example.com
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [Feb 17 12:46:21.361] RtcToNet ready
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:26.416] created new session c0
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:26.476] discarded session c0 (0 remaining)
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:28.255] created new session c1
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:28.293] discarded session c1 (0 remaining)
```
This would also assist readability by replacing one number with a string. | 1.0 | month is wrong in logging timestamps - Logs from running Simple SOCKS this morning:
```
simple-socks I [1/17 12:46:21.356] SocksToRtc listening on: {"address":"127.0.0.1","port":9999}
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [1/17 12:46:21.357] curl -x socks5h://127.0.0.1:9999 www.example.com
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [1/17 12:46:21.361] RtcToNet ready
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:26.416] created new session c0
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:26.476] discarded session c0 (0 remaining)
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:28.255] created new session c1
freedom-for-chrome.js:1111 SocksToRtc I [1/17 12:46:28.293] discarded session c1 (0 remaining)
```
Great, except that it's February and it's not exactly intuitive that months start from zero.
Suggest we use the shortened form of the string, i.e.:
```
simple-socks I [Feb 17 12:46:21.356] SocksToRtc listening on: {"address":"127.0.0.1","port":9999}
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [Feb 17 12:46:21.357] curl -x socks5h://127.0.0.1:9999 www.example.com
lib/freedom/freedom-for-chrome.js:1111 simple-socks I [Feb 17 12:46:21.361] RtcToNet ready
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:26.416] created new session c0
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:26.476] discarded session c0 (0 remaining)
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:28.255] created new session c1
freedom-for-chrome.js:1111 SocksToRtc I [Feb 17 12:46:28.293] discarded session c1 (0 remaining)
```
This would also assist readability by replacing one number with a string. | non_priority | month is wrong in logging timestamps logs from running simple socks this morning simple socks i sockstortc listening on address port lib freedom freedom for chrome js simple socks i curl x lib freedom freedom for chrome js simple socks i rtctonet ready freedom for chrome js sockstortc i created new session freedom for chrome js sockstortc i discarded session remaining freedom for chrome js sockstortc i created new session freedom for chrome js sockstortc i discarded session remaining great except that it s february and it s not exactly intuitive that months start from zero suggest we use the shortened form of the string i e simple socks i sockstortc listening on address port lib freedom freedom for chrome js simple socks i curl x lib freedom freedom for chrome js simple socks i rtctonet ready freedom for chrome js sockstortc i created new session freedom for chrome js sockstortc i discarded session remaining freedom for chrome js sockstortc i created new session freedom for chrome js sockstortc i discarded session remaining this would also assist readability by replacing one number with a string | 0 |
89,788 | 15,837,540,456 | IssuesEvent | 2021-04-06 20:56:28 | TIBCOSoftware/tci-flogo | https://api.github.com/repos/TIBCOSoftware/tci-flogo | closed | WS-2019-0064 (High) detected in handlebars-3.0.3.tgz - autoclosed | security vulnerability | ## WS-2019-0064 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-3.0.3.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-3.0.3.tgz">https://registry.npmjs.org/handlebars/-/handlebars-3.0.3.tgz</a></p>
<p>
Dependency Hierarchy:
- typedoc-markdown-theme-0.0.4.tgz (Root Library)
- typedoc-0.3.12.tgz
- :x: **handlebars-3.0.3.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
<p>Publish Date: 2019-01-30
<p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p>
<p>Release Date: 2019-04-30</p>
<p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p>
</p>
</details>
<p></p>
| True | WS-2019-0064 (High) detected in handlebars-3.0.3.tgz - autoclosed - ## WS-2019-0064 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>handlebars-3.0.3.tgz</b></p></summary>
<p>Handlebars provides the power necessary to let you build semantic templates effectively with no frustration</p>
<p>Library home page: <a href="https://registry.npmjs.org/handlebars/-/handlebars-3.0.3.tgz">https://registry.npmjs.org/handlebars/-/handlebars-3.0.3.tgz</a></p>
<p>
Dependency Hierarchy:
- typedoc-markdown-theme-0.0.4.tgz (Root Library)
- typedoc-0.3.12.tgz
- :x: **handlebars-3.0.3.tgz** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Versions of handlebars prior to 4.0.14 are vulnerable to Prototype Pollution. Templates may alter an Objects' prototype, thus allowing an attacker to execute arbitrary code on the server.
<p>Publish Date: 2019-01-30
<p>URL: <a href=https://github.com/wycats/handlebars.js/compare/v4.1.1...v4.1.2>WS-2019-0064</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>8.0</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.npmjs.com/advisories/755/versions">https://www.npmjs.com/advisories/755/versions</a></p>
<p>Release Date: 2019-04-30</p>
<p>Fix Resolution: 1.0.6-2,4.0.14,4.1.2</p>
</p>
</details>
<p></p>
| non_priority | ws high detected in handlebars tgz autoclosed ws high severity vulnerability vulnerable library handlebars tgz handlebars provides the power necessary to let you build semantic templates effectively with no frustration library home page a href dependency hierarchy typedoc markdown theme tgz root library typedoc tgz x handlebars tgz vulnerable library vulnerability details versions of handlebars prior to are vulnerable to prototype pollution templates may alter an objects prototype thus allowing an attacker to execute arbitrary code on the server publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution | 0 |
3,998 | 2,947,664,540 | IssuesEvent | 2015-07-05 10:40:40 | Glitchfiend/BiomesOPlenty | https://api.github.com/repos/Glitchfiend/BiomesOPlenty | closed | Unknown Recipe Class Warning | code | Apparently this is making some people scream as their log is not clean. | 1.0 | Unknown Recipe Class Warning - Apparently this is making some people scream as their log is not clean. | non_priority | unknown recipe class warning apparently this is making some people scream as their log is not clean | 0 |
4,741 | 17,369,742,066 | IssuesEvent | 2021-07-30 12:26:31 | dcaribou/player-scores | https://api.github.com/repos/dcaribou/player-scores | closed | Enable self-serve DVC backend access granting | automations | In order to be able to pull data from DVC remote storage, potential contributors need to be able to List and Get objects from S3 bucket `s3://player-scores`. Enable users to self-grant permissions for this actions by creating a PR adding their IAM user to a whitelist in the Terraform configuration.
Create a terraform whitelist that renders a `aws_iam_policy_document` that can be attached to the bucket
https://github.com/dcaribou/player-scores/blob/49385db77088718fdf5344d4f8b1cf7b20da8f19/infra/base/main.tf#L14 | 1.0 | Enable self-serve DVC backend access granting - In order to be able to pull data from DVC remote storage, potential contributors need to be able to List and Get objects from S3 bucket `s3://player-scores`. Enable users to self-grant permissions for this actions by creating a PR adding their IAM user to a whitelist in the Terraform configuration.
Create a terraform whitelist that renders a `aws_iam_policy_document` that can be attached to the bucket
https://github.com/dcaribou/player-scores/blob/49385db77088718fdf5344d4f8b1cf7b20da8f19/infra/base/main.tf#L14 | non_priority | enable self serve dvc backend access granting in order to be able to pull data from dvc remote storage potential contributors need to be able to list and get objects from bucket player scores enable users to self grant permissions for this actions by creating a pr adding their iam user to a whitelist in the terraform configuration create a terraform whitelist that renders a aws iam policy document that can be attached to the bucket | 0 |
333,097 | 24,363,779,672 | IssuesEvent | 2022-10-03 13:45:14 | superstashed/medusa-stonkers | https://api.github.com/repos/superstashed/medusa-stonkers | closed | Update README.md so it matches the Hackathon guidelines | documentation | Update README.md so it matches the [Hackathon guidelines](https://github.com/suhailkakar/react-native-medusajs/blob/main/README.md) | 1.0 | Update README.md so it matches the Hackathon guidelines - Update README.md so it matches the [Hackathon guidelines](https://github.com/suhailkakar/react-native-medusajs/blob/main/README.md) | non_priority | update readme md so it matches the hackathon guidelines update readme md so it matches the | 0 |
221,811 | 24,659,159,454 | IssuesEvent | 2022-10-18 04:21:58 | valtech-ch/microservice-kubernetes-cluster | https://api.github.com/repos/valtech-ch/microservice-kubernetes-cluster | reopened | CVE-2020-10650 (High) detected in jackson-databind-2.9.8.jar | security vulnerability | ## CVE-2020-10650 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /functions/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-cloud-starter-function-web-3.2.7.jar (Root Library)
- spring-boot-starter-web-2.7.4.jar
- spring-boot-starter-json-2.7.4.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/335a4047c89f52dfe860e93daefb32dc86a521a2">335a4047c89f52dfe860e93daefb32dc86a521a2</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jackson-databind library before versions 2.9.10.4 is vulnerable to an Unsafe Deserialization vulnerability when handling interactions related to the class ignite-jta
<p>Publish Date: 2020-07-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10650>CVE-2020-10650</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-rpr3-cw39-3pxh">https://github.com/advisories/GHSA-rpr3-cw39-3pxh</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-10650 (High) detected in jackson-databind-2.9.8.jar - ## CVE-2020-10650 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /functions/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.9.8/11283f21cc480aa86c4df7a0a3243ec508372ed2/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- spring-cloud-starter-function-web-3.2.7.jar (Root Library)
- spring-boot-starter-web-2.7.4.jar
- spring-boot-starter-json-2.7.4.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valtech-ch/microservice-kubernetes-cluster/commit/335a4047c89f52dfe860e93daefb32dc86a521a2">335a4047c89f52dfe860e93daefb32dc86a521a2</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
jackson-databind library before versions 2.9.10.4 is vulnerable to an Unsafe Deserialization vulnerability when handling interactions related to the class ignite-jta
<p>Publish Date: 2020-07-21
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-10650>CVE-2020-10650</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>8.1</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-rpr3-cw39-3pxh">https://github.com/advisories/GHSA-rpr3-cw39-3pxh</a></p>
<p>Release Date: 2020-07-21</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.10.4</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar cve high severity vulnerability vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file functions build gradle path to vulnerable library home wss scanner gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring cloud starter function web jar root library spring boot starter web jar spring boot starter json jar x jackson databind jar vulnerable library found in head commit a href found in base branch develop vulnerability details jackson databind library before versions is vulnerable to an unsafe deserialization vulnerability when handling interactions related to the class ignite jta publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with mend | 0 |
54,213 | 13,265,076,575 | IssuesEvent | 2020-08-21 05:39:04 | microsoft/vscode | https://api.github.com/repos/microsoft/vscode | opened | Dependency cycle between 'vs/workbench/api/browser/mainThreadWebview' and 'vs/workbench/api/browser/mainThreadWebviewSerializer'. | important vscode-build | ```
There is a dependency cycle between 'vs/workbench/api/browser/mainThreadWebview' and 'vs/workbench/api/browser/mainThreadWebviewSerializer'. The cyclic path follows:
vs/workbench/api/browser/mainThreadWebview =>
vs/workbench/api/browser/mainThreadWebviewSerializer =>
vs/workbench/api/browser/mainThreadWebview
```
https://dev.azure.com/monacotools/Monaco/_build/results?buildId=85216&view=logs&j=bd1e231b-cef9-51a2-e461-b67194c0a817&t=9cc46b07-0f4a-51e5-598b-b142e2b8a72a&l=91 | 1.0 | Dependency cycle between 'vs/workbench/api/browser/mainThreadWebview' and 'vs/workbench/api/browser/mainThreadWebviewSerializer'. - ```
There is a dependency cycle between 'vs/workbench/api/browser/mainThreadWebview' and 'vs/workbench/api/browser/mainThreadWebviewSerializer'. The cyclic path follows:
vs/workbench/api/browser/mainThreadWebview =>
vs/workbench/api/browser/mainThreadWebviewSerializer =>
vs/workbench/api/browser/mainThreadWebview
```
https://dev.azure.com/monacotools/Monaco/_build/results?buildId=85216&view=logs&j=bd1e231b-cef9-51a2-e461-b67194c0a817&t=9cc46b07-0f4a-51e5-598b-b142e2b8a72a&l=91 | non_priority | dependency cycle between vs workbench api browser mainthreadwebview and vs workbench api browser mainthreadwebviewserializer there is a dependency cycle between vs workbench api browser mainthreadwebview and vs workbench api browser mainthreadwebviewserializer the cyclic path follows vs workbench api browser mainthreadwebview vs workbench api browser mainthreadwebviewserializer vs workbench api browser mainthreadwebview | 0 |
1,226 | 2,534,221,592 | IssuesEvent | 2015-01-24 18:42:58 | mathjax/MathJax | https://api.github.com/repos/mathjax/MathJax | closed | MathJax can't find its script tag in XHTML if XHTML tags use an explicit prefix | Accepted Merged QA - Do Not Write Automated Test | If I create an xhtml page that uses explicit prefixes on the html tags, MathJax's code for finding its `<script>` tag fails. There also seems to be a similar issue with the `<head>` tag.
Test case:
```html
<html:html xmlns:html="http://www.w3.org/1999/xhtml" xmlns="http://www.w3.org/1999/xhtml">
<html:head>
<html:script type="text/javascript" src="MathJax/MathJax.js?config=default"/>
<html:title>test</html:title>
</html:head>
<html:body>
<html:h1>This is a test</html:h1>
<html:div>
Here is an equation: \( x=5 \)
</html:div>
</html:body>
</html:html>
```
Expected results: Correctly render the equation x=5
Actual results: No rendering (tested with Firefox 35)
The issue can be worked around by
* removing the namespace prefix from the `<head>` and `<script>` tags, or
* Modifying MathJax.js to use getElementsByTagName("html:script") instead of getElementsByTagName("script"), and similarly getElementsByTagName("html:head") in place of getElementsByTagName("head") | 1.0 | MathJax can't find its script tag in XHTML if XHTML tags use an explicit prefix - If I create an xhtml page that uses explicit prefixes on the html tags, MathJax's code for finding its `<script>` tag fails. There also seems to be a similar issue with the `<head>` tag.
Test case:
```html
<html:html xmlns:html="http://www.w3.org/1999/xhtml" xmlns="http://www.w3.org/1999/xhtml">
<html:head>
<html:script type="text/javascript" src="MathJax/MathJax.js?config=default"/>
<html:title>test</html:title>
</html:head>
<html:body>
<html:h1>This is a test</html:h1>
<html:div>
Here is an equation: \( x=5 \)
</html:div>
</html:body>
</html:html>
```
Expected results: Correctly render the equation x=5
Actual results: No rendering (tested with Firefox 35)
The issue can be worked around by
* removing the namespace prefix from the `<head>` and `<script>` tags, or
* Modifying MathJax.js to use getElementsByTagName("html:script") instead of getElementsByTagName("script"), and similarly getElementsByTagName("html:head") in place of getElementsByTagName("head") | non_priority | mathjax can t find its script tag in xhtml if xhtml tags use an explicit prefix if i create an xhtml page that uses explicit prefixes on the html tags mathjax s code for finding its tag fails there also seems to be a similar issue with the tag test case html html html xmlns html xmlns test this is a test here is an equation x expected results correctly render the equation x actual results no rendering tested with firefox the issue can be worked around by removing the namespace prefix from the and tags or modifying mathjax js to use getelementsbytagname html script instead of getelementsbytagname script and similarly getelementsbytagname html head in place of getelementsbytagname head | 0 |
174,456 | 21,300,072,525 | IssuesEvent | 2022-04-15 01:03:48 | shaimael/easybuggy2 | https://api.github.com/repos/shaimael/easybuggy2 | closed | CVE-2020-2875 (Medium) detected in mysql-connector-java-5.1.25.jar - autoclosed | security vulnerability | ## CVE-2020-2875 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.25.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /repository/mysql/mysql-connector-java/5.1.25/mysql-connector-java-5.1.25.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.25.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/shaimael/easybuggy2/commit/ce89fd7428395b7b7deb3984e6d7f139611ecc6f">ce89fd7428395b7b7deb3984e6d7f139611ecc6f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875>CVE-2020-2875</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5">https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: mysql:mysql-connector-java:5.1.49,8.0.15</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"mysql","packageName":"mysql-connector-java","packageVersion":"5.1.25","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"mysql:mysql-connector-java:5.1.25","isMinimumFixVersionAvailable":true,"minimumFixVersion":"mysql:mysql-connector-java:5.1.49,8.0.15","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-2875","vulnerabilityDetails":"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875","cvss3Severity":"medium","cvss3Score":"4.7","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-2875 (Medium) detected in mysql-connector-java-5.1.25.jar - autoclosed - ## CVE-2020-2875 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mysql-connector-java-5.1.25.jar</b></p></summary>
<p>MySQL JDBC Type 4 driver</p>
<p>Library home page: <a href="http://dev.mysql.com/doc/connector-j/en/">http://dev.mysql.com/doc/connector-j/en/</a></p>
<p>Path to dependency file: /pom.xml</p>
<p>Path to vulnerable library: /repository/mysql/mysql-connector-java/5.1.25/mysql-connector-java-5.1.25.jar</p>
<p>
Dependency Hierarchy:
- :x: **mysql-connector-java-5.1.25.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/shaimael/easybuggy2/commit/ce89fd7428395b7b7deb3984e6d7f139611ecc6f">ce89fd7428395b7b7deb3984e6d7f139611ecc6f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).
<p>Publish Date: 2020-04-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875>CVE-2020-2875</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5">https://github.com/mysql/mysql-connector-j/commit/79a4336f140499bd22dd07f02b708e163844e3d5</a></p>
<p>Release Date: 2020-04-15</p>
<p>Fix Resolution: mysql:mysql-connector-java:5.1.49,8.0.15</p>
</p>
</details>
<p></p>
***
:rescue_worker_helmet: Automatic Remediation is available for this issue
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"mysql","packageName":"mysql-connector-java","packageVersion":"5.1.25","packageFilePaths":["/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"mysql:mysql-connector-java:5.1.25","isMinimumFixVersionAvailable":true,"minimumFixVersion":"mysql:mysql-connector-java:5.1.49,8.0.15","isBinary":false}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-2875","vulnerabilityDetails":"Vulnerability in the MySQL Connectors product of Oracle MySQL (component: Connector/J). Supported versions that are affected are 8.0.14 and prior and 5.1.48 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Connectors, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Connectors accessible data as well as unauthorized read access to a subset of MySQL Connectors accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N).","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-2875","cvss3Severity":"medium","cvss3Score":"4.7","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Changed","C":"Low","UI":"Required","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in mysql connector java jar autoclosed cve medium severity vulnerability vulnerable library mysql connector java jar mysql jdbc type driver library home page a href path to dependency file pom xml path to vulnerable library repository mysql mysql connector java mysql connector java jar dependency hierarchy x mysql connector java jar vulnerable library found in head commit a href found in base branch master vulnerability details vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior and and prior difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise mysql connectors successful attacks require human interaction from a person other than the attacker and while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac h pr n ui r s c c l i l a n publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution mysql mysql connector java rescue worker helmet automatic remediation is available for this issue isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree mysql mysql connector java isminimumfixversionavailable true minimumfixversion mysql mysql connector java isbinary false basebranches vulnerabilityidentifier cve vulnerabilitydetails vulnerability in the mysql connectors product of oracle mysql component connector j supported versions that are affected are and prior and and prior difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise mysql connectors successful attacks require human interaction from a person other than the attacker and while the vulnerability is in mysql connectors attacks may significantly impact additional products successful attacks of this vulnerability can result in unauthorized update insert or delete access to some of mysql connectors accessible data as well as unauthorized read access to a subset of mysql connectors accessible data cvss base score confidentiality and integrity impacts cvss vector cvss av n ac h pr n ui r s c c l i l a n vulnerabilityurl | 0 |
396,462 | 27,119,454,659 | IssuesEvent | 2023-02-15 21:26:53 | motion-canvas/motion-canvas | https://api.github.com/repos/motion-canvas/motion-canvas | closed | Documentation for logging | b-documentation c-accepted a-docs | **Description**
Since the Question arose a couple of times in the Discord and asked myself the same thing recently, it would be good
to have a short introduction / guide on how to use the build in logger, so the messages get displayed in the UI.
Doesn't have to be long since there is not much to write about, but I think not a lot of people know that you need to use the `useLogger` function to get a reference.
---
**Proposed Content**
One method of debugging your code or animation flow is using logging messages. For this, `motion-canvas` has its own build-in way to log messages.
To get a reference to the `Logger` in `motion-canvas` you can use the `useLogger` function:
```ts
import { makeScene2D } from '@motion-canvas/2d/lib/scenes';
import { useLogger } from '@motion-canvas/core/lib/utils';
export default makeScene2D(function* (view) {
const logger = useLogger();
});
```
On this reference, you are then able to call different functions corresponding to the log level you want to log at.
```ts
logger.debug('Just here to debug some code.');
logger.info('All fine just a little info.');
logger.warn('Be careful somethis has gone wrong.');
logger.error('Ups. An error occured.');
```
These messages get then displayed in the UI under the `Console` tab on the left side.
| 1.0 | Documentation for logging - **Description**
Since the Question arose a couple of times in the Discord and asked myself the same thing recently, it would be good
to have a short introduction / guide on how to use the build in logger, so the messages get displayed in the UI.
Doesn't have to be long since there is not much to write about, but I think not a lot of people know that you need to use the `useLogger` function to get a reference.
---
**Proposed Content**
One method of debugging your code or animation flow is using logging messages. For this, `motion-canvas` has its own build-in way to log messages.
To get a reference to the `Logger` in `motion-canvas` you can use the `useLogger` function:
```ts
import { makeScene2D } from '@motion-canvas/2d/lib/scenes';
import { useLogger } from '@motion-canvas/core/lib/utils';
export default makeScene2D(function* (view) {
const logger = useLogger();
});
```
On this reference, you are then able to call different functions corresponding to the log level you want to log at.
```ts
logger.debug('Just here to debug some code.');
logger.info('All fine just a little info.');
logger.warn('Be careful somethis has gone wrong.');
logger.error('Ups. An error occured.');
```
These messages get then displayed in the UI under the `Console` tab on the left side.
| non_priority | documentation for logging description since the question arose a couple of times in the discord and asked myself the same thing recently it would be good to have a short introduction guide on how to use the build in logger so the messages get displayed in the ui doesn t have to be long since there is not much to write about but i think not a lot of people know that you need to use the uselogger function to get a reference proposed content one method of debugging your code or animation flow is using logging messages for this motion canvas has its own build in way to log messages to get a reference to the logger in motion canvas you can use the uselogger function ts import from motion canvas lib scenes import uselogger from motion canvas core lib utils export default function view const logger uselogger on this reference you are then able to call different functions corresponding to the log level you want to log at ts logger debug just here to debug some code logger info all fine just a little info logger warn be careful somethis has gone wrong logger error ups an error occured these messages get then displayed in the ui under the console tab on the left side | 0 |
138,819 | 31,035,159,833 | IssuesEvent | 2023-08-10 14:48:19 | ljnpng/algorithm | https://api.github.com/repos/ljnpng/algorithm | opened | 289.生命游戏 | leetcode | # 289.生命游戏
[https://leetcode.cn/problems/game-of-life](https://leetcode.cn/problems/game-of-life)
## 原题
根据 <a href="https://baike.baidu.com/item/%E7%94%9F%E5%91%BD%E6%B8%B8%E6%88%8F/2926434?fr=aladdin" target="_blank">百度百科</a> , **生命游戏** ,简称为 **生命** ,是英国数学家约翰·何顿·康威在 1970 年发明的细胞自动机。
给定一个包含 `m × n` 个格子的面板,每一个格子都可以看成是一个细胞。每个细胞都具有一个初始状态: `1` 即为 **活细胞** (live),或 `0` 即为 **死细胞** (dead)。每个细胞与其八个相邻位置(水平,垂直,对角线)的细胞都遵循以下四条生存定律:
- 如果活细胞周围八个位置的活细胞数少于两个,则该位置活细胞死亡;
- 如果活细胞周围八个位置有两个或三个活细胞,则该位置活细胞仍然存活;
- 如果活细胞周围八个位置有超过三个活细胞,则该位置活细胞死亡;
- 如果死细胞周围正好有三个活细胞,则该位置死细胞复活;
下一个状态是通过将上述规则同时应用于当前状态下的每个细胞所形成的,其中细胞的出生和死亡是同时发生的。给你 `m x n` 网格面板 `board` 的当前状态,返回下一个状态。
**示例 1:**
<img alt="" src="https://assets.leetcode.com/uploads/2020/12/26/grid1.jpg" />
```
输入:board = [[0,1,0],[0,0,1],[1,1,1],[0,0,0]]
输出:[[0,0,0],[1,0,1],[0,1,1],[0,1,0]]
```
**示例 2:**
<img alt="" src="https://assets.leetcode.com/uploads/2020/12/26/grid2.jpg" />
```
输入:board = [[1,1],[1,0]]
输出:[[1,1],[1,1]]
```
**提示:**
- `m == board.length`
- `n == board[i].length`
- `1 <= m, n <= 25`
- `board[i][j]` 为 `0` 或 `1`
**进阶:**
- 你可以使用原地算法解决本题吗?请注意,面板上所有格子需要同时被更新:你不能先更新某些格子,然后使用它们的更新后的值再更新其他格子。
- 本题中,我们使用二维数组来表示面板。原则上,面板是无限的,但当活细胞侵占了面板边界时会造成问题。你将如何解决这些问题?
**标签**
`数组` `矩阵` `模拟`
##
```java
class Solution {
public void gameOfLife(int[][] board) {
}
}
```
>
| 1.0 | 289.生命游戏 - # 289.生命游戏
[https://leetcode.cn/problems/game-of-life](https://leetcode.cn/problems/game-of-life)
## 原题
根据 <a href="https://baike.baidu.com/item/%E7%94%9F%E5%91%BD%E6%B8%B8%E6%88%8F/2926434?fr=aladdin" target="_blank">百度百科</a> , **生命游戏** ,简称为 **生命** ,是英国数学家约翰·何顿·康威在 1970 年发明的细胞自动机。
给定一个包含 `m × n` 个格子的面板,每一个格子都可以看成是一个细胞。每个细胞都具有一个初始状态: `1` 即为 **活细胞** (live),或 `0` 即为 **死细胞** (dead)。每个细胞与其八个相邻位置(水平,垂直,对角线)的细胞都遵循以下四条生存定律:
- 如果活细胞周围八个位置的活细胞数少于两个,则该位置活细胞死亡;
- 如果活细胞周围八个位置有两个或三个活细胞,则该位置活细胞仍然存活;
- 如果活细胞周围八个位置有超过三个活细胞,则该位置活细胞死亡;
- 如果死细胞周围正好有三个活细胞,则该位置死细胞复活;
下一个状态是通过将上述规则同时应用于当前状态下的每个细胞所形成的,其中细胞的出生和死亡是同时发生的。给你 `m x n` 网格面板 `board` 的当前状态,返回下一个状态。
**示例 1:**
<img alt="" src="https://assets.leetcode.com/uploads/2020/12/26/grid1.jpg" />
```
输入:board = [[0,1,0],[0,0,1],[1,1,1],[0,0,0]]
输出:[[0,0,0],[1,0,1],[0,1,1],[0,1,0]]
```
**示例 2:**
<img alt="" src="https://assets.leetcode.com/uploads/2020/12/26/grid2.jpg" />
```
输入:board = [[1,1],[1,0]]
输出:[[1,1],[1,1]]
```
**提示:**
- `m == board.length`
- `n == board[i].length`
- `1 <= m, n <= 25`
- `board[i][j]` 为 `0` 或 `1`
**进阶:**
- 你可以使用原地算法解决本题吗?请注意,面板上所有格子需要同时被更新:你不能先更新某些格子,然后使用它们的更新后的值再更新其他格子。
- 本题中,我们使用二维数组来表示面板。原则上,面板是无限的,但当活细胞侵占了面板边界时会造成问题。你将如何解决这些问题?
**标签**
`数组` `矩阵` `模拟`
##
```java
class Solution {
public void gameOfLife(int[][] board) {
}
}
```
>
| non_priority | 生命游戏 生命游戏 原题 根据 百度百科 , 生命游戏 ,简称为 生命 ,是英国数学家约翰·何顿·康威在 年发明的细胞自动机。 给定一个包含 m × n 个格子的面板,每一个格子都可以看成是一个细胞。每个细胞都具有一个初始状态: 即为 活细胞 (live),或 即为 死细胞 (dead)。每个细胞与其八个相邻位置(水平,垂直,对角线)的细胞都遵循以下四条生存定律: 如果活细胞周围八个位置的活细胞数少于两个,则该位置活细胞死亡; 如果活细胞周围八个位置有两个或三个活细胞,则该位置活细胞仍然存活; 如果活细胞周围八个位置有超过三个活细胞,则该位置活细胞死亡; 如果死细胞周围正好有三个活细胞,则该位置死细胞复活; 下一个状态是通过将上述规则同时应用于当前状态下的每个细胞所形成的,其中细胞的出生和死亡是同时发生的。给你 m x n 网格面板 board 的当前状态,返回下一个状态。 示例 : 输入:board 输出: 示例 : 输入:board 输出: 提示: m board length n board length m n board 为 或 进阶: 你可以使用原地算法解决本题吗?请注意,面板上所有格子需要同时被更新:你不能先更新某些格子,然后使用它们的更新后的值再更新其他格子。 本题中,我们使用二维数组来表示面板。原则上,面板是无限的,但当活细胞侵占了面板边界时会造成问题。你将如何解决这些问题? 标签 数组 矩阵 模拟 java class solution public void gameoflife int board | 0 |
24,917 | 12,195,271,417 | IssuesEvent | 2020-04-29 17:05:49 | cityofaustin/atd-data-tech | https://api.github.com/repos/cityofaustin/atd-data-tech | opened | DTS Discovery Day 🚀 | Service: Apps Service: Dev Service: Product Type: Research Workgroup: DTS | This epic compiles projects for [DTS' Discovery Day on May 1, 2020](https://docs.google.com/presentation/d/1aSqnnvi3XG2njeU7Zbsc23ZEe96VSHUDyxPjrB6O5D0/edit?usp=sharing). Please add a Github issue to capture what you plan to work on!
Here's a template you can start from if you'd like:
### Challenge
What is the problem you want to solve or solution you want to explore?
### Prerequisites
Software, data, getting a local dev environment set up, etc.
### Are there any hurdles you foresee? How might we address them?
### Deliverable
Everyone will have three minutes to present their work (with the option to save the recording) and a slide in the Discovery Day presentation deck. Are there any other artifacts you want to walk away with? Wiki pages, a prototype, etc. | 3.0 | DTS Discovery Day 🚀 - This epic compiles projects for [DTS' Discovery Day on May 1, 2020](https://docs.google.com/presentation/d/1aSqnnvi3XG2njeU7Zbsc23ZEe96VSHUDyxPjrB6O5D0/edit?usp=sharing). Please add a Github issue to capture what you plan to work on!
Here's a template you can start from if you'd like:
### Challenge
What is the problem you want to solve or solution you want to explore?
### Prerequisites
Software, data, getting a local dev environment set up, etc.
### Are there any hurdles you foresee? How might we address them?
### Deliverable
Everyone will have three minutes to present their work (with the option to save the recording) and a slide in the Discovery Day presentation deck. Are there any other artifacts you want to walk away with? Wiki pages, a prototype, etc. | non_priority | dts discovery day 🚀 this epic compiles projects for please add a github issue to capture what you plan to work on here s a template you can start from if you d like challenge what is the problem you want to solve or solution you want to explore prerequisites software data getting a local dev environment set up etc are there any hurdles you foresee how might we address them deliverable everyone will have three minutes to present their work with the option to save the recording and a slide in the discovery day presentation deck are there any other artifacts you want to walk away with wiki pages a prototype etc | 0 |
447,284 | 31,681,173,510 | IssuesEvent | 2023-09-08 00:00:15 | danthegoodman1/icedb | https://api.github.com/repos/danthegoodman1/icedb | opened | Performance test (against BQ) | documentation | Github events has 232M rows and lots of example queries: https://ghe.clickhouse.tech/
https://clickhouse.com/docs/en/getting-started/example-datasets/nyc-taxi has 3B rows but is smaller in size can do this too and much less complex schema
Should run the same queries against. We can leave bigquery for 5+ hours (maybe even days) to merge, and fully merge up icedb. Record the performance of inserting and merging too, probably far faster than bigquery.
Then record the same quieries. The data scanned, the storage price, and query times, and the total query price | 1.0 | Performance test (against BQ) - Github events has 232M rows and lots of example queries: https://ghe.clickhouse.tech/
https://clickhouse.com/docs/en/getting-started/example-datasets/nyc-taxi has 3B rows but is smaller in size can do this too and much less complex schema
Should run the same queries against. We can leave bigquery for 5+ hours (maybe even days) to merge, and fully merge up icedb. Record the performance of inserting and merging too, probably far faster than bigquery.
Then record the same quieries. The data scanned, the storage price, and query times, and the total query price | non_priority | performance test against bq github events has rows and lots of example queries has rows but is smaller in size can do this too and much less complex schema should run the same queries against we can leave bigquery for hours maybe even days to merge and fully merge up icedb record the performance of inserting and merging too probably far faster than bigquery then record the same quieries the data scanned the storage price and query times and the total query price | 0 |
78,785 | 7,668,906,646 | IssuesEvent | 2018-05-14 07:54:13 | NationalBankBelgium/stark | https://api.github.com/repos/NationalBankBelgium/stark | opened | stark-testing: simplify the way Karma typescript default config can be customized | comp: testing must type: refactor | <!-- Note: for support questions please use Stack Overflow: https://stackoverflow.com/questions/tagged/stark -->
## I'm submitting a...
<!-- Check one of the following options with "x" -->
<pre><code>
[ ] Regression (a behavior that used to work and stopped working in a new release)
[ ] Bug report <!-- Please search GitHub for a similar issue or PR before submitting -->
[X] Feature request
[ ] Documentation issue or request
[ ] Support request => Please do not submit support request here, instead see https://github.com/NationalBankBelgium/stark/blob/master/CONTRIBUTING.md#got-a-question-or-problem
</code></pre>
## Current behavior
<!-- Describe how the issue manifests. -->
In case the developer wants to customize the default config provided by the `stark-testing` package, he should write some boilerplate which becomes too verbose. This is also the case for the `stark-core` and `stark-ui` packages which rely on the `stark-testing` package.
## Expected behavior
<!-- Describe what the desired behavior would be. -->
It should be easy to customize the default config provided by the `stark-testing` package preventing the duplication of code as much as possible.
## What is the motivation / use case for changing the behavior?
<!-- Describe the motivation or the concrete use case. -->
Reduce the boilerplate needed in order to use stark packages.
Others:
<!-- Anything else relevant? Operating system version, IDE, package manager, HTTP server, ... -->
</code></pre> | 1.0 | stark-testing: simplify the way Karma typescript default config can be customized - <!-- Note: for support questions please use Stack Overflow: https://stackoverflow.com/questions/tagged/stark -->
## I'm submitting a...
<!-- Check one of the following options with "x" -->
<pre><code>
[ ] Regression (a behavior that used to work and stopped working in a new release)
[ ] Bug report <!-- Please search GitHub for a similar issue or PR before submitting -->
[X] Feature request
[ ] Documentation issue or request
[ ] Support request => Please do not submit support request here, instead see https://github.com/NationalBankBelgium/stark/blob/master/CONTRIBUTING.md#got-a-question-or-problem
</code></pre>
## Current behavior
<!-- Describe how the issue manifests. -->
In case the developer wants to customize the default config provided by the `stark-testing` package, he should write some boilerplate which becomes too verbose. This is also the case for the `stark-core` and `stark-ui` packages which rely on the `stark-testing` package.
## Expected behavior
<!-- Describe what the desired behavior would be. -->
It should be easy to customize the default config provided by the `stark-testing` package preventing the duplication of code as much as possible.
## What is the motivation / use case for changing the behavior?
<!-- Describe the motivation or the concrete use case. -->
Reduce the boilerplate needed in order to use stark packages.
Others:
<!-- Anything else relevant? Operating system version, IDE, package manager, HTTP server, ... -->
</code></pre> | non_priority | stark testing simplify the way karma typescript default config can be customized i m submitting a regression a behavior that used to work and stopped working in a new release bug report feature request documentation issue or request support request please do not submit support request here instead see current behavior in case the developer wants to customize the default config provided by the stark testing package he should write some boilerplate which becomes too verbose this is also the case for the stark core and stark ui packages which rely on the stark testing package expected behavior it should be easy to customize the default config provided by the stark testing package preventing the duplication of code as much as possible what is the motivation use case for changing the behavior reduce the boilerplate needed in order to use stark packages others | 0 |
61,499 | 14,627,778,420 | IssuesEvent | 2020-12-23 12:57:24 | bitbar/test-samples | https://api.github.com/repos/bitbar/test-samples | opened | CVE-2018-12536 (Medium) detected in jetty-util-9.4.1.v20170120.jar | security vulnerability | ## CVE-2018-12536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-util-9.4.1.v20170120.jar</b></p></summary>
<p>Utility classes for Jetty</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: test-samples/samples/testing-frameworks/appium/server-side/image-recognition/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-util/9.4.1.v20170120/jetty-util-9.4.1.v20170120.jar</p>
<p>
Dependency Hierarchy:
- java-client-5.0.0-BETA8.jar (Root Library)
- selenium-java-3.4.0.jar
- :x: **jetty-util-9.4.1.v20170120.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/bitbar/test-samples/commit/12af4f854b64888df6e4492ecc94e141388e939a">12af4f854b64888df6e4492ecc94e141388e939a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
<p>Publish Date: 2018-06-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12536>CVE-2018-12536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/commit/ad4dceb1c08679baa2a6a64356fcde5309e13fd8">https://github.com/eclipse/jetty.project/commit/ad4dceb1c08679baa2a6a64356fcde5309e13fd8</a></p>
<p>Release Date: 2018-06-27</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-server:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-util:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-servlet:9.3.24.v20180605,9.4.11.v20180605</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-util","packageVersion":"9.4.1.v20170120","isTransitiveDependency":true,"dependencyTree":"io.appium:java-client:5.0.0-BETA8;org.seleniumhq.selenium:selenium-java:3.4.0;org.eclipse.jetty:jetty-util:9.4.1.v20170120","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-util:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-servlet:9.3.24.v20180605,9.4.11.v20180605"}],"vulnerabilityIdentifier":"CVE-2018-12536","vulnerabilityDetails":"In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12536","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2018-12536 (Medium) detected in jetty-util-9.4.1.v20170120.jar - ## CVE-2018-12536 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-util-9.4.1.v20170120.jar</b></p></summary>
<p>Utility classes for Jetty</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: test-samples/samples/testing-frameworks/appium/server-side/image-recognition/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-util/9.4.1.v20170120/jetty-util-9.4.1.v20170120.jar</p>
<p>
Dependency Hierarchy:
- java-client-5.0.0-BETA8.jar (Root Library)
- selenium-java-3.4.0.jar
- :x: **jetty-util-9.4.1.v20170120.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/bitbar/test-samples/commit/12af4f854b64888df6e4492ecc94e141388e939a">12af4f854b64888df6e4492ecc94e141388e939a</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn't match a dynamic url-pattern, and is eventually handled by the DefaultServlet's static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.
<p>Publish Date: 2018-06-27
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12536>CVE-2018-12536</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/commit/ad4dceb1c08679baa2a6a64356fcde5309e13fd8">https://github.com/eclipse/jetty.project/commit/ad4dceb1c08679baa2a6a64356fcde5309e13fd8</a></p>
<p>Release Date: 2018-06-27</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-server:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-util:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-servlet:9.3.24.v20180605,9.4.11.v20180605</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-util","packageVersion":"9.4.1.v20170120","isTransitiveDependency":true,"dependencyTree":"io.appium:java-client:5.0.0-BETA8;org.seleniumhq.selenium:selenium-java:3.4.0;org.eclipse.jetty:jetty-util:9.4.1.v20170120","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-util:9.3.24.v20180605,9.4.11.v20180605,org.eclipse.jetty:jetty-servlet:9.3.24.v20180605,9.4.11.v20180605"}],"vulnerabilityIdentifier":"CVE-2018-12536","vulnerabilityDetails":"In Eclipse Jetty Server, all 9.x versions, on webapps deployed using default Error Handling, when an intentionally bad query arrives that doesn\u0027t match a dynamic url-pattern, and is eventually handled by the DefaultServlet\u0027s static file serving, the bad characters can trigger a java.nio.file.InvalidPathException which includes the full path to the base resource directory that the DefaultServlet and/or webapp is using. If this InvalidPathException is then handled by the default Error Handler, the InvalidPathException message is included in the error response, revealing the full server path to the requesting system.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-12536","cvss3Severity":"medium","cvss3Score":"5.3","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in jetty util jar cve medium severity vulnerability vulnerable library jetty util jar utility classes for jetty library home page a href path to dependency file test samples samples testing frameworks appium server side image recognition pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty util jetty util jar dependency hierarchy java client jar root library selenium java jar x jetty util jar vulnerable library found in head commit a href found in base branch master vulnerability details in eclipse jetty server all x versions on webapps deployed using default error handling when an intentionally bad query arrives that doesn t match a dynamic url pattern and is eventually handled by the defaultservlet s static file serving the bad characters can trigger a java nio file invalidpathexception which includes the full path to the base resource directory that the defaultservlet and or webapp is using if this invalidpathexception is then handled by the default error handler the invalidpathexception message is included in the error response revealing the full server path to the requesting system publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org eclipse jetty jetty server org eclipse jetty jetty util org eclipse jetty jetty servlet isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails in eclipse jetty server all x versions on webapps deployed using default error handling when an intentionally bad query arrives that doesn match a dynamic url pattern and is eventually handled by the defaultservlet static file serving the bad characters can trigger a java nio file invalidpathexception which includes the full path to the base resource directory that the defaultservlet and or webapp is using if this invalidpathexception is then handled by the default error handler the invalidpathexception message is included in the error response revealing the full server path to the requesting system vulnerabilityurl | 0 |
340,510 | 30,522,049,128 | IssuesEvent | 2023-07-19 08:45:03 | wizardsardine/liana | https://api.github.com/repos/wizardsardine/liana | opened | `test_retry_workqueue_exceeded` can be flaky in CI | Tests | Sometimes the workqueue exceeded doesn't show up. See https://github.com/wizardsardine/liana/pull/569/checks?check_run_id=15140031960. | 1.0 | `test_retry_workqueue_exceeded` can be flaky in CI - Sometimes the workqueue exceeded doesn't show up. See https://github.com/wizardsardine/liana/pull/569/checks?check_run_id=15140031960. | non_priority | test retry workqueue exceeded can be flaky in ci sometimes the workqueue exceeded doesn t show up see | 0 |
125,910 | 10,369,006,295 | IssuesEvent | 2019-09-07 21:59:25 | Rocologo/MobHunting | https://api.github.com/repos/Rocologo/MobHunting | closed | lore edit issue | Fixed - To be tested | Hello, been using this for a long time, however is it possible to setup log when player exchange their bag of money using sign? I have players use change lore method to edit the bag of gold and exchanged over 1 trillion amount of money, i need to close my server to shut down this bug | 1.0 | lore edit issue - Hello, been using this for a long time, however is it possible to setup log when player exchange their bag of money using sign? I have players use change lore method to edit the bag of gold and exchanged over 1 trillion amount of money, i need to close my server to shut down this bug | non_priority | lore edit issue hello been using this for a long time however is it possible to setup log when player exchange their bag of money using sign i have players use change lore method to edit the bag of gold and exchanged over trillion amount of money i need to close my server to shut down this bug | 0 |
178,934 | 21,509,586,153 | IssuesEvent | 2022-04-28 01:57:26 | emilwareus/generator-jhipster | https://api.github.com/repos/emilwareus/generator-jhipster | closed | CVE-2019-15657 (High) detected in eslint-utils-1.3.1.tgz - autoclosed | security vulnerability | ## CVE-2019-15657 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eslint-utils-1.3.1.tgz</b></p></summary>
<p>Utilities for ESLint plugins.</p>
<p>Library home page: <a href="https://registry.npmjs.org/eslint-utils/-/eslint-utils-1.3.1.tgz">https://registry.npmjs.org/eslint-utils/-/eslint-utils-1.3.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/eslint-utils/package.json</p>
<p>
Dependency Hierarchy:
- eslint-5.14.1.tgz (Root Library)
- :x: **eslint-utils-1.3.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/emilwareus/generator-jhipster/commit/06704da71c2ceab47b6ffbdbd9a47cc75f234f08">06704da71c2ceab47b6ffbdbd9a47cc75f234f08</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In eslint-utils before 1.4.1, the getStaticValue function can execute arbitrary code.
<p>Publish Date: 2019-08-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-15657>CVE-2019-15657</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15657</a></p>
<p>Release Date: 2020-08-24</p>
<p>Fix Resolution (eslint-utils): 1.4.1</p>
<p>Direct dependency fix Resolution (eslint): 5.15.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-15657 (High) detected in eslint-utils-1.3.1.tgz - autoclosed - ## CVE-2019-15657 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>eslint-utils-1.3.1.tgz</b></p></summary>
<p>Utilities for ESLint plugins.</p>
<p>Library home page: <a href="https://registry.npmjs.org/eslint-utils/-/eslint-utils-1.3.1.tgz">https://registry.npmjs.org/eslint-utils/-/eslint-utils-1.3.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/eslint-utils/package.json</p>
<p>
Dependency Hierarchy:
- eslint-5.14.1.tgz (Root Library)
- :x: **eslint-utils-1.3.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/emilwareus/generator-jhipster/commit/06704da71c2ceab47b6ffbdbd9a47cc75f234f08">06704da71c2ceab47b6ffbdbd9a47cc75f234f08</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In eslint-utils before 1.4.1, the getStaticValue function can execute arbitrary code.
<p>Publish Date: 2019-08-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-15657>CVE-2019-15657</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15657">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15657</a></p>
<p>Release Date: 2020-08-24</p>
<p>Fix Resolution (eslint-utils): 1.4.1</p>
<p>Direct dependency fix Resolution (eslint): 5.15.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in eslint utils tgz autoclosed cve high severity vulnerability vulnerable library eslint utils tgz utilities for eslint plugins library home page a href path to dependency file package json path to vulnerable library node modules eslint utils package json dependency hierarchy eslint tgz root library x eslint utils tgz vulnerable library found in head commit a href vulnerability details in eslint utils before the getstaticvalue function can execute arbitrary code publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution eslint utils direct dependency fix resolution eslint step up your open source security game with whitesource | 0 |
54,248 | 13,496,254,703 | IssuesEvent | 2020-09-12 02:44:24 | vector-im/element-web | https://api.github.com/repos/vector-im/element-web | closed | Email invites land on welcome page with guest disabled | bug defect p1 type:invite type:threepids | If Riot's default HS doesn't have guest access enabled, clicking through on an email invite just lands you on the welcome page with no mention of the room or invite or anything. | 1.0 | Email invites land on welcome page with guest disabled - If Riot's default HS doesn't have guest access enabled, clicking through on an email invite just lands you on the welcome page with no mention of the room or invite or anything. | non_priority | email invites land on welcome page with guest disabled if riot s default hs doesn t have guest access enabled clicking through on an email invite just lands you on the welcome page with no mention of the room or invite or anything | 0 |
51,272 | 10,605,381,105 | IssuesEvent | 2019-10-10 20:20:30 | mumble-voip/mumble | https://api.github.com/repos/mumble-voip/mumble | closed | Q: Audio input/output | audio code mumble | I am currently writing the audio hooks for the new plugin framework but I need to get some more info on how the audio PCM arrays are structured.
Condensed I think the question boils down to this:
1. Is the AudioInput in Mumble always mono (only one channel)? If not how many channels does it have and how many samples per channel
2. Are all audio sources (`AudioOutputUser`) mono? If not the same question as above applies
3. What is the memory structure of the final audio output-array (how does it arrange the samples of the different channels)?
Further details on what exactly I'd like to know are listed below.
# Input
I figured the best place to get a hold of all audio input would be in the `AudioInput::encodeAudioFrame()` function, grabbing the `psSource` variable. If anyone has a different suggestion I'd be glad to hear it.
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioInput.cpp#L792-L798
Ultimately that would boil down to using the `AudioInput::psMic`variable either directly or after echo-removal:
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioInput.cpp#L847-L854
I would grab the audio input right before this line
https://github.com/mumble-voip/mumble/blob/master/src/mumble/AudioInput.cpp#L969
The question that I am left with is the structure of `psMic`/`psSource`. I know that its size is `AudioInput::iFramesize`
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioInput.cpp#L132
but I need to know how many channels there are in the audio input and how many samples per channel.
Or is the input always just a single channel with `iFrameSize` samples?
# Output
For getting the hold of the audio output I figured I'll hook myself into `AudioOutput:mix` - again if there is a better way, let me know :)
My intention is to firstly grab the individual audio source's audio PCM via the `pfBuffer` variable:
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L489
For this variable I am again asking the question of how many channels (and samples per channel) there are in that audio. From this code
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L386
I suspect that it only has a single channel with `nsamp` samples in it. Is this correct?
As a second hook I want to grab the total audio after it has been mixed together. For this I think the `output` variable is the way to go as this one ensures that I can always use a float-array.
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L407-L408
From the code above I deduce that this output now contains `AudioOutput::iChannels` channels and `nsamp` samples per channel. However I don't get how this is tored in memory. I would have thought that the different channels are laid out one after another in the array. So if we have 10 samples per channel I'd expect the first 10 entries in `output` to belong to the first channel, the next 10 to the second one and so on.
However this code right here
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L559-L565
seems to disagree with my theory. To me this seems as if `output` groups together the different samples from the different channels "by index". So if we have 4 channels, the first four entries in `output` would be the first sample in the first, second, third and fourth channel respectively. The next four entries would be the second samples of the respective channels and so on. Is this correct?
| 1.0 | Q: Audio input/output - I am currently writing the audio hooks for the new plugin framework but I need to get some more info on how the audio PCM arrays are structured.
Condensed I think the question boils down to this:
1. Is the AudioInput in Mumble always mono (only one channel)? If not how many channels does it have and how many samples per channel
2. Are all audio sources (`AudioOutputUser`) mono? If not the same question as above applies
3. What is the memory structure of the final audio output-array (how does it arrange the samples of the different channels)?
Further details on what exactly I'd like to know are listed below.
# Input
I figured the best place to get a hold of all audio input would be in the `AudioInput::encodeAudioFrame()` function, grabbing the `psSource` variable. If anyone has a different suggestion I'd be glad to hear it.
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioInput.cpp#L792-L798
Ultimately that would boil down to using the `AudioInput::psMic`variable either directly or after echo-removal:
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioInput.cpp#L847-L854
I would grab the audio input right before this line
https://github.com/mumble-voip/mumble/blob/master/src/mumble/AudioInput.cpp#L969
The question that I am left with is the structure of `psMic`/`psSource`. I know that its size is `AudioInput::iFramesize`
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioInput.cpp#L132
but I need to know how many channels there are in the audio input and how many samples per channel.
Or is the input always just a single channel with `iFrameSize` samples?
# Output
For getting the hold of the audio output I figured I'll hook myself into `AudioOutput:mix` - again if there is a better way, let me know :)
My intention is to firstly grab the individual audio source's audio PCM via the `pfBuffer` variable:
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L489
For this variable I am again asking the question of how many channels (and samples per channel) there are in that audio. From this code
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L386
I suspect that it only has a single channel with `nsamp` samples in it. Is this correct?
As a second hook I want to grab the total audio after it has been mixed together. For this I think the `output` variable is the way to go as this one ensures that I can always use a float-array.
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L407-L408
From the code above I deduce that this output now contains `AudioOutput::iChannels` channels and `nsamp` samples per channel. However I don't get how this is tored in memory. I would have thought that the different channels are laid out one after another in the array. So if we have 10 samples per channel I'd expect the first 10 entries in `output` to belong to the first channel, the next 10 to the second one and so on.
However this code right here
https://github.com/mumble-voip/mumble/blob/523d40c2b60bb4b0851b26169447f1e8df6625f8/src/mumble/AudioOutput.cpp#L559-L565
seems to disagree with my theory. To me this seems as if `output` groups together the different samples from the different channels "by index". So if we have 4 channels, the first four entries in `output` would be the first sample in the first, second, third and fourth channel respectively. The next four entries would be the second samples of the respective channels and so on. Is this correct?
| non_priority | q audio input output i am currently writing the audio hooks for the new plugin framework but i need to get some more info on how the audio pcm arrays are structured condensed i think the question boils down to this is the audioinput in mumble always mono only one channel if not how many channels does it have and how many samples per channel are all audio sources audiooutputuser mono if not the same question as above applies what is the memory structure of the final audio output array how does it arrange the samples of the different channels further details on what exactly i d like to know are listed below input i figured the best place to get a hold of all audio input would be in the audioinput encodeaudioframe function grabbing the pssource variable if anyone has a different suggestion i d be glad to hear it ultimately that would boil down to using the audioinput psmic variable either directly or after echo removal i would grab the audio input right before this line the question that i am left with is the structure of psmic pssource i know that its size is audioinput iframesize but i need to know how many channels there are in the audio input and how many samples per channel or is the input always just a single channel with iframesize samples output for getting the hold of the audio output i figured i ll hook myself into audiooutput mix again if there is a better way let me know my intention is to firstly grab the individual audio source s audio pcm via the pfbuffer variable for this variable i am again asking the question of how many channels and samples per channel there are in that audio from this code i suspect that it only has a single channel with nsamp samples in it is this correct as a second hook i want to grab the total audio after it has been mixed together for this i think the output variable is the way to go as this one ensures that i can always use a float array from the code above i deduce that this output now contains audiooutput ichannels channels and nsamp samples per channel however i don t get how this is tored in memory i would have thought that the different channels are laid out one after another in the array so if we have samples per channel i d expect the first entries in output to belong to the first channel the next to the second one and so on however this code right here seems to disagree with my theory to me this seems as if output groups together the different samples from the different channels by index so if we have channels the first four entries in output would be the first sample in the first second third and fourth channel respectively the next four entries would be the second samples of the respective channels and so on is this correct | 0 |
324,322 | 27,800,763,565 | IssuesEvent | 2023-03-17 15:40:42 | phetsims/qa | https://api.github.com/repos/phetsims/qa | opened | Dev Test: Calculus Grapher 1.0.0-dev.TBD | QA:dev-test | <!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
DEVELOPERS:
* title for this issue = Dev Test: {{SIM_TITLE}} {{VERSION}}
* replace {{MENTIONS}} with @mentions for team members who should received GitHub notifications about this issue
* Fill in the {{REPO}}, {{VERSION}}, and {{GITHUB_ISSUE_LINK}} placeholders.
* Delete things that are not relevant, e.g. PhET-iO links for non-PhET-iO tests.
* assign the issue to @KatieWoe and @kathy-phet
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<h1>Dev Test</h1>
**Mentions**: @amanda-phet @kathy-phet @KatieWoe @veillette @ariel-phet
<h3>Simulation links</h3>
- [github repository for issues](https://github.com/phetsims/calculus-grapher/issues)
- [phet top-level directory](https://phet-dev.colorado.edu/html/calculus-grapher/1.0.0-dev.TBD)
- [sim: all_phet.html](https://phet-dev.colorado.edu/html/calculus-grapher/1.0.0-dev.TBD/phet/calculus-grapher_all_phet.html)
- [phet-io wrapper index](https://phet-dev.colorado.edu/html/calculus-grapher/1.0.0-dev.TBD/phet-io)
<h3>Test Matrix</h3>
Please include all (non-screen reader) feature testing in these records if applicable.
- [ ] Latest macOS, Safari (Time = )
- [ ] Windows 10, Chrome (Time = )
- [ ] Windows 10, Firefox (Time = )
- [ ] Latest iOS, Safari (Time = )
- [ ] Windows 11, Chrome (Time = )
Light testing, or optionally skip if time crunch:
- [ ] Latest macOS, Chrome (Time = )
- [ ] Latest Chrome OS, Chrome (Time = )
If PhET-iO is being tested:
- [ ] Latest macOS, Safari (Time = )
- [ ] Windows 10, Chrome (Time = )
- [ ] Windows 10, Firefox (Time = )
- [ ] Latest iOS, Safari (Time = )
- [ ] Windows 11, Chrome (Time = )
If screen readers are being tested:
- [ ] Win 10/11 Chrome + Jaws (Time = )
- [ ] Win 10/11 Firefox + NVDA (Time = )
- [ ] MacOS Safari + VO (Time = )
- [ ] iPadOS Mobile VO (Time = )
<h3>Features included</h3>
- [x] PhET-iO
- [ ] Alternative Input
- [ ] UI Sound
- [ ] Sonification
- [ ] Description
- [ ] Voicing
<h3>Focus and Special Instructions</h3>
Our target date to begin this test is Monday 3/20/23. Let us know when QA is ready to begin, and @veillette or I will publish the dev version. (Start VPN, then `grunt dev --brands=phet,phet-io`)
<h3>Issues to Verify</h3>
none
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// QA only below here
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
---
<h2>For QA...</h2>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// General features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>General features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Click every single button.
- If there is sound, make sure it works.
- Make sure you can't lose anything.
- Play with the sim normally.
- Try to break the sim.
- Try to include browser version numbers
- If there is a console available, check for errors and include them in the Problem Description.
- Run through the string tests on at least one platform, especially if it is about to go to rc.
- Check the Game Up harness on one platform.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// PhET-iO RC features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>PhET-iO features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Make sure that public files do not have password protection. Use a private browser for this.
- Make sure that private files do have password protection. Use a private browser for this.
- Make sure standalone sim is working properly.
- Make sure the wrapper index is working properly.
- Make sure each wrapper is working properly.
- Launch the simulation in Studio with ?stringTest=xss and make sure the sim doesn't navigate to youtube
- For newer PhET-iO wrapper indices, save the "basic example of a functional wrapper" as a .html file and open it. Make
sure the simulation loads without crashing or throwing errors.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// Accessibility features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>Accessibility features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Specific instructions can be found above.
- Make sure the accessibility (a11y) feature that is being tested doesn't negatively affect the sim in any way. Here is
a list of features that may be supported in this test:
- Alternative Input
- Interactive Description
- Sound and Sonification
- Pan and Zoom
- Mobile Description
- Voicing
- Test all possible forms of input.
- Test all mouse/trackpad inputs.
- Test all touchscreen inputs.
- Test all keyboard navigation inputs (if applicable).
- Test all forms of input with a screen reader (if applicable).
<!--- [CAN BE OMITTED, DO NOT EDIT] -->
<h3>Screen Readers</h3>
This sim may support screen readers. If you are unfamiliar with screen readers, please ask Katie to introduce you to
screen readers. If you simply need a refresher on screen readers, please consult the
[QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md), which should have all of the information
you need as well as a link to a screen reader tutorial made by Jesse. Otherwise, look over the a11y view before opening
the simulation. Once you've done that, open the simulation and make sure alerts and descriptions work as intended.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Platforms and Screen Readers to Be Tested</h3>
- Windows 10 + Latest Chrome + Latest JAWS
- Windows 10 + Latest Firefox + Latest NVDA
- macOS + Safari + VoiceOver
- iOS + Safari + VoiceOver (only if specified in testing issue)
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Critical Screen Reader Information</h3>
We are tracking known screen reader bugs in
[here](https://github.com/phetsims/qa/blob/master/documentation/accessibility-bugs.md). If you find a
screen reader bug, please check it against this list.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Keyboard Navigation</h3>
This sim supports keyboard navigation. Please make sure it works as intended on all platforms by itself and with a
screen reader.
<h3>Magnification</h3>
This sim supports magnification with pinch and drag gestures on touch screens, keyboard shortcuts, and mouse/wheel controls. Please test magnfication and make sure
it is working as intended and well with the use cases of the simulation. Due to the way screen readers handle user input, magnification is NOT expected to
work while using a screen reader so there is no need to test this case.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// FAQs for QA Members [DO NOT OMIT, DO NOT EDIT]
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>FAQs for QA Members</b></summary>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>There are multiple tests in this issue... Which test should I do first?</i></summary>
Test in order! Test the first thing first, the second thing second, and so on.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>How should I format my issue?</i></summary>
Here's a template for making issues:
<b>Test Device</b>
blah
<b>Operating System</b>
blah
<b>Browser</b>
blah
<b>Problem Description</b>
blah
<b>Steps to Reproduce</b>
blah
<b>Visuals</b>
blah
<details>
<summary><b>Troubleshooting Information</b></summary>
blah
</details>
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>Who should I assign?</i></summary>
We typically assign the developer who opened the issue in the QA repository.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>My question isn't in here... What should I do?</i></summary>
You should:
1. Consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md).
2. Google it.
3. Ask Katie.
4. Ask a developer.
5. Google it again.
6. Cry.
</details>
<br>
<hr>
</details>
| 1.0 | Dev Test: Calculus Grapher 1.0.0-dev.TBD - <!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
DEVELOPERS:
* title for this issue = Dev Test: {{SIM_TITLE}} {{VERSION}}
* replace {{MENTIONS}} with @mentions for team members who should received GitHub notifications about this issue
* Fill in the {{REPO}}, {{VERSION}}, and {{GITHUB_ISSUE_LINK}} placeholders.
* Delete things that are not relevant, e.g. PhET-iO links for non-PhET-iO tests.
* assign the issue to @KatieWoe and @kathy-phet
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<h1>Dev Test</h1>
**Mentions**: @amanda-phet @kathy-phet @KatieWoe @veillette @ariel-phet
<h3>Simulation links</h3>
- [github repository for issues](https://github.com/phetsims/calculus-grapher/issues)
- [phet top-level directory](https://phet-dev.colorado.edu/html/calculus-grapher/1.0.0-dev.TBD)
- [sim: all_phet.html](https://phet-dev.colorado.edu/html/calculus-grapher/1.0.0-dev.TBD/phet/calculus-grapher_all_phet.html)
- [phet-io wrapper index](https://phet-dev.colorado.edu/html/calculus-grapher/1.0.0-dev.TBD/phet-io)
<h3>Test Matrix</h3>
Please include all (non-screen reader) feature testing in these records if applicable.
- [ ] Latest macOS, Safari (Time = )
- [ ] Windows 10, Chrome (Time = )
- [ ] Windows 10, Firefox (Time = )
- [ ] Latest iOS, Safari (Time = )
- [ ] Windows 11, Chrome (Time = )
Light testing, or optionally skip if time crunch:
- [ ] Latest macOS, Chrome (Time = )
- [ ] Latest Chrome OS, Chrome (Time = )
If PhET-iO is being tested:
- [ ] Latest macOS, Safari (Time = )
- [ ] Windows 10, Chrome (Time = )
- [ ] Windows 10, Firefox (Time = )
- [ ] Latest iOS, Safari (Time = )
- [ ] Windows 11, Chrome (Time = )
If screen readers are being tested:
- [ ] Win 10/11 Chrome + Jaws (Time = )
- [ ] Win 10/11 Firefox + NVDA (Time = )
- [ ] MacOS Safari + VO (Time = )
- [ ] iPadOS Mobile VO (Time = )
<h3>Features included</h3>
- [x] PhET-iO
- [ ] Alternative Input
- [ ] UI Sound
- [ ] Sonification
- [ ] Description
- [ ] Voicing
<h3>Focus and Special Instructions</h3>
Our target date to begin this test is Monday 3/20/23. Let us know when QA is ready to begin, and @veillette or I will publish the dev version. (Start VPN, then `grunt dev --brands=phet,phet-io`)
<h3>Issues to Verify</h3>
none
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// QA only below here
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
---
<h2>For QA...</h2>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// General features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>General features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Click every single button.
- If there is sound, make sure it works.
- Make sure you can't lose anything.
- Play with the sim normally.
- Try to break the sim.
- Try to include browser version numbers
- If there is a console available, check for errors and include them in the Problem Description.
- Run through the string tests on at least one platform, especially if it is about to go to rc.
- Check the Game Up harness on one platform.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// PhET-iO RC features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>PhET-iO features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Make sure that public files do not have password protection. Use a private browser for this.
- Make sure that private files do have password protection. Use a private browser for this.
- Make sure standalone sim is working properly.
- Make sure the wrapper index is working properly.
- Make sure each wrapper is working properly.
- Launch the simulation in Studio with ?stringTest=xss and make sure the sim doesn't navigate to youtube
- For newer PhET-iO wrapper indices, save the "basic example of a functional wrapper" as a .html file and open it. Make
sure the simulation loads without crashing or throwing errors.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// Accessibility features
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>Accessibility features</b></summary>
<!--- [DO NOT OMIT, CAN BE EDITED] -->
<h3>What to Test</h3>
- Specific instructions can be found above.
- Make sure the accessibility (a11y) feature that is being tested doesn't negatively affect the sim in any way. Here is
a list of features that may be supported in this test:
- Alternative Input
- Interactive Description
- Sound and Sonification
- Pan and Zoom
- Mobile Description
- Voicing
- Test all possible forms of input.
- Test all mouse/trackpad inputs.
- Test all touchscreen inputs.
- Test all keyboard navigation inputs (if applicable).
- Test all forms of input with a screen reader (if applicable).
<!--- [CAN BE OMITTED, DO NOT EDIT] -->
<h3>Screen Readers</h3>
This sim may support screen readers. If you are unfamiliar with screen readers, please ask Katie to introduce you to
screen readers. If you simply need a refresher on screen readers, please consult the
[QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md), which should have all of the information
you need as well as a link to a screen reader tutorial made by Jesse. Otherwise, look over the a11y view before opening
the simulation. Once you've done that, open the simulation and make sure alerts and descriptions work as intended.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Platforms and Screen Readers to Be Tested</h3>
- Windows 10 + Latest Chrome + Latest JAWS
- Windows 10 + Latest Firefox + Latest NVDA
- macOS + Safari + VoiceOver
- iOS + Safari + VoiceOver (only if specified in testing issue)
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Critical Screen Reader Information</h3>
We are tracking known screen reader bugs in
[here](https://github.com/phetsims/qa/blob/master/documentation/accessibility-bugs.md). If you find a
screen reader bug, please check it against this list.
<!--- [CAN BE OMITTED, CAN BE EDITED] -->
<h3>Keyboard Navigation</h3>
This sim supports keyboard navigation. Please make sure it works as intended on all platforms by itself and with a
screen reader.
<h3>Magnification</h3>
This sim supports magnification with pinch and drag gestures on touch screens, keyboard shortcuts, and mouse/wheel controls. Please test magnfication and make sure
it is working as intended and well with the use cases of the simulation. Due to the way screen readers handle user input, magnification is NOT expected to
work while using a screen reader so there is no need to test this case.
<hr>
</details>
<!---
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
// FAQs for QA Members [DO NOT OMIT, DO NOT EDIT]
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
-->
<details>
<summary><b>FAQs for QA Members</b></summary>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>There are multiple tests in this issue... Which test should I do first?</i></summary>
Test in order! Test the first thing first, the second thing second, and so on.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>How should I format my issue?</i></summary>
Here's a template for making issues:
<b>Test Device</b>
blah
<b>Operating System</b>
blah
<b>Browser</b>
blah
<b>Problem Description</b>
blah
<b>Steps to Reproduce</b>
blah
<b>Visuals</b>
blah
<details>
<summary><b>Troubleshooting Information</b></summary>
blah
</details>
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>Who should I assign?</i></summary>
We typically assign the developer who opened the issue in the QA repository.
</details>
<br>
<!--- [DO NOT OMIT, DO NOT EDIT] -->
<details>
<summary><i>My question isn't in here... What should I do?</i></summary>
You should:
1. Consult the [QA Book](https://github.com/phetsims/QA/blob/master/documentation/qa-book.md).
2. Google it.
3. Ask Katie.
4. Ask a developer.
5. Google it again.
6. Cry.
</details>
<br>
<hr>
</details>
| non_priority | dev test calculus grapher dev tbd developers title for this issue dev test sim title version replace mentions with mentions for team members who should received github notifications about this issue fill in the repo version and github issue link placeholders delete things that are not relevant e g phet io links for non phet io tests assign the issue to katiewoe and kathy phet dev test mentions amanda phet kathy phet katiewoe veillette ariel phet simulation links test matrix please include all non screen reader feature testing in these records if applicable latest macos safari time windows chrome time windows firefox time latest ios safari time windows chrome time light testing or optionally skip if time crunch latest macos chrome time latest chrome os chrome time if phet io is being tested latest macos safari time windows chrome time windows firefox time latest ios safari time windows chrome time if screen readers are being tested win chrome jaws time win firefox nvda time macos safari vo time ipados mobile vo time features included phet io alternative input ui sound sonification description voicing focus and special instructions our target date to begin this test is monday let us know when qa is ready to begin and veillette or i will publish the dev version start vpn then grunt dev brands phet phet io issues to verify none qa only below here for qa general features general features what to test click every single button if there is sound make sure it works make sure you can t lose anything play with the sim normally try to break the sim try to include browser version numbers if there is a console available check for errors and include them in the problem description run through the string tests on at least one platform especially if it is about to go to rc check the game up harness on one platform phet io rc features phet io features what to test make sure that public files do not have password protection use a private browser for this make sure that private files do have password protection use a private browser for this make sure standalone sim is working properly make sure the wrapper index is working properly make sure each wrapper is working properly launch the simulation in studio with stringtest xss and make sure the sim doesn t navigate to youtube for newer phet io wrapper indices save the basic example of a functional wrapper as a html file and open it make sure the simulation loads without crashing or throwing errors accessibility features accessibility features what to test specific instructions can be found above make sure the accessibility feature that is being tested doesn t negatively affect the sim in any way here is a list of features that may be supported in this test alternative input interactive description sound and sonification pan and zoom mobile description voicing test all possible forms of input test all mouse trackpad inputs test all touchscreen inputs test all keyboard navigation inputs if applicable test all forms of input with a screen reader if applicable screen readers this sim may support screen readers if you are unfamiliar with screen readers please ask katie to introduce you to screen readers if you simply need a refresher on screen readers please consult the which should have all of the information you need as well as a link to a screen reader tutorial made by jesse otherwise look over the view before opening the simulation once you ve done that open the simulation and make sure alerts and descriptions work as intended platforms and screen readers to be tested windows latest chrome latest jaws windows latest firefox latest nvda macos safari voiceover ios safari voiceover only if specified in testing issue critical screen reader information we are tracking known screen reader bugs in if you find a screen reader bug please check it against this list keyboard navigation this sim supports keyboard navigation please make sure it works as intended on all platforms by itself and with a screen reader magnification this sim supports magnification with pinch and drag gestures on touch screens keyboard shortcuts and mouse wheel controls please test magnfication and make sure it is working as intended and well with the use cases of the simulation due to the way screen readers handle user input magnification is not expected to work while using a screen reader so there is no need to test this case faqs for qa members faqs for qa members there are multiple tests in this issue which test should i do first test in order test the first thing first the second thing second and so on how should i format my issue here s a template for making issues test device blah operating system blah browser blah problem description blah steps to reproduce blah visuals blah troubleshooting information blah who should i assign we typically assign the developer who opened the issue in the qa repository my question isn t in here what should i do you should consult the google it ask katie ask a developer google it again cry | 0 |
40,147 | 20,602,690,418 | IssuesEvent | 2022-03-06 14:11:40 | sl-lang/sll | https://api.github.com/repos/sl-lang/sll | opened | Make the scheduler run on multiple OS threads | internal performance vm | Make the scheduler execute tasks on every CPU core to improve concurrency. | True | Make the scheduler run on multiple OS threads - Make the scheduler execute tasks on every CPU core to improve concurrency. | non_priority | make the scheduler run on multiple os threads make the scheduler execute tasks on every cpu core to improve concurrency | 0 |
64,221 | 26,654,793,534 | IssuesEvent | 2023-01-25 16:05:40 | SigNoz/signoz | https://api.github.com/repos/SigNoz/signoz | closed | Deprecate http code, grpc status code, grpc method | duplicate frontend query-service deprecation | We have migrated to using common column called Status Code for http, grpc, rpc. Also grpc method to rpc method.
Otel collector issue: https://github.com/SigNoz/signoz-otel-collector/issues/42 | 1.0 | Deprecate http code, grpc status code, grpc method - We have migrated to using common column called Status Code for http, grpc, rpc. Also grpc method to rpc method.
Otel collector issue: https://github.com/SigNoz/signoz-otel-collector/issues/42 | non_priority | deprecate http code grpc status code grpc method we have migrated to using common column called status code for http grpc rpc also grpc method to rpc method otel collector issue | 0 |
163,976 | 25,902,408,449 | IssuesEvent | 2022-12-15 07:19:23 | keypom/keypom-airfoil | https://api.github.com/repos/keypom/keypom-airfoil | closed | [Layout] - Navbar | design system | # Describe the feature you would like to request
Navbar for page navigation
# Provide a brief explanation of why this feature is necessary
For user to navigate around Keypom
# Provide an estimation of how long the developers should spend on implementing this feature
1 - 3 hours
# References


| 1.0 | [Layout] - Navbar - # Describe the feature you would like to request
Navbar for page navigation
# Provide a brief explanation of why this feature is necessary
For user to navigate around Keypom
# Provide an estimation of how long the developers should spend on implementing this feature
1 - 3 hours
# References


| non_priority | navbar describe the feature you would like to request navbar for page navigation provide a brief explanation of why this feature is necessary for user to navigate around keypom provide an estimation of how long the developers should spend on implementing this feature hours references | 0 |
2,847 | 12,702,212,671 | IssuesEvent | 2020-06-22 19:43:53 | submariner-io/submariner | https://api.github.com/repos/submariner-io/submariner | closed | "report-dir" argument can be removed (Ginkgo has --reportFile option) | automation enhancement | "report-dir" argument for specifying junit tests output directory - can be removed, including any references that uses it (also in Docs):
https://github.com/submariner-io/submariner/blob/06332b91b193c0ab362e7f0a96cd715b8556acd5/test/e2e/framework/test_context.go#L40
Ginkgo has this feature already, for example
--ginkgo.reportFile ${WORKDIR}/e2e_junit_result.xml | 1.0 | "report-dir" argument can be removed (Ginkgo has --reportFile option) - "report-dir" argument for specifying junit tests output directory - can be removed, including any references that uses it (also in Docs):
https://github.com/submariner-io/submariner/blob/06332b91b193c0ab362e7f0a96cd715b8556acd5/test/e2e/framework/test_context.go#L40
Ginkgo has this feature already, for example
--ginkgo.reportFile ${WORKDIR}/e2e_junit_result.xml | non_priority | report dir argument can be removed ginkgo has reportfile option report dir argument for specifying junit tests output directory can be removed including any references that uses it also in docs ginkgo has this feature already for example ginkgo reportfile workdir junit result xml | 0 |
270,472 | 28,960,725,171 | IssuesEvent | 2023-05-10 02:04:58 | mattdanielbrown/primed | https://api.github.com/repos/mattdanielbrown/primed | closed | CVE-2020-7751 (High) detected in pathval-1.1.0.tgz - autoclosed | Mend: dependency security vulnerability | ## CVE-2020-7751 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-1.1.0.tgz</b></p></summary>
<p>Object value retrieval given a string path</p>
<p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz">https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/pathval/package.json</p>
<p>
Dependency Hierarchy:
- chai-4.2.0.tgz (Root Library)
- :x: **pathval-1.1.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/primed/commit/4c04dadd915d6323f64b1d98dcdbc29df3b57cbb">4c04dadd915d6323f64b1d98dcdbc29df3b57cbb</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
pathval before version 1.1.1 is vulnerable to prototype pollution.
<p>Publish Date: 2020-10-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7751>CVE-2020-7751</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751</a></p>
<p>Release Date: 2020-10-26</p>
<p>Fix Resolution (pathval): 1.1.1</p>
<p>Direct dependency fix Resolution (chai): 4.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-7751 (High) detected in pathval-1.1.0.tgz - autoclosed - ## CVE-2020-7751 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-1.1.0.tgz</b></p></summary>
<p>Object value retrieval given a string path</p>
<p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz">https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/pathval/package.json</p>
<p>
Dependency Hierarchy:
- chai-4.2.0.tgz (Root Library)
- :x: **pathval-1.1.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/mattdanielbrown/primed/commit/4c04dadd915d6323f64b1d98dcdbc29df3b57cbb">4c04dadd915d6323f64b1d98dcdbc29df3b57cbb</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
pathval before version 1.1.1 is vulnerable to prototype pollution.
<p>Publish Date: 2020-10-26
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-7751>CVE-2020-7751</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7751</a></p>
<p>Release Date: 2020-10-26</p>
<p>Fix Resolution (pathval): 1.1.1</p>
<p>Direct dependency fix Resolution (chai): 4.3.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in pathval tgz autoclosed cve high severity vulnerability vulnerable library pathval tgz object value retrieval given a string path library home page a href path to dependency file package json path to vulnerable library node modules pathval package json dependency hierarchy chai tgz root library x pathval tgz vulnerable library found in head commit a href found in base branch master vulnerability details pathval before version is vulnerable to prototype pollution publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution pathval direct dependency fix resolution chai step up your open source security game with mend | 0 |
263,393 | 28,030,108,621 | IssuesEvent | 2023-03-28 11:50:06 | RG4421/ampere-centos-kernel | https://api.github.com/repos/RG4421/ampere-centos-kernel | reopened | CVE-2020-15437 (Medium) detected in linuxv5.2 | Mend: dependency security vulnerability | ## CVE-2020-15437 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source tree</p>
<p>Library home page: <a href=https://github.com/torvalds/linux.git>https://github.com/torvalds/linux.git</a></p>
<p>Found in base branch: <b>amp-centos-8.0-kernel</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/tty/serial/8250/8250_core.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/tty/serial/8250/8250_core.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/tty/serial/8250/8250_core.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.
Mend Note: After conducting further research, Mend has determined that versions v3.9-rc5 through v4.4.231, v4.5-rc1 through v4.9.231, v4.10-rc1 through v4.14.189, v4.15-rc1 through v4.19.134, v5.0-rc1 through v5.4.53, v5.5-rc1 through v5.7.10 and v5.8-rc1 through v5.8-rc6 of Linux Kernel are vulnerable to CVE-2020-15437.
<p>Publish Date: 2020-11-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-15437>CVE-2020-15437</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-15437">https://www.linuxkernelcves.com/cves/CVE-2020-15437</a></p>
<p>Release Date: 2020-11-23</p>
<p>Fix Resolution: v4.4.232, v4.9.232, v4.14.190, v4.19.135, v5.4.54, v5.7.11, v5.8-rc7</p>
</p>
</details>
<p></p>
| True | CVE-2020-15437 (Medium) detected in linuxv5.2 - ## CVE-2020-15437 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxv5.2</b></p></summary>
<p>
<p>Linux kernel source tree</p>
<p>Library home page: <a href=https://github.com/torvalds/linux.git>https://github.com/torvalds/linux.git</a></p>
<p>Found in base branch: <b>amp-centos-8.0-kernel</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/tty/serial/8250/8250_core.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/tty/serial/8250/8250_core.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/tty/serial/8250/8250_core.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.
Mend Note: After conducting further research, Mend has determined that versions v3.9-rc5 through v4.4.231, v4.5-rc1 through v4.9.231, v4.10-rc1 through v4.14.189, v4.15-rc1 through v4.19.134, v5.0-rc1 through v5.4.53, v5.5-rc1 through v5.7.10 and v5.8-rc1 through v5.8-rc6 of Linux Kernel are vulnerable to CVE-2020-15437.
<p>Publish Date: 2020-11-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-15437>CVE-2020-15437</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-15437">https://www.linuxkernelcves.com/cves/CVE-2020-15437</a></p>
<p>Release Date: 2020-11-23</p>
<p>Fix Resolution: v4.4.232, v4.9.232, v4.14.190, v4.19.135, v5.4.54, v5.7.11, v5.8-rc7</p>
</p>
</details>
<p></p>
| non_priority | cve medium detected in cve medium severity vulnerability vulnerable library linux kernel source tree library home page a href found in base branch amp centos kernel vulnerable source files drivers tty serial core c drivers tty serial core c drivers tty serial core c vulnerability details the linux kernel before version is vulnerable to a null pointer dereference in drivers tty serial core c isa init ports that allows local users to cause a denial of service by using the p serial in pointer which uninitialized mend note after conducting further research mend has determined that versions through through through through through through and through of linux kernel are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution | 0 |
328,412 | 28,118,248,871 | IssuesEvent | 2023-03-31 12:28:44 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | closed | roachtest: tpcc/mixed-headroom/n5cpu16 failed | C-test-failure O-robot O-roachtest branch-master release-blocker T-testeng | roachtest.tpcc/mixed-headroom/n5cpu16 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9329887?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9329887?buildTab=artifacts#/tpcc/mixed-headroom/n5cpu16) on master @ [1f8024bf14433ca169e5a8c3768c5d223dc5018c](https://github.com/cockroachdb/cockroach/commits/1f8024bf14433ca169e5a8c3768c5d223dc5018c):
```
test artifacts and logs in: /artifacts/tpcc/mixed-headroom/n5cpu16/run_1
(monitor.go:127).Wait: monitor failure: monitor task failed: output in run_233809.361302087_n5_cockroach-workload-r: ./cockroach workload run tpcc --warehouses=909 --histograms=perf/stats.json --ramp=5m0s --duration=1h40m0s --prometheus-port=2112 --pprofport=33333 {pgurl:1-4} returned: COMMAND_PROBLEM: ssh verbose log retained in ssh_233810.038007557_n5_cockroach-workload-r.log: exit status 1
(mixed_version_jobs.go:76).wait: monitor failure: monitor task failed: t.Fatal() was called
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=16</code>
, <code>ROACHTEST_encrypted=true</code>
, <code>ROACHTEST_fs=ext4</code>
, <code>ROACHTEST_localSSD=true</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/test-eng
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*tpcc/mixed-headroom/n5cpu16.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-26326 | 3.0 | roachtest: tpcc/mixed-headroom/n5cpu16 failed - roachtest.tpcc/mixed-headroom/n5cpu16 [failed](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9329887?buildTab=log) with [artifacts](https://teamcity.cockroachdb.com/buildConfiguration/Cockroach_Nightlies_RoachtestNightlyGceBazel/9329887?buildTab=artifacts#/tpcc/mixed-headroom/n5cpu16) on master @ [1f8024bf14433ca169e5a8c3768c5d223dc5018c](https://github.com/cockroachdb/cockroach/commits/1f8024bf14433ca169e5a8c3768c5d223dc5018c):
```
test artifacts and logs in: /artifacts/tpcc/mixed-headroom/n5cpu16/run_1
(monitor.go:127).Wait: monitor failure: monitor task failed: output in run_233809.361302087_n5_cockroach-workload-r: ./cockroach workload run tpcc --warehouses=909 --histograms=perf/stats.json --ramp=5m0s --duration=1h40m0s --prometheus-port=2112 --pprofport=33333 {pgurl:1-4} returned: COMMAND_PROBLEM: ssh verbose log retained in ssh_233810.038007557_n5_cockroach-workload-r.log: exit status 1
(mixed_version_jobs.go:76).wait: monitor failure: monitor task failed: t.Fatal() was called
```
<p>Parameters: <code>ROACHTEST_cloud=gce</code>
, <code>ROACHTEST_cpu=16</code>
, <code>ROACHTEST_encrypted=true</code>
, <code>ROACHTEST_fs=ext4</code>
, <code>ROACHTEST_localSSD=true</code>
, <code>ROACHTEST_ssd=0</code>
</p>
<details><summary>Help</summary>
<p>
See: [roachtest README](https://github.com/cockroachdb/cockroach/blob/master/pkg/cmd/roachtest/README.md)
See: [How To Investigate \(internal\)](https://cockroachlabs.atlassian.net/l/c/SSSBr8c7)
</p>
</details>
/cc @cockroachdb/test-eng
<sub>
[This test on roachdash](https://roachdash.crdb.dev/?filter=status:open%20t:.*tpcc/mixed-headroom/n5cpu16.*&sort=title+created&display=lastcommented+project) | [Improve this report!](https://github.com/cockroachdb/cockroach/tree/master/pkg/cmd/internal/issues)
</sub>
Jira issue: CRDB-26326 | non_priority | roachtest tpcc mixed headroom failed roachtest tpcc mixed headroom with on master test artifacts and logs in artifacts tpcc mixed headroom run monitor go wait monitor failure monitor task failed output in run cockroach workload r cockroach workload run tpcc warehouses histograms perf stats json ramp duration prometheus port pprofport pgurl returned command problem ssh verbose log retained in ssh cockroach workload r log exit status mixed version jobs go wait monitor failure monitor task failed t fatal was called parameters roachtest cloud gce roachtest cpu roachtest encrypted true roachtest fs roachtest localssd true roachtest ssd help see see cc cockroachdb test eng jira issue crdb | 0 |
74,883 | 25,382,122,445 | IssuesEvent | 2022-11-21 18:27:05 | bcpierce00/unison | https://api.github.com/repos/bcpierce00/unison | closed | macOS: failure to propagate changes when file extension is hidden | defect wontfix impact-low feedback macOS | ## Problem
Unison properly identifies differences but fails to propagate changes for files that have the "hide extension" box checked. An example error output:
```
Docs/docname.pdf
Error in setting file information:
Operation not permitted [setattrlist(/Users/<redacted>/Docs/.unison.docname.pdf.b521af74258495965fab4c7bbe5e4d22.unison.tmp)]
```
After unchecking the "hide extension" box, sync finishes as expected.
## Setup
- Unison v2.51.2 (GUI, with Full Disk Access)
- macOS Catalina 10.15.6
- Syncing a local folder to another local folder mounted via FUSE
| 1.0 | macOS: failure to propagate changes when file extension is hidden - ## Problem
Unison properly identifies differences but fails to propagate changes for files that have the "hide extension" box checked. An example error output:
```
Docs/docname.pdf
Error in setting file information:
Operation not permitted [setattrlist(/Users/<redacted>/Docs/.unison.docname.pdf.b521af74258495965fab4c7bbe5e4d22.unison.tmp)]
```
After unchecking the "hide extension" box, sync finishes as expected.
## Setup
- Unison v2.51.2 (GUI, with Full Disk Access)
- macOS Catalina 10.15.6
- Syncing a local folder to another local folder mounted via FUSE
| non_priority | macos failure to propagate changes when file extension is hidden problem unison properly identifies differences but fails to propagate changes for files that have the hide extension box checked an example error output docs docname pdf error in setting file information operation not permitted after unchecking the hide extension box sync finishes as expected setup unison gui with full disk access macos catalina syncing a local folder to another local folder mounted via fuse | 0 |
221,130 | 16,995,095,471 | IssuesEvent | 2021-07-01 04:51:47 | faridlesosibirsk/TrainingRepository | https://api.github.com/repos/faridlesosibirsk/TrainingRepository | opened | 36. Несколько репозиториев | documentation | Написать заголовок и цель. Ответ сохранить в файл "36. Несколько репозиториев.md". | 1.0 | 36. Несколько репозиториев - Написать заголовок и цель. Ответ сохранить в файл "36. Несколько репозиториев.md". | non_priority | несколько репозиториев написать заголовок и цель ответ сохранить в файл несколько репозиториев md | 0 |
225,090 | 24,807,959,383 | IssuesEvent | 2022-10-25 07:04:29 | sast-automation-dev/openidm-community-edition-45 | https://api.github.com/repos/sast-automation-dev/openidm-community-edition-45 | opened | activiti-engine-5.10.jar: 3 vulnerabilities (highest severity is: 8.1) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>activiti-engine-5.10.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /openidm-workflow-activiti/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar,/home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (activiti-engine version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2020-26945](https://www.mend.io/vulnerability-database/CVE-2020-26945) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | mybatis-3.1.1.jar | Transitive | 5.14 | ✅ |
| [CVE-2017-9801](https://www.mend.io/vulnerability-database/CVE-2017-9801) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-email-1.2.jar | Transitive | 5.14 | ✅ |
| [CVE-2018-1294](https://www.mend.io/vulnerability-database/CVE-2018-1294) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-email-1.2.jar | Transitive | 5.14 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26945</summary>
### Vulnerable Library - <b>mybatis-3.1.1.jar</b></p>
<p>The MyBatis data mapper framework makes it easier to use a relational database with object-oriented
applications. MyBatis couples objects with stored procedures or SQL statements using a XML descriptor or
annotations. Simplicity is the biggest advantage of the MyBatis data mapper over object relational mapping
tools.</p>
<p>Library home page: <a href="http://www.mybatis.org/core/">http://www.mybatis.org/core/</a></p>
<p>Path to dependency file: /openidm-workflow-remote/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar,/home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar</p>
<p>
Dependency Hierarchy:
- activiti-engine-5.10.jar (Root Library)
- :x: **mybatis-3.1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
MyBatis before 3.5.6 mishandles deserialization of object streams.
<p>Publish Date: 2020-10-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-26945>CVE-2020-26945</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-10-26</p>
<p>Fix Resolution (org.mybatis:mybatis): 3.5.6</p>
<p>Direct dependency fix Resolution (org.activiti:activiti-engine): 5.14</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-9801</summary>
### Vulnerable Library - <b>commons-email-1.2.jar</b></p>
<p>Commons-Email aims to provide an API for sending email. It is built on top of
the JavaMail API, which it aims to simplify.</p>
<p>Library home page: <a href="http://commons.apache.org/email/">http://commons.apache.org/email/</a></p>
<p>Path to dependency file: /openidm-workflow-remote/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar</p>
<p>
Dependency Hierarchy:
- activiti-engine-5.10.jar (Root Library)
- :x: **commons-email-1.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.
<p>Publish Date: 2017-08-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-9801>CVE-2017-9801</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801</a></p>
<p>Release Date: 2017-08-07</p>
<p>Fix Resolution (org.apache.commons:commons-email): 1.5</p>
<p>Direct dependency fix Resolution (org.activiti:activiti-engine): 5.14</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1294</summary>
### Vulnerable Library - <b>commons-email-1.2.jar</b></p>
<p>Commons-Email aims to provide an API for sending email. It is built on top of
the JavaMail API, which it aims to simplify.</p>
<p>Library home page: <a href="http://commons.apache.org/email/">http://commons.apache.org/email/</a></p>
<p>Path to dependency file: /openidm-workflow-remote/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar</p>
<p>
Dependency Hierarchy:
- activiti-engine-5.10.jar (Root Library)
- :x: **commons-email-1.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).
<p>Publish Date: 2018-03-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1294>CVE-2018-1294</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1294">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1294</a></p>
<p>Release Date: 2018-03-20</p>
<p>Fix Resolution (org.apache.commons:commons-email): 1.5</p>
<p>Direct dependency fix Resolution (org.activiti:activiti-engine): 5.14</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | True | activiti-engine-5.10.jar: 3 vulnerabilities (highest severity is: 8.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>activiti-engine-5.10.jar</b></p></summary>
<p></p>
<p>Path to dependency file: /openidm-workflow-activiti/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar,/home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (activiti-engine version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2020-26945](https://www.mend.io/vulnerability-database/CVE-2020-26945) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 8.1 | mybatis-3.1.1.jar | Transitive | 5.14 | ✅ |
| [CVE-2017-9801](https://www.mend.io/vulnerability-database/CVE-2017-9801) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-email-1.2.jar | Transitive | 5.14 | ✅ |
| [CVE-2018-1294](https://www.mend.io/vulnerability-database/CVE-2018-1294) | <img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> High | 7.5 | commons-email-1.2.jar | Transitive | 5.14 | ✅ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2020-26945</summary>
### Vulnerable Library - <b>mybatis-3.1.1.jar</b></p>
<p>The MyBatis data mapper framework makes it easier to use a relational database with object-oriented
applications. MyBatis couples objects with stored procedures or SQL statements using a XML descriptor or
annotations. Simplicity is the biggest advantage of the MyBatis data mapper over object relational mapping
tools.</p>
<p>Library home page: <a href="http://www.mybatis.org/core/">http://www.mybatis.org/core/</a></p>
<p>Path to dependency file: /openidm-workflow-remote/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar,/home/wss-scanner/.m2/repository/org/mybatis/mybatis/3.1.1/mybatis-3.1.1.jar</p>
<p>
Dependency Hierarchy:
- activiti-engine-5.10.jar (Root Library)
- :x: **mybatis-3.1.1.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
MyBatis before 3.5.6 mishandles deserialization of object streams.
<p>Publish Date: 2020-10-10
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2020-26945>CVE-2020-26945</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>8.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2020-10-26</p>
<p>Fix Resolution (org.mybatis:mybatis): 3.5.6</p>
<p>Direct dependency fix Resolution (org.activiti:activiti-engine): 5.14</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2017-9801</summary>
### Vulnerable Library - <b>commons-email-1.2.jar</b></p>
<p>Commons-Email aims to provide an API for sending email. It is built on top of
the JavaMail API, which it aims to simplify.</p>
<p>Library home page: <a href="http://commons.apache.org/email/">http://commons.apache.org/email/</a></p>
<p>Path to dependency file: /openidm-workflow-remote/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar</p>
<p>
Dependency Hierarchy:
- activiti-engine-5.10.jar (Root Library)
- :x: **commons-email-1.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
When a call-site passes a subject for an email that contains line-breaks in Apache Commons Email 1.0 through 1.4, the caller can add arbitrary SMTP headers.
<p>Publish Date: 2017-08-07
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2017-9801>CVE-2017-9801</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9801</a></p>
<p>Release Date: 2017-08-07</p>
<p>Fix Resolution (org.apache.commons:commons-email): 1.5</p>
<p>Direct dependency fix Resolution (org.activiti:activiti-engine): 5.14</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details><details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> CVE-2018-1294</summary>
### Vulnerable Library - <b>commons-email-1.2.jar</b></p>
<p>Commons-Email aims to provide an API for sending email. It is built on top of
the JavaMail API, which it aims to simplify.</p>
<p>Library home page: <a href="http://commons.apache.org/email/">http://commons.apache.org/email/</a></p>
<p>Path to dependency file: /openidm-workflow-remote/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar,/home/wss-scanner/.m2/repository/org/apache/commons/commons-email/1.2/commons-email-1.2.jar</p>
<p>
Dependency Hierarchy:
- activiti-engine-5.10.jar (Root Library)
- :x: **commons-email-1.2.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/sast-automation-dev/openidm-community-edition-45/commit/cd8a5f8b664e919276900d3c11f47cf08758974f">cd8a5f8b664e919276900d3c11f47cf08758974f</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
If a user of Apache Commons Email (typically an application programmer) passes unvalidated input as the so-called "Bounce Address", and that input contains line-breaks, then the email details (recipients, contents, etc.) might be manipulated. Mitigation: Users should upgrade to Commons-Email 1.5. You can mitigate this vulnerability for older versions of Commons Email by stripping line-breaks from data, that will be passed to Email.setBounceAddress(String).
<p>Publish Date: 2018-03-20
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2018-1294>CVE-2018-1294</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>7.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1294">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1294</a></p>
<p>Release Date: 2018-03-20</p>
<p>Fix Resolution (org.apache.commons:commons-email): 1.5</p>
<p>Direct dependency fix Resolution (org.activiti:activiti-engine): 5.14</p>
</p>
<p></p>
:rescue_worker_helmet: Automatic Remediation is available for this issue
</details>
***
<p>:rescue_worker_helmet: Automatic Remediation is available for this issue.</p> | non_priority | activiti engine jar vulnerabilities highest severity is vulnerable library activiti engine jar path to dependency file openidm workflow activiti pom xml path to vulnerable library home wss scanner repository org mybatis mybatis mybatis jar home wss scanner repository org mybatis mybatis mybatis jar found in head commit a href vulnerabilities cve severity cvss dependency type fixed in activiti engine version remediation available high mybatis jar transitive high commons email jar transitive high commons email jar transitive details cve vulnerable library mybatis jar the mybatis data mapper framework makes it easier to use a relational database with object oriented applications mybatis couples objects with stored procedures or sql statements using a xml descriptor or annotations simplicity is the biggest advantage of the mybatis data mapper over object relational mapping tools library home page a href path to dependency file openidm workflow remote pom xml path to vulnerable library home wss scanner repository org mybatis mybatis mybatis jar home wss scanner repository org mybatis mybatis mybatis jar dependency hierarchy activiti engine jar root library x mybatis jar vulnerable library found in head commit a href found in base branch master vulnerability details mybatis before mishandles deserialization of object streams publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution org mybatis mybatis direct dependency fix resolution org activiti activiti engine rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons email jar commons email aims to provide an api for sending email it is built on top of the javamail api which it aims to simplify library home page a href path to dependency file openidm workflow remote pom xml path to vulnerable library home wss scanner repository org apache commons commons email commons email jar home wss scanner repository org apache commons commons email commons email jar dependency hierarchy activiti engine jar root library x commons email jar vulnerable library found in head commit a href found in base branch master vulnerability details when a call site passes a subject for an email that contains line breaks in apache commons email through the caller can add arbitrary smtp headers publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons email direct dependency fix resolution org activiti activiti engine rescue worker helmet automatic remediation is available for this issue cve vulnerable library commons email jar commons email aims to provide an api for sending email it is built on top of the javamail api which it aims to simplify library home page a href path to dependency file openidm workflow remote pom xml path to vulnerable library home wss scanner repository org apache commons commons email commons email jar home wss scanner repository org apache commons commons email commons email jar dependency hierarchy activiti engine jar root library x commons email jar vulnerable library found in head commit a href found in base branch master vulnerability details if a user of apache commons email typically an application programmer passes unvalidated input as the so called bounce address and that input contains line breaks then the email details recipients contents etc might be manipulated mitigation users should upgrade to commons email you can mitigate this vulnerability for older versions of commons email by stripping line breaks from data that will be passed to email setbounceaddress string publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org apache commons commons email direct dependency fix resolution org activiti activiti engine rescue worker helmet automatic remediation is available for this issue rescue worker helmet automatic remediation is available for this issue | 0 |
136,807 | 19,981,701,194 | IssuesEvent | 2022-01-30 01:33:02 | Tech-Start-UCalgary/Aquavolution | https://api.github.com/repos/Tech-Start-UCalgary/Aquavolution | closed | Add death scene | enhancement design | When the player ded switch to the "Death Scene" that displays "You died" with your Score in the middle (for now at least) | 1.0 | Add death scene - When the player ded switch to the "Death Scene" that displays "You died" with your Score in the middle (for now at least) | non_priority | add death scene when the player ded switch to the death scene that displays you died with your score in the middle for now at least | 0 |
54,081 | 7,872,858,799 | IssuesEvent | 2018-06-25 12:41:26 | philippkraft/cmf | https://api.github.com/repos/philippkraft/cmf | opened | Technical Flux and Waterbalance Tutorials need reworking | documentation help wanted | The states of the Technical Flux / Waterbalance Tutorials are confusing and need a total rewrite. Otherwise learning users do not understand the behaviour as #44 shows. | 1.0 | Technical Flux and Waterbalance Tutorials need reworking - The states of the Technical Flux / Waterbalance Tutorials are confusing and need a total rewrite. Otherwise learning users do not understand the behaviour as #44 shows. | non_priority | technical flux and waterbalance tutorials need reworking the states of the technical flux waterbalance tutorials are confusing and need a total rewrite otherwise learning users do not understand the behaviour as shows | 0 |
13,871 | 16,598,103,120 | IssuesEvent | 2021-06-01 15:39:13 | EwyBoy/OreTweaker | https://api.github.com/repos/EwyBoy/OreTweaker | opened | [Compatibility] Create | Compatibility Request | **Name of mod you want compatibility with?**
Create
**Is your compatibility request related to a problem?**
I will fix the issues people have with trying to disable ore generation from Create.
**Describe the solution you'd like**
A hardcoded check if Create is present then we can hook into its ore gen features and disable em if we want.
| True | [Compatibility] Create - **Name of mod you want compatibility with?**
Create
**Is your compatibility request related to a problem?**
I will fix the issues people have with trying to disable ore generation from Create.
**Describe the solution you'd like**
A hardcoded check if Create is present then we can hook into its ore gen features and disable em if we want.
| non_priority | create name of mod you want compatibility with create is your compatibility request related to a problem i will fix the issues people have with trying to disable ore generation from create describe the solution you d like a hardcoded check if create is present then we can hook into its ore gen features and disable em if we want | 0 |
62,982 | 7,661,067,000 | IssuesEvent | 2018-05-11 13:03:42 | chili-epfl/FROG | https://api.github.com/repos/chili-epfl/FROG | closed | Preview full-screen mode single activity hides top | design/UI | If you have a single activity open in preview, and you go to full-screen mode, the top of the activity is overlaid by the top bar.
Compare below.
There is also something weird about the container for the activity (the modal-body or whatever) - it's at 85% of the screen height for some reason - even more clear when you do full-screen. If I do height=100% in my component (for example ac-textarea) I get a scroll-bar, not sure how I should get this to fill the area but not overflow? And don't know why we need the 30 or so pixels at the bottom of the screen?
<img width="1390" alt="screen shot 2018-05-08 at 18 50 08" src="https://user-images.githubusercontent.com/61575/39770887-aa5f5ea6-52f0-11e8-8b98-9f5827bc7dd4.png">
<img width="1335" alt="screen shot 2018-05-08 at 18 50 04" src="https://user-images.githubusercontent.com/61575/39770888-aa78e790-52f0-11e8-8fcb-df32d792238f.png">
| 1.0 | Preview full-screen mode single activity hides top - If you have a single activity open in preview, and you go to full-screen mode, the top of the activity is overlaid by the top bar.
Compare below.
There is also something weird about the container for the activity (the modal-body or whatever) - it's at 85% of the screen height for some reason - even more clear when you do full-screen. If I do height=100% in my component (for example ac-textarea) I get a scroll-bar, not sure how I should get this to fill the area but not overflow? And don't know why we need the 30 or so pixels at the bottom of the screen?
<img width="1390" alt="screen shot 2018-05-08 at 18 50 08" src="https://user-images.githubusercontent.com/61575/39770887-aa5f5ea6-52f0-11e8-8b98-9f5827bc7dd4.png">
<img width="1335" alt="screen shot 2018-05-08 at 18 50 04" src="https://user-images.githubusercontent.com/61575/39770888-aa78e790-52f0-11e8-8fcb-df32d792238f.png">
| non_priority | preview full screen mode single activity hides top if you have a single activity open in preview and you go to full screen mode the top of the activity is overlaid by the top bar compare below there is also something weird about the container for the activity the modal body or whatever it s at of the screen height for some reason even more clear when you do full screen if i do height in my component for example ac textarea i get a scroll bar not sure how i should get this to fill the area but not overflow and don t know why we need the or so pixels at the bottom of the screen img width alt screen shot at src img width alt screen shot at src | 0 |
323,790 | 27,752,465,319 | IssuesEvent | 2023-03-15 22:03:32 | antrea-io/antrea | https://api.github.com/repos/antrea-io/antrea | closed | test-multicluster-e2e always failed | area/test/e2e kind/bug area/multi-cluster | **Describe the bug**
test-multicluster-e2e failed.
```
=== RUN TestConnectivity/TestMCService/Case=StretchedNetworkPolicy
time="2023-02-17T01:13:01Z" level=info msg="Creating/updating ClusterNetworkPolicy drop-client-pod-sel"
service_test.go:238:
Error Trace: /var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:238
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:127
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/main_test.go:115
Error: Not equal:
expected: "Rej"
actual : "Drp"
Diff:
--- Expected
+++ Actual
@@ -1,2 +1,2 @@
-(e2e.PodConnectivityMark) (len=3) "Rej"
+(e2e.PodConnectivityMark) (len=3) "Drp"
Test: TestConnectivity/TestMCService/Case=StretchedNetworkPolicy
Messages: Failure -- wrong result from probing exported Service from east-cluster-gateway-client clientPod after applying Stretched NetworkPolicy
service_test.go:241:
Error Trace: /var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:241
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:127
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/main_test.go:115
Error: Not equal:
expected: "Rej"
actual : "Drp"
Diff:
--- Expected
+++ Actual
@@ -1,2 +1,2 @@
-(e2e.PodConnectivityMark) (len=3) "Rej"
+(e2e.PodConnectivityMark) (len=3) "Drp"
Test: TestConnectivity/TestMCService/Case=StretchedNetworkPolicy
Messages: Failure -- wrong result from probing exported Service from east-cluster-regular-client clientPod after applying Stretched NetworkPolicy
```
**To Reproduce**
Run `test-multicluster-e2e` with main branch at 20230216
**Expected**
Pass all cases.
**Actual behavior**
Above case failed.
**Versions:**
main branch 20230216
**Additional context**
| 1.0 | test-multicluster-e2e always failed - **Describe the bug**
test-multicluster-e2e failed.
```
=== RUN TestConnectivity/TestMCService/Case=StretchedNetworkPolicy
time="2023-02-17T01:13:01Z" level=info msg="Creating/updating ClusterNetworkPolicy drop-client-pod-sel"
service_test.go:238:
Error Trace: /var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:238
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:127
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/main_test.go:115
Error: Not equal:
expected: "Rej"
actual : "Drp"
Diff:
--- Expected
+++ Actual
@@ -1,2 +1,2 @@
-(e2e.PodConnectivityMark) (len=3) "Rej"
+(e2e.PodConnectivityMark) (len=3) "Drp"
Test: TestConnectivity/TestMCService/Case=StretchedNetworkPolicy
Messages: Failure -- wrong result from probing exported Service from east-cluster-gateway-client clientPod after applying Stretched NetworkPolicy
service_test.go:241:
Error Trace: /var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:241
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/service_test.go:127
/var/lib/jenkins/workspace/antrea-multicluster-e2e-for-pull-request/multicluster/test/e2e/main_test.go:115
Error: Not equal:
expected: "Rej"
actual : "Drp"
Diff:
--- Expected
+++ Actual
@@ -1,2 +1,2 @@
-(e2e.PodConnectivityMark) (len=3) "Rej"
+(e2e.PodConnectivityMark) (len=3) "Drp"
Test: TestConnectivity/TestMCService/Case=StretchedNetworkPolicy
Messages: Failure -- wrong result from probing exported Service from east-cluster-regular-client clientPod after applying Stretched NetworkPolicy
```
**To Reproduce**
Run `test-multicluster-e2e` with main branch at 20230216
**Expected**
Pass all cases.
**Actual behavior**
Above case failed.
**Versions:**
main branch 20230216
**Additional context**
| non_priority | test multicluster always failed describe the bug test multicluster failed run testconnectivity testmcservice case stretchednetworkpolicy time level info msg creating updating clusternetworkpolicy drop client pod sel service test go error trace var lib jenkins workspace antrea multicluster for pull request multicluster test service test go var lib jenkins workspace antrea multicluster for pull request multicluster test service test go var lib jenkins workspace antrea multicluster for pull request multicluster test main test go error not equal expected rej actual drp diff expected actual podconnectivitymark len rej podconnectivitymark len drp test testconnectivity testmcservice case stretchednetworkpolicy messages failure wrong result from probing exported service from east cluster gateway client clientpod after applying stretched networkpolicy service test go error trace var lib jenkins workspace antrea multicluster for pull request multicluster test service test go var lib jenkins workspace antrea multicluster for pull request multicluster test service test go var lib jenkins workspace antrea multicluster for pull request multicluster test main test go error not equal expected rej actual drp diff expected actual podconnectivitymark len rej podconnectivitymark len drp test testconnectivity testmcservice case stretchednetworkpolicy messages failure wrong result from probing exported service from east cluster regular client clientpod after applying stretched networkpolicy to reproduce run test multicluster with main branch at expected pass all cases actual behavior above case failed versions main branch additional context | 0 |
87,882 | 11,008,071,790 | IssuesEvent | 2019-12-04 09:48:59 | devanshj/cogni | https://api.github.com/repos/devanshj/cogni | closed | Incremental output | design-issue enhancement | What should be done in the case of `python -c "while True: print('hello')"`? Currently there is no output because the process never exits. | 1.0 | Incremental output - What should be done in the case of `python -c "while True: print('hello')"`? Currently there is no output because the process never exits. | non_priority | incremental output what should be done in the case of python c while true print hello currently there is no output because the process never exits | 0 |
139,747 | 11,276,934,872 | IssuesEvent | 2020-01-15 00:56:38 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | opened | webcompat reporter not remembering if a website has already been reported | QA/Test-Plan-Specified QA/Yes bug feature/shields/webcompat | <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description
<!--Provide a brief description of the issue-->
The `webcompat reporter` under `Shields` isn't remembering if a particular website has already been reported as per the design mentioned via https://github.com/brave/brave-browser/issues/4262#issue-437884610. Example:
> Shields should remember that the user has previously flagged a site for a webcompat issue. In this case, the Shields DOWN state will not have a "Report a broken site" button and instead persist the thank you message.
Should be displaying the following if a website has already been reported before:

## Steps to Reproduce
<!--Please add a series of steps to reproduce the issue-->
1. download & install `1.3.91 CR: 79.0.3945.117`
2. visit https://brave.com and disable shields
3. click on `Report a broken site` and select `Submit`
4. click on `Shields` again and you'll see the `Report a broken site` button again
## Actual result:
<!--Please add screenshots if needed-->

## Expected result:
`Webcompat reporter` should remember if a user has already reported a specific site and shouldn't be displaying `Report a broken site`.
## Reproduces how often:
<!--[Easily reproduced/Intermittent issue/No steps to reproduce]-->
100% reproducible when using the above STR.
## Brave version (brave://version info)
<!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details-->
Brave | 1.3.91 Chromium: 79.0.3945.117 (Official Build) beta (64-bit)
-- | --
Revision | 04f0a055010adab4484f7497fbfdbf312c307f1d-refs/branch-heads/3945@{#1019}
OS | macOS Version 10.15.2 (Build 19C57)
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current release? `N/A`
- Can you reproduce this issue with the beta channel? `Yes`
- Can you reproduce this issue with the dev channel? `Yes`
- Can you reproduce this issue with the nightly channel? `Yes`
## Other Additional Information:
- Does the issue resolve itself when disabling Brave Shields? `N/A`
- Does the issue resolve itself when disabling Brave Rewards? `N/A`
- Is the issue reproducible on the latest version of Chrome? `N/A`
## Miscellaneous Information:
<!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
CCing @cezaraugusto @karenkliu @rebron @brave/legacy_qa | 1.0 | webcompat reporter not remembering if a website has already been reported - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description
<!--Provide a brief description of the issue-->
The `webcompat reporter` under `Shields` isn't remembering if a particular website has already been reported as per the design mentioned via https://github.com/brave/brave-browser/issues/4262#issue-437884610. Example:
> Shields should remember that the user has previously flagged a site for a webcompat issue. In this case, the Shields DOWN state will not have a "Report a broken site" button and instead persist the thank you message.
Should be displaying the following if a website has already been reported before:

## Steps to Reproduce
<!--Please add a series of steps to reproduce the issue-->
1. download & install `1.3.91 CR: 79.0.3945.117`
2. visit https://brave.com and disable shields
3. click on `Report a broken site` and select `Submit`
4. click on `Shields` again and you'll see the `Report a broken site` button again
## Actual result:
<!--Please add screenshots if needed-->

## Expected result:
`Webcompat reporter` should remember if a user has already reported a specific site and shouldn't be displaying `Report a broken site`.
## Reproduces how often:
<!--[Easily reproduced/Intermittent issue/No steps to reproduce]-->
100% reproducible when using the above STR.
## Brave version (brave://version info)
<!--For installed build, please copy Brave, Revision and OS from brave://version and paste here. If building from source please mention it along with brave://version details-->
Brave | 1.3.91 Chromium: 79.0.3945.117 (Official Build) beta (64-bit)
-- | --
Revision | 04f0a055010adab4484f7497fbfdbf312c307f1d-refs/branch-heads/3945@{#1019}
OS | macOS Version 10.15.2 (Build 19C57)
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current release? `N/A`
- Can you reproduce this issue with the beta channel? `Yes`
- Can you reproduce this issue with the dev channel? `Yes`
- Can you reproduce this issue with the nightly channel? `Yes`
## Other Additional Information:
- Does the issue resolve itself when disabling Brave Shields? `N/A`
- Does the issue resolve itself when disabling Brave Rewards? `N/A`
- Is the issue reproducible on the latest version of Chrome? `N/A`
## Miscellaneous Information:
<!--Any additional information, related issues, extra QA steps, configuration or data that might be necessary to reproduce the issue-->
CCing @cezaraugusto @karenkliu @rebron @brave/legacy_qa | non_priority | webcompat reporter not remembering if a website has already been reported have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description the webcompat reporter under shields isn t remembering if a particular website has already been reported as per the design mentioned via example shields should remember that the user has previously flagged a site for a webcompat issue in this case the shields down state will not have a report a broken site button and instead persist the thank you message should be displaying the following if a website has already been reported before steps to reproduce download install cr visit and disable shields click on report a broken site and select submit click on shields again and you ll see the report a broken site button again actual result expected result webcompat reporter should remember if a user has already reported a specific site and shouldn t be displaying report a broken site reproduces how often reproducible when using the above str brave version brave version info brave chromium official build beta bit revision refs branch heads os macos version build version channel information can you reproduce this issue with the current release n a can you reproduce this issue with the beta channel yes can you reproduce this issue with the dev channel yes can you reproduce this issue with the nightly channel yes other additional information does the issue resolve itself when disabling brave shields n a does the issue resolve itself when disabling brave rewards n a is the issue reproducible on the latest version of chrome n a miscellaneous information ccing cezaraugusto karenkliu rebron brave legacy qa | 0 |
30,675 | 11,842,020,251 | IssuesEvent | 2020-03-23 22:02:06 | Mohib-hub/karate | https://api.github.com/repos/Mohib-hub/karate | opened | CVE-2019-12814 (Medium) detected in multiple libraries | security vulnerability | ## CVE-2019-12814 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.8.5.jar</b>, <b>jackson-databind-2.8.8.jar</b>, <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.8.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/karate/examples/jobserver/build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.5/b3035f37e674c04dafe36a660c3815cc59f764e2/jackson-databind-2.8.5.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.5/b3035f37e674c04dafe36a660c3815cc59f764e2/jackson-databind-2.8.5.jar</p>
<p>
Dependency Hierarchy:
- cucumber-reporting-3.8.0.jar (Root Library)
- :x: **jackson-databind-2.8.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.8/bf88c7b27e95cbadce4e7c316a56c3efffda8026/jackson-databind-2.8.8.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.8/bf88c7b27e95cbadce4e7c316a56c3efffda8026/jackson-databind-2.8.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-1.5.3.RELEASE.jar (Root Library)
- :x: **jackson-databind-2.8.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /tmp/ws-ua_20200323212715/downloadResource_20478f94-1633-47a1-ad79-827f8481d3e7/20200323212748/jackson-databind-2.9.8.jar,/tmp/ws-ua_20200323212715/downloadResource_20478f94-1633-47a1-ad79-827f8481d3e7/20200323212748/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- karate-gatling-0.9.5.jar (Root Library)
- gatling-charts-highcharts-3.0.2.jar
- gatling-charts-3.0.2.jar
- gatling-core-3.0.2.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Mohib-hub/karate/commit/c8766c8277306046ef9c6f01148b98b0d2bafe02">c8766c8277306046ef9c6f01148b98b0d2bafe02</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
<p>Publish Date: 2019-06-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814>CVE-2019-12814</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2341">https://github.com/FasterXML/jackson-databind/issues/2341</a></p>
<p>Release Date: 2019-06-19</p>
<p>Fix Resolution: 2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.5","isTransitiveDependency":true,"dependencyTree":"net.masterthought:cucumber-reporting:3.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.5.3.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":true,"dependencyTree":"com.intuit.karate:karate-gatling:0.9.5;io.gatling.highcharts:gatling-charts-highcharts:3.0.2;io.gatling:gatling-charts:3.0.2;io.gatling:gatling-core:3.0.2;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0"}],"vulnerabilityIdentifier":"CVE-2019-12814","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2019-12814 (Medium) detected in multiple libraries - ## CVE-2019-12814 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.8.5.jar</b>, <b>jackson-databind-2.8.8.jar</b>, <b>jackson-databind-2.9.8.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.8.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to dependency file: /tmp/ws-scm/karate/examples/jobserver/build.gradle</p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.5/b3035f37e674c04dafe36a660c3815cc59f764e2/jackson-databind-2.8.5.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.5/b3035f37e674c04dafe36a660c3815cc59f764e2/jackson-databind-2.8.5.jar</p>
<p>
Dependency Hierarchy:
- cucumber-reporting-3.8.0.jar (Root Library)
- :x: **jackson-databind-2.8.5.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.8.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.8/bf88c7b27e95cbadce4e7c316a56c3efffda8026/jackson-databind-2.8.8.jar,/root/.gradle/caches/modules-2/files-2.1/com.fasterxml.jackson.core/jackson-databind/2.8.8/bf88c7b27e95cbadce4e7c316a56c3efffda8026/jackson-databind-2.8.8.jar</p>
<p>
Dependency Hierarchy:
- spring-boot-starter-web-1.5.3.RELEASE.jar (Root Library)
- :x: **jackson-databind-2.8.8.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.8.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /tmp/ws-ua_20200323212715/downloadResource_20478f94-1633-47a1-ad79-827f8481d3e7/20200323212748/jackson-databind-2.9.8.jar,/tmp/ws-ua_20200323212715/downloadResource_20478f94-1633-47a1-ad79-827f8481d3e7/20200323212748/jackson-databind-2.9.8.jar</p>
<p>
Dependency Hierarchy:
- karate-gatling-0.9.5.jar (Root Library)
- gatling-charts-highcharts-3.0.2.jar
- gatling-charts-3.0.2.jar
- gatling-core-3.0.2.jar
- :x: **jackson-databind-2.9.8.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Mohib-hub/karate/commit/c8766c8277306046ef9c6f01148b98b0d2bafe02">c8766c8277306046ef9c6f01148b98b0d2bafe02</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.
<p>Publish Date: 2019-06-19
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814>CVE-2019-12814</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.9</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/FasterXML/jackson-databind/issues/2341">https://github.com/FasterXML/jackson-databind/issues/2341</a></p>
<p>Release Date: 2019-06-19</p>
<p>Fix Resolution: 2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.5","isTransitiveDependency":true,"dependencyTree":"net.masterthought:cucumber-reporting:3.8.0;com.fasterxml.jackson.core:jackson-databind:2.8.5","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.8.8","isTransitiveDependency":true,"dependencyTree":"org.springframework.boot:spring-boot-starter-web:1.5.3.RELEASE;com.fasterxml.jackson.core:jackson-databind:2.8.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0"},{"packageType":"Java","groupId":"com.fasterxml.jackson.core","packageName":"jackson-databind","packageVersion":"2.9.8","isTransitiveDependency":true,"dependencyTree":"com.intuit.karate:karate-gatling:0.9.5;io.gatling.highcharts:gatling-charts-highcharts:3.0.2;io.gatling:gatling-charts:3.0.2;io.gatling:gatling-core:3.0.2;com.fasterxml.jackson.core:jackson-databind:2.9.8","isMinimumFixVersionAvailable":true,"minimumFixVersion":"2.7.9.6, 2.8.11.4, 2.9.9.1, 2.10.0"}],"vulnerabilityIdentifier":"CVE-2019-12814","vulnerabilityDetails":"A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x through 2.9.9. When Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has JDOM 1.x or 2.x jar in the classpath, an attacker can send a specifically crafted JSON message that allows them to read arbitrary local files on the server.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-12814","cvss3Severity":"medium","cvss3Score":"5.9","cvss3Metrics":{"A":"None","AC":"High","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to dependency file tmp ws scm karate examples jobserver build gradle path to vulnerable library root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy cucumber reporting jar root library x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar root gradle caches modules files com fasterxml jackson core jackson databind jackson databind jar dependency hierarchy spring boot starter web release jar root library x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library tmp ws ua downloadresource jackson databind jar tmp ws ua downloadresource jackson databind jar dependency hierarchy karate gatling jar root library gatling charts highcharts jar gatling charts jar gatling core jar x jackson databind jar vulnerable library found in head commit a href vulnerability details a polymorphic typing issue was discovered in fasterxml jackson databind x through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has jdom x or x jar in the classpath an attacker can send a specifically crafted json message that allows them to read arbitrary local files on the server publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability false ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails a polymorphic typing issue was discovered in fasterxml jackson databind x through when default typing is enabled either globally or for a specific property for an externally exposed json endpoint and the service has jdom x or x jar in the classpath an attacker can send a specifically crafted json message that allows them to read arbitrary local files on the server vulnerabilityurl | 0 |
71,625 | 15,207,811,896 | IssuesEvent | 2021-02-17 01:04:35 | billmcchesney1/foxtrot | https://api.github.com/repos/billmcchesney1/foxtrot | closed | CVE-2020-27218 (Medium) detected in jetty-server-9.4.18.v20190429.jar, jetty-server-9.4.11.v20180605.jar - autoclosed | security vulnerability | ## CVE-2020-27218 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jetty-server-9.4.18.v20190429.jar</b>, <b>jetty-server-9.4.11.v20180605.jar</b></p></summary>
<p>
<details><summary><b>jetty-server-9.4.18.v20190429.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: foxtrot/foxtrot-sql/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- dropwizard-core-1.3.13.jar (Root Library)
- dropwizard-jersey-1.3.13.jar
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
</details>
<details><summary><b>jetty-server-9.4.11.v20180605.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: foxtrot/foxtrot-common/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.11.v20180605/jetty-server-9.4.11.v20180605.jar</p>
<p>
Dependency Hierarchy:
- dropwizard-swagger-1.3.7-1.jar (Root Library)
- dropwizard-core-1.3.7.jar
- dropwizard-jersey-1.3.7.jar
- :x: **jetty-server-9.4.11.v20180605.jar** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
<p>Publish Date: 2020-11-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218>CVE-2020-27218</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8">https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8</a></p>
<p>Release Date: 2020-11-28</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-server:9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-server","packageVersion":"9.4.18.v20190429","packageFilePaths":["/foxtrot-sql/pom.xml","/foxtrot-server/pom.xml","/foxtrot-core/pom.xml","/foxtrot-translator/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"io.dropwizard:dropwizard-core:1.3.13;io.dropwizard:dropwizard-jersey:1.3.13;org.eclipse.jetty:jetty-server:9.4.18.v20190429","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3"},{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-server","packageVersion":"9.4.11.v20180605","packageFilePaths":["/foxtrot-common/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smoketurner:dropwizard-swagger:1.3.7-1;io.dropwizard:dropwizard-core:1.3.7;io.dropwizard:dropwizard-jersey:1.3.7;org.eclipse.jetty:jetty-server:9.4.11.v20180605","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-27218","vulnerabilityDetails":"In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218","cvss3Severity":"medium","cvss3Score":"4.8","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-27218 (Medium) detected in jetty-server-9.4.18.v20190429.jar, jetty-server-9.4.11.v20180605.jar - autoclosed - ## CVE-2020-27218 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jetty-server-9.4.18.v20190429.jar</b>, <b>jetty-server-9.4.11.v20180605.jar</b></p></summary>
<p>
<details><summary><b>jetty-server-9.4.18.v20190429.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: foxtrot/foxtrot-sql/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar,/home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.18.v20190429/jetty-server-9.4.18.v20190429.jar</p>
<p>
Dependency Hierarchy:
- dropwizard-core-1.3.13.jar (Root Library)
- dropwizard-jersey-1.3.13.jar
- :x: **jetty-server-9.4.18.v20190429.jar** (Vulnerable Library)
</details>
<details><summary><b>jetty-server-9.4.11.v20180605.jar</b></p></summary>
<p>The core jetty server artifact.</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: foxtrot/foxtrot-common/pom.xml</p>
<p>Path to vulnerable library: /home/wss-scanner/.m2/repository/org/eclipse/jetty/jetty-server/9.4.11.v20180605/jetty-server-9.4.11.v20180605.jar</p>
<p>
Dependency Hierarchy:
- dropwizard-swagger-1.3.7-1.jar (Root Library)
- dropwizard-core-1.3.7.jar
- dropwizard-jersey-1.3.7.jar
- :x: **jetty-server-9.4.11.v20180605.jar** (Vulnerable Library)
</details>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.
<p>Publish Date: 2020-11-28
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218>CVE-2020-27218</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: High
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8">https://github.com/eclipse/jetty.project/security/advisories/GHSA-86wm-rrjm-8wh8</a></p>
<p>Release Date: 2020-11-28</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-server:9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-server","packageVersion":"9.4.18.v20190429","packageFilePaths":["/foxtrot-sql/pom.xml","/foxtrot-server/pom.xml","/foxtrot-core/pom.xml","/foxtrot-translator/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"io.dropwizard:dropwizard-core:1.3.13;io.dropwizard:dropwizard-jersey:1.3.13;org.eclipse.jetty:jetty-server:9.4.18.v20190429","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3"},{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-server","packageVersion":"9.4.11.v20180605","packageFilePaths":["/foxtrot-common/pom.xml"],"isTransitiveDependency":true,"dependencyTree":"com.smoketurner:dropwizard-swagger:1.3.7-1;io.dropwizard:dropwizard-core:1.3.7;io.dropwizard:dropwizard-jersey:1.3.7;org.eclipse.jetty:jetty-server:9.4.11.v20180605","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-server:9.4.35.v20201120, 10.0.0.beta3, 11.0.0.beta3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-27218","vulnerabilityDetails":"In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the application, then a subsequent request on the same connection will see that body prepended to its body. The attacker will not see any data but may inject data into the body of the subsequent request.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27218","cvss3Severity":"medium","cvss3Score":"4.8","cvss3Metrics":{"A":"Low","AC":"High","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve medium detected in jetty server jar jetty server jar autoclosed cve medium severity vulnerability vulnerable libraries jetty server jar jetty server jar jetty server jar the core jetty server artifact library home page a href path to dependency file foxtrot foxtrot sql pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar home wss scanner repository org eclipse jetty jetty server jetty server jar dependency hierarchy dropwizard core jar root library dropwizard jersey jar x jetty server jar vulnerable library jetty server jar the core jetty server artifact library home page a href path to dependency file foxtrot foxtrot common pom xml path to vulnerable library home wss scanner repository org eclipse jetty jetty server jetty server jar dependency hierarchy dropwizard swagger jar root library dropwizard core jar dropwizard jersey jar x jetty server jar vulnerable library found in base branch master vulnerability details in eclipse jetty version to to and to if gzip request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an attacker can send a request with a body that is received entirely but not consumed by the application then a subsequent request on the same connection will see that body prepended to its body the attacker will not see any data but may inject data into the body of the subsequent request publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity high privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org eclipse jetty jetty server isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree io dropwizard dropwizard core io dropwizard dropwizard jersey org eclipse jetty jetty server isminimumfixversionavailable true minimumfixversion org eclipse jetty jetty server packagetype java groupid org eclipse jetty packagename jetty server packageversion packagefilepaths istransitivedependency true dependencytree com smoketurner dropwizard swagger io dropwizard dropwizard core io dropwizard dropwizard jersey org eclipse jetty jetty server isminimumfixversionavailable true minimumfixversion org eclipse jetty jetty server basebranches vulnerabilityidentifier cve vulnerabilitydetails in eclipse jetty version to to and to if gzip request body inflation is enabled and requests from different clients are multiplexed onto a single connection and if an attacker can send a request with a body that is received entirely but not consumed by the application then a subsequent request on the same connection will see that body prepended to its body the attacker will not see any data but may inject data into the body of the subsequent request vulnerabilityurl | 0 |
50,937 | 7,644,854,767 | IssuesEvent | 2018-05-08 16:41:59 | jiscdev/analytics-udd | https://api.github.com/repos/jiscdev/analytics-udd | closed | UDD Field Guide template: level of priority column | Documentation change | Craig and I have been working on the UDD Field Guide spreadsheet template, using the Tribal SI one as a case. We have 2 slightly conflicting requirements, 1 for validation and 1 for informing consumers about the level of priority of data items.
Validation: for validation purposes, we can use Mandatory and Optional (and straightforward "not used" - these are deleted from the spreadsheet for that product / service). Mandatory means Mandatory.
Informing: there are a number of fields that Tribal would consider "very much preferred", though they're not actually Mandatory for LDH to run. While this type of soft information can be covered in the Comments column, it's likely to be much more useful to the user if we have a Level of Priority column along the lines of the former Categories 1 to 4 that were in the old version. Then the user can filter on the priorities and get much more of a view of what's really required and what's really optional.
A suggestion would be to introduce a Level of Priority column with the following possible values:
Mandatory Required for LDH to function (as per the validation column)
Important Absence will cause serious issues with the product / service
Preferred Likely to be useful, but not always required
This idea would make the spreadsheet much more usable. However, we're unsure of the validation requirement at the moment. Is there an idea that validation might give information back to the user about more than just Mandatory / Optional? | 1.0 | UDD Field Guide template: level of priority column - Craig and I have been working on the UDD Field Guide spreadsheet template, using the Tribal SI one as a case. We have 2 slightly conflicting requirements, 1 for validation and 1 for informing consumers about the level of priority of data items.
Validation: for validation purposes, we can use Mandatory and Optional (and straightforward "not used" - these are deleted from the spreadsheet for that product / service). Mandatory means Mandatory.
Informing: there are a number of fields that Tribal would consider "very much preferred", though they're not actually Mandatory for LDH to run. While this type of soft information can be covered in the Comments column, it's likely to be much more useful to the user if we have a Level of Priority column along the lines of the former Categories 1 to 4 that were in the old version. Then the user can filter on the priorities and get much more of a view of what's really required and what's really optional.
A suggestion would be to introduce a Level of Priority column with the following possible values:
Mandatory Required for LDH to function (as per the validation column)
Important Absence will cause serious issues with the product / service
Preferred Likely to be useful, but not always required
This idea would make the spreadsheet much more usable. However, we're unsure of the validation requirement at the moment. Is there an idea that validation might give information back to the user about more than just Mandatory / Optional? | non_priority | udd field guide template level of priority column craig and i have been working on the udd field guide spreadsheet template using the tribal si one as a case we have slightly conflicting requirements for validation and for informing consumers about the level of priority of data items validation for validation purposes we can use mandatory and optional and straightforward not used these are deleted from the spreadsheet for that product service mandatory means mandatory informing there are a number of fields that tribal would consider very much preferred though they re not actually mandatory for ldh to run while this type of soft information can be covered in the comments column it s likely to be much more useful to the user if we have a level of priority column along the lines of the former categories to that were in the old version then the user can filter on the priorities and get much more of a view of what s really required and what s really optional a suggestion would be to introduce a level of priority column with the following possible values mandatory required for ldh to function as per the validation column important absence will cause serious issues with the product service preferred likely to be useful but not always required this idea would make the spreadsheet much more usable however we re unsure of the validation requirement at the moment is there an idea that validation might give information back to the user about more than just mandatory optional | 0 |
82,711 | 15,679,665,276 | IssuesEvent | 2021-03-25 01:03:10 | rsoreq/WebGoat | https://api.github.com/repos/rsoreq/WebGoat | opened | CVE-2020-28503 (High) detected in copy-props-2.0.4.tgz | security vulnerability | ## CVE-2020-28503 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>copy-props-2.0.4.tgz</b></p></summary>
<p>Copy properties deeply between two objects.</p>
<p>Library home page: <a href="https://registry.npmjs.org/copy-props/-/copy-props-2.0.4.tgz">https://registry.npmjs.org/copy-props/-/copy-props-2.0.4.tgz</a></p>
<p>Path to dependency file: WebGoat/docs/package.json</p>
<p>Path to vulnerable library: WebGoat/docs/node_modules/copy-props/package.json</p>
<p>
Dependency Hierarchy:
- gulp-4.0.0.tgz (Root Library)
- gulp-cli-2.0.1.tgz
- :x: **copy-props-2.0.4.tgz** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28503>CVE-2020-28503</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/copy-props/releases/tag/2.0.5">https://github.com/gulpjs/copy-props/releases/tag/2.0.5</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: copy-props - 2.0.5</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"copy-props","packageVersion":"2.0.4","packageFilePaths":["/docs/package.json"],"isTransitiveDependency":true,"dependencyTree":"gulp:4.0.0;gulp-cli:2.0.1;copy-props:2.0.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"copy-props - 2.0.5"}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-28503","vulnerabilityDetails":"The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28503","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-28503 (High) detected in copy-props-2.0.4.tgz - ## CVE-2020-28503 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>copy-props-2.0.4.tgz</b></p></summary>
<p>Copy properties deeply between two objects.</p>
<p>Library home page: <a href="https://registry.npmjs.org/copy-props/-/copy-props-2.0.4.tgz">https://registry.npmjs.org/copy-props/-/copy-props-2.0.4.tgz</a></p>
<p>Path to dependency file: WebGoat/docs/package.json</p>
<p>Path to vulnerable library: WebGoat/docs/node_modules/copy-props/package.json</p>
<p>
Dependency Hierarchy:
- gulp-4.0.0.tgz (Root Library)
- gulp-cli-2.0.1.tgz
- :x: **copy-props-2.0.4.tgz** (Vulnerable Library)
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
<p>Publish Date: 2021-03-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28503>CVE-2020-28503</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.3</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: Low
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/gulpjs/copy-props/releases/tag/2.0.5">https://github.com/gulpjs/copy-props/releases/tag/2.0.5</a></p>
<p>Release Date: 2021-03-23</p>
<p>Fix Resolution: copy-props - 2.0.5</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"copy-props","packageVersion":"2.0.4","packageFilePaths":["/docs/package.json"],"isTransitiveDependency":true,"dependencyTree":"gulp:4.0.0;gulp-cli:2.0.1;copy-props:2.0.4","isMinimumFixVersionAvailable":true,"minimumFixVersion":"copy-props - 2.0.5"}],"baseBranches":["develop"],"vulnerabilityIdentifier":"CVE-2020-28503","vulnerabilityDetails":"The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-28503","cvss3Severity":"high","cvss3Score":"7.3","cvss3Metrics":{"A":"Low","AC":"Low","PR":"None","S":"Unchanged","C":"Low","UI":"None","AV":"Network","I":"Low"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in copy props tgz cve high severity vulnerability vulnerable library copy props tgz copy properties deeply between two objects library home page a href path to dependency file webgoat docs package json path to vulnerable library webgoat docs node modules copy props package json dependency hierarchy gulp tgz root library gulp cli tgz x copy props tgz vulnerable library found in base branch develop vulnerability details the package copy props before are vulnerable to prototype pollution via the main functionality publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact low for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution copy props isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree gulp gulp cli copy props isminimumfixversionavailable true minimumfixversion copy props basebranches vulnerabilityidentifier cve vulnerabilitydetails the package copy props before are vulnerable to prototype pollution via the main functionality vulnerabilityurl | 0 |
302,845 | 26,167,160,899 | IssuesEvent | 2023-01-01 12:38:53 | valory-xyz/open-autonomy | https://api.github.com/repos/valory-xyz/open-autonomy | closed | `TestTermination` not passing Tendermint health check | test |
This is a new issue but frequently recurring issue as of recently. Currently seen on PR #1620, #1621 and main: CI run [#6186](https://github.com/valory-xyz/open-autonomy/actions/runs/3630510890/jobs/6124133371).
In all cases this concerns `test_register_reset.TestTermination`
snippet: [failure.log](https://github.com/valory-xyz/open-autonomy/files/10170416/failure.log)
| 1.0 | `TestTermination` not passing Tendermint health check -
This is a new issue but frequently recurring issue as of recently. Currently seen on PR #1620, #1621 and main: CI run [#6186](https://github.com/valory-xyz/open-autonomy/actions/runs/3630510890/jobs/6124133371).
In all cases this concerns `test_register_reset.TestTermination`
snippet: [failure.log](https://github.com/valory-xyz/open-autonomy/files/10170416/failure.log)
| non_priority | testtermination not passing tendermint health check this is a new issue but frequently recurring issue as of recently currently seen on pr and main ci run in all cases this concerns test register reset testtermination snippet | 0 |
348,680 | 31,709,166,942 | IssuesEvent | 2023-09-09 03:53:47 | ValveSoftware/steam-for-linux | https://api.github.com/repos/ValveSoftware/steam-for-linux | closed | Steam Overlay: Error calling method from signal 'leaderboard_score_uploaded' | 3rd party game Need Retest | #### Your system information
<details><summary>Steam client version (build number or date)</summary>
<p>
```
Steam Version: 1690583737
Steam Client Build Date: Fri, Jul 28 20:44 UTC -08:00
Steam Web Build Date: Sat, Jul 29 00:21 UTC -08:00
Steam API Version: SteamClient020
```
</p>
</details>
* Distribution (e.g. Ubuntu): Devuan Daedalus (equivalent to Debian Bookworm)
* Opted into Steam client beta?: No
* Have you checked for system updates?: Yes
* Steam Logs: [generate by running this command in a terminal `tar -zcvf ~/Desktop/steam-logs.tar.gz ~/.steam/steam/logs`]
* GPU: AMD
#### Please describe your issue in as much detail as possible:
Playing [ΔV: Rings of Saturn](https://store.steampowered.com/app/846030/V_Rings_of_Saturn/) results in errors being written in the xsession-errors file. Unsure if it is at software exit or when I open the steam overlay.
```
/bin/sh\0-c\0/home/xrogaan/.local/share/Steam/ubuntu12_32/reaper SteamLaunch AppId=846030 -- /home/xrogaan/.local/share/Steam/ubuntu12_32/steam-launch-wrapper -- '/mnt/Games/xrogaan/SteamLibrary/steamapps/common/dV Rings of Saturn/Delta-V.x86_64'\0
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object 'libgtk3-nocsd.so.0' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
Godot Engine v3.5.2.stable.custom_build.170ba337a - https://godotengine.org
OpenGL ES 3.0 Renderer: AMD Radeon RX 570 Series (polaris10, LLVM 15.0.6, DRM 3.52, 6.4.14-x64v3-xanmod1)
Async. shader compilation: ON (full native support)
Shader cache: ON
ERROR: ld.so: object 'libgtk3-nocsd.so.0' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
09/07 09:39:44 Init: Installing breakpad exception handler for appid(gameoverlayui)/version(20230728184426)/tid(7000)
09/07 09:39:44 Init: Installing breakpad exception handler for appid(gameoverlayui)/version(1.0)/tid(7000)
[S_API] SteamAPI_Init(): Loaded '/home/xrogaan/.local/share/Steam/linux64/steamclient.so' OK.
Setting breakpad minidump AppID = 846030
SteamInternal_SetMinidumpSteamID: Caching Steam ID: 76561197999039343 [API loaded no]
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'overlay_toggled': 'Node(AchievementSteam.gd)::_overlay': Method expected 1 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'overlay_toggled': 'Node(AchievementSteam.gd)::_overlay': Method expected 1 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Condition "_first != nullptr" is true.
at: ~List (./core/self_list.h:108)
WARNING: ObjectDB instances leaked at exit (run with --verbose for details).
at: cleanup (core/object.cpp:2070)
ERROR: Resources still in use at exit (run with --verbose for details).
at: clear (core/resource.cpp:417)
ERROR: There are still MemoryPool allocs in use at exit!
at: cleanup (core/pool_vector.cpp:63)
Game 846030 created interface STEAMUSERSTATS_INTERFACE_VERSION012 /
Game 846030 created interface SteamController008 /
Game 846030 created interface SteamFriends017 /
Game 846030 created interface SteamInput006 /
Game 846030 created interface SteamUser023 /
Game 846030 created interface SteamUser023 / User
Game 846030 created interface SteamUtils010 /
Game 846030 method call count for IClientUserStats::GetNumberOfCurrentPlayers : 70
Game 846030 method call count for IClientUserStats::UploadLeaderboardScore : 35
Game 846030 method call count for IClientUserStats::FindLeaderboard : 7
Game 846030 method call count for IClientUserStats::IndicateAchievementProgress : 3
Game 846030 method call count for IClientUserStats::SetAchievement : 38
Game 846030 method call count for IClientUserStats::GetAchievement : 84
Game 846030 method call count for IClientUserStats::StoreStats : 45
Game 846030 method call count for IClientUserStats::SetStat : 6
Game 846030 method call count for IClientUserStats::RequestCurrentStats : 1
Game 846030 method call count for IClientUtils::RecordSteamInterfaceCreation : 9
Game 846030 method call count for IClientUtils::SetOverlayNotificationInset : 1
Game 846030 method call count for IClientUtils::SetOverlayNotificationPosition : 1
Game 846030 method call count for IClientUtils::GetAPICallResult : 84
Game 846030 method call count for IClientUtils::GetAppID : 12
Game 846030 method call count for IClientFriends::SetRichPresence : 11
Game 846030 method call count for IClientUser::GetSteamID : 1
Game 846030 method call count for IClientUser::BLoggedOn : 1
Uploaded AppInterfaceStats to Steam
```
| 1.0 | Steam Overlay: Error calling method from signal 'leaderboard_score_uploaded' - #### Your system information
<details><summary>Steam client version (build number or date)</summary>
<p>
```
Steam Version: 1690583737
Steam Client Build Date: Fri, Jul 28 20:44 UTC -08:00
Steam Web Build Date: Sat, Jul 29 00:21 UTC -08:00
Steam API Version: SteamClient020
```
</p>
</details>
* Distribution (e.g. Ubuntu): Devuan Daedalus (equivalent to Debian Bookworm)
* Opted into Steam client beta?: No
* Have you checked for system updates?: Yes
* Steam Logs: [generate by running this command in a terminal `tar -zcvf ~/Desktop/steam-logs.tar.gz ~/.steam/steam/logs`]
* GPU: AMD
#### Please describe your issue in as much detail as possible:
Playing [ΔV: Rings of Saturn](https://store.steampowered.com/app/846030/V_Rings_of_Saturn/) results in errors being written in the xsession-errors file. Unsure if it is at software exit or when I open the steam overlay.
```
/bin/sh\0-c\0/home/xrogaan/.local/share/Steam/ubuntu12_32/reaper SteamLaunch AppId=846030 -- /home/xrogaan/.local/share/Steam/ubuntu12_32/steam-launch-wrapper -- '/mnt/Games/xrogaan/SteamLibrary/steamapps/common/dV Rings of Saturn/Delta-V.x86_64'\0
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object 'libgtk3-nocsd.so.0' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_64/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
ERROR: ld.so: object '/home/xrogaan/.local/share/Steam/ubuntu12_32/gameoverlayrenderer.so' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS32): ignored.
Godot Engine v3.5.2.stable.custom_build.170ba337a - https://godotengine.org
OpenGL ES 3.0 Renderer: AMD Radeon RX 570 Series (polaris10, LLVM 15.0.6, DRM 3.52, 6.4.14-x64v3-xanmod1)
Async. shader compilation: ON (full native support)
Shader cache: ON
ERROR: ld.so: object 'libgtk3-nocsd.so.0' from LD_PRELOAD cannot be preloaded (wrong ELF class: ELFCLASS64): ignored.
09/07 09:39:44 Init: Installing breakpad exception handler for appid(gameoverlayui)/version(20230728184426)/tid(7000)
09/07 09:39:44 Init: Installing breakpad exception handler for appid(gameoverlayui)/version(1.0)/tid(7000)
[S_API] SteamAPI_Init(): Loaded '/home/xrogaan/.local/share/Steam/linux64/steamclient.so' OK.
Setting breakpad minidump AppID = 846030
SteamInternal_SetMinidumpSteamID: Caching Steam ID: 76561197999039343 [API loaded no]
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'overlay_toggled': 'Node(AchievementSteam.gd)::_overlay': Method expected 1 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'overlay_toggled': 'Node(AchievementSteam.gd)::_overlay': Method expected 1 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Error calling method from signal 'leaderboard_score_uploaded': 'Node(AchievementSteam.gd)::leaderboardUpdated': Method expected 6 arguments, but called with 3..
at: emit_signal (core/object.cpp:1242)
ERROR: Condition "_first != nullptr" is true.
at: ~List (./core/self_list.h:108)
WARNING: ObjectDB instances leaked at exit (run with --verbose for details).
at: cleanup (core/object.cpp:2070)
ERROR: Resources still in use at exit (run with --verbose for details).
at: clear (core/resource.cpp:417)
ERROR: There are still MemoryPool allocs in use at exit!
at: cleanup (core/pool_vector.cpp:63)
Game 846030 created interface STEAMUSERSTATS_INTERFACE_VERSION012 /
Game 846030 created interface SteamController008 /
Game 846030 created interface SteamFriends017 /
Game 846030 created interface SteamInput006 /
Game 846030 created interface SteamUser023 /
Game 846030 created interface SteamUser023 / User
Game 846030 created interface SteamUtils010 /
Game 846030 method call count for IClientUserStats::GetNumberOfCurrentPlayers : 70
Game 846030 method call count for IClientUserStats::UploadLeaderboardScore : 35
Game 846030 method call count for IClientUserStats::FindLeaderboard : 7
Game 846030 method call count for IClientUserStats::IndicateAchievementProgress : 3
Game 846030 method call count for IClientUserStats::SetAchievement : 38
Game 846030 method call count for IClientUserStats::GetAchievement : 84
Game 846030 method call count for IClientUserStats::StoreStats : 45
Game 846030 method call count for IClientUserStats::SetStat : 6
Game 846030 method call count for IClientUserStats::RequestCurrentStats : 1
Game 846030 method call count for IClientUtils::RecordSteamInterfaceCreation : 9
Game 846030 method call count for IClientUtils::SetOverlayNotificationInset : 1
Game 846030 method call count for IClientUtils::SetOverlayNotificationPosition : 1
Game 846030 method call count for IClientUtils::GetAPICallResult : 84
Game 846030 method call count for IClientUtils::GetAppID : 12
Game 846030 method call count for IClientFriends::SetRichPresence : 11
Game 846030 method call count for IClientUser::GetSteamID : 1
Game 846030 method call count for IClientUser::BLoggedOn : 1
Uploaded AppInterfaceStats to Steam
```
| non_priority | steam overlay error calling method from signal leaderboard score uploaded your system information steam client version build number or date steam version steam client build date fri jul utc steam web build date sat jul utc steam api version distribution e g ubuntu devuan daedalus equivalent to debian bookworm opted into steam client beta no have you checked for system updates yes steam logs gpu amd please describe your issue in as much detail as possible playing results in errors being written in the xsession errors file unsure if it is at software exit or when i open the steam overlay bin sh c home xrogaan local share steam reaper steamlaunch appid home xrogaan local share steam steam launch wrapper mnt games xrogaan steamlibrary steamapps common dv rings of saturn delta v error ld so object home xrogaan local share steam gameoverlayrenderer so from ld preload cannot be preloaded wrong elf class ignored error ld so object nocsd so from ld preload cannot be preloaded wrong elf class ignored error ld so object home xrogaan local share steam gameoverlayrenderer so from ld preload cannot be preloaded wrong elf class ignored error ld so object home xrogaan local share steam gameoverlayrenderer so from ld preload cannot be preloaded wrong elf class ignored error ld so object home xrogaan local share steam gameoverlayrenderer so from ld preload cannot be preloaded wrong elf class ignored godot engine stable custom build opengl es renderer amd radeon rx series llvm drm async shader compilation on full native support shader cache on error ld so object nocsd so from ld preload cannot be preloaded wrong elf class ignored init installing breakpad exception handler for appid gameoverlayui version tid init installing breakpad exception handler for appid gameoverlayui version tid steamapi init loaded home xrogaan local share steam steamclient so ok setting breakpad minidump appid steaminternal setminidumpsteamid caching steam id error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error error calling method from signal overlay toggled node achievementsteam gd overlay method expected arguments but called with at emit signal core object cpp error error calling method from signal overlay toggled node achievementsteam gd overlay method expected arguments but called with at emit signal core object cpp error error calling method from signal leaderboard score uploaded node achievementsteam gd leaderboardupdated method expected arguments but called with at emit signal core object cpp error condition first nullptr is true at list core self list h warning objectdb instances leaked at exit run with verbose for details at cleanup core object cpp error resources still in use at exit run with verbose for details at clear core resource cpp error there are still memorypool allocs in use at exit at cleanup core pool vector cpp game created interface steamuserstats interface game created interface game created interface game created interface game created interface game created interface user game created interface game method call count for iclientuserstats getnumberofcurrentplayers game method call count for iclientuserstats uploadleaderboardscore game method call count for iclientuserstats findleaderboard game method call count for iclientuserstats indicateachievementprogress game method call count for iclientuserstats setachievement game method call count for iclientuserstats getachievement game method call count for iclientuserstats storestats game method call count for iclientuserstats setstat game method call count for iclientuserstats requestcurrentstats game method call count for iclientutils recordsteaminterfacecreation game method call count for iclientutils setoverlaynotificationinset game method call count for iclientutils setoverlaynotificationposition game method call count for iclientutils getapicallresult game method call count for iclientutils getappid game method call count for iclientfriends setrichpresence game method call count for iclientuser getsteamid game method call count for iclientuser bloggedon uploaded appinterfacestats to steam | 0 |
413,400 | 27,950,644,270 | IssuesEvent | 2023-03-24 08:34:25 | nonebot/nonebot2 | https://api.github.com/repos/nonebot/nonebot2 | closed | Docs: NoneBot2文档改进计划 | documentation help wanted | # NoneBot2文档改进计划
Related: #3 ~~#372~~
## 描述问题或主题
NoneBot2文档由于一些原因~~主要是我们语文太菜~~,它的撰写方法存在各种问题,对新手的理解和使用造成了困难。
我们在这里希望对NoneBot现有的文档结构作出一点改进。
但是这不是我们几位开发者能够完成的。
我们都是普通人,在完成学习和工作之余维护项目代码和文档,实在感觉有些分身乏术。
**我们衷心希望,看到这个issue的每一个人,都为这个文档,作出一份自己的贡献。**
**而一份好的文档,需要你们每个人的帮助。**
<details>
<summary>不太正经的话</summary>
- 我写这么多,要是没人来做我好尴尬啊……
- 
- ~~来贡献文档,领NoneBot周边~~这个我得问问RC……也没决定要做啥
</details>
## 需作出的修改
> 我在这里提供一个列表,包含了我个人在阅读文档过程中发现的一些问题
大家可以在Issue下方补充自己的见解,我会加到下面的这个列表中
如果各位看到这里面的一些问题自己有能力解决,可以向我们提交PR进行修改。
* [ ] 更新文档中的所有asciinema示例
* [x] 在文档开篇介绍NoneBot的组成部分(Adapter,Driver,Plugin...)
- 这部分不用特别详细,因为进阶会详细讲事件处理流程这里
* [x] 在安装方式一节给出最推荐的一种
* [x] 添加一个使用Conda作为虚拟环境管理工具使用nb-cli的教程
- 因为它在各种平台上算是比较好装的,也比较适合nb-cli的操作需要
- 是不是应该把给只使用插件的用户的教程放在这里?
* [x] 把使用脚手架移到教程一节,将教程以脚手架创建的项目结构为核心展开
* [x] 引导式教程,分步骤,第一步创建项目,第二部选择驱动器/注册适配器 这样的
* [x] 创建插件一步从脚手架命令开始,讲解创建插件的文件结构,引入Python包的概念
* [x] 简化加载插件一节,将各种加载插件方式移动到API参考部分
- 加一条警告,不要随便动`bot.py`,除非你知道你在干啥
* [x] 详细化定义插件配置一节,加几个常见字段类型的示例,并且告诉开发者,插件配置应该从哪载入,什么时候实例化
- 结合脚手架创建的文件结构(`config.py`)进行讲解
* [x] 定义事件响应器部分,应该先解释会话的概念
* [x] 权限控制这里可以直接说,为了可复用的控制一个事件能否被响应,我们提供了两种解决方案,然后打个表格做对比
* [x] 创建事件响应器,这个地方给例子比较好(比如教用户自己写个echo?),然后具体有哪些扔API文档
* [x] 定义事件处理流程,把`got`和`receive`位置换一下,最好给一个例子做对比
* [x] 获取上下文信息这一步可以开始提及简单的依赖注入了,给个例子,说明一些依赖是怎样声明的
- 具体有哪些依赖就不用报菜名了,直接扔API文档链接
* [x] 删除事件响应器操作一节,补全API相关部分,直接扔链接
* [x] 优化插件示例一节,按照上面的步骤,构建一个插件应该被打散成了很多步,这里需要给所有文件做个总结,然后可以提一些高阶的东西
* [x] 移动自定义日志一节到进阶,因为开发入门似乎用不到
* [x] 将钩子函数一节和进阶首页工作原理篇合并,在讲解工作原理的时候标示出各个钩子的运行时机,给个API文档链接即可
* [x] 跨插件访问,加上直接`import`这一种方法,讲明什么时候该`require`,什么时候直接`import`就行
* [x] 权限控制,这个地方想要表达的本质就是`PERMISSION`是一个`(bot,event)->Awaitable[bool]`,可以改一下表述方式
* [x] 移动发布插件到进阶最后,让用户在发布插件前就对NoneBot有一个完整的了解
* [x] 删除定时任务的从NoneBot v1迁移一节
* [x] 尝试修改`scheduler`插件为可以直接import的版本
* [ ] 添加可执行示例
如果对以上部分有任何疑问,也可以在官方交流群里面直接联系我们
---
**最后,在这里感谢你们对NoneBot社区作出的贡献!** | 1.0 | Docs: NoneBot2文档改进计划 - # NoneBot2文档改进计划
Related: #3 ~~#372~~
## 描述问题或主题
NoneBot2文档由于一些原因~~主要是我们语文太菜~~,它的撰写方法存在各种问题,对新手的理解和使用造成了困难。
我们在这里希望对NoneBot现有的文档结构作出一点改进。
但是这不是我们几位开发者能够完成的。
我们都是普通人,在完成学习和工作之余维护项目代码和文档,实在感觉有些分身乏术。
**我们衷心希望,看到这个issue的每一个人,都为这个文档,作出一份自己的贡献。**
**而一份好的文档,需要你们每个人的帮助。**
<details>
<summary>不太正经的话</summary>
- 我写这么多,要是没人来做我好尴尬啊……
- 
- ~~来贡献文档,领NoneBot周边~~这个我得问问RC……也没决定要做啥
</details>
## 需作出的修改
> 我在这里提供一个列表,包含了我个人在阅读文档过程中发现的一些问题
大家可以在Issue下方补充自己的见解,我会加到下面的这个列表中
如果各位看到这里面的一些问题自己有能力解决,可以向我们提交PR进行修改。
* [ ] 更新文档中的所有asciinema示例
* [x] 在文档开篇介绍NoneBot的组成部分(Adapter,Driver,Plugin...)
- 这部分不用特别详细,因为进阶会详细讲事件处理流程这里
* [x] 在安装方式一节给出最推荐的一种
* [x] 添加一个使用Conda作为虚拟环境管理工具使用nb-cli的教程
- 因为它在各种平台上算是比较好装的,也比较适合nb-cli的操作需要
- 是不是应该把给只使用插件的用户的教程放在这里?
* [x] 把使用脚手架移到教程一节,将教程以脚手架创建的项目结构为核心展开
* [x] 引导式教程,分步骤,第一步创建项目,第二部选择驱动器/注册适配器 这样的
* [x] 创建插件一步从脚手架命令开始,讲解创建插件的文件结构,引入Python包的概念
* [x] 简化加载插件一节,将各种加载插件方式移动到API参考部分
- 加一条警告,不要随便动`bot.py`,除非你知道你在干啥
* [x] 详细化定义插件配置一节,加几个常见字段类型的示例,并且告诉开发者,插件配置应该从哪载入,什么时候实例化
- 结合脚手架创建的文件结构(`config.py`)进行讲解
* [x] 定义事件响应器部分,应该先解释会话的概念
* [x] 权限控制这里可以直接说,为了可复用的控制一个事件能否被响应,我们提供了两种解决方案,然后打个表格做对比
* [x] 创建事件响应器,这个地方给例子比较好(比如教用户自己写个echo?),然后具体有哪些扔API文档
* [x] 定义事件处理流程,把`got`和`receive`位置换一下,最好给一个例子做对比
* [x] 获取上下文信息这一步可以开始提及简单的依赖注入了,给个例子,说明一些依赖是怎样声明的
- 具体有哪些依赖就不用报菜名了,直接扔API文档链接
* [x] 删除事件响应器操作一节,补全API相关部分,直接扔链接
* [x] 优化插件示例一节,按照上面的步骤,构建一个插件应该被打散成了很多步,这里需要给所有文件做个总结,然后可以提一些高阶的东西
* [x] 移动自定义日志一节到进阶,因为开发入门似乎用不到
* [x] 将钩子函数一节和进阶首页工作原理篇合并,在讲解工作原理的时候标示出各个钩子的运行时机,给个API文档链接即可
* [x] 跨插件访问,加上直接`import`这一种方法,讲明什么时候该`require`,什么时候直接`import`就行
* [x] 权限控制,这个地方想要表达的本质就是`PERMISSION`是一个`(bot,event)->Awaitable[bool]`,可以改一下表述方式
* [x] 移动发布插件到进阶最后,让用户在发布插件前就对NoneBot有一个完整的了解
* [x] 删除定时任务的从NoneBot v1迁移一节
* [x] 尝试修改`scheduler`插件为可以直接import的版本
* [ ] 添加可执行示例
如果对以上部分有任何疑问,也可以在官方交流群里面直接联系我们
---
**最后,在这里感谢你们对NoneBot社区作出的贡献!** | non_priority | docs related 描述问题或主题 主要是我们语文太菜 ,它的撰写方法存在各种问题,对新手的理解和使用造成了困难。 我们在这里希望对nonebot现有的文档结构作出一点改进。 但是这不是我们几位开发者能够完成的。 我们都是普通人,在完成学习和工作之余维护项目代码和文档,实在感觉有些分身乏术。 我们衷心希望,看到这个issue的每一个人,都为这个文档,作出一份自己的贡献。 而一份好的文档,需要你们每个人的帮助。 不太正经的话 我写这么多,要是没人来做我好尴尬啊…… 来贡献文档,领nonebot周边 这个我得问问rc……也没决定要做啥 需作出的修改 我在这里提供一个列表,包含了我个人在阅读文档过程中发现的一些问题 大家可以在issue下方补充自己的见解,我会加到下面的这个列表中 如果各位看到这里面的一些问题自己有能力解决,可以向我们提交pr进行修改。 更新文档中的所有asciinema示例 在文档开篇介绍nonebot的组成部分(adapter,driver,plugin ) 这部分不用特别详细,因为进阶会详细讲事件处理流程这里 在安装方式一节给出最推荐的一种 添加一个使用conda作为虚拟环境管理工具使用nb cli的教程 因为它在各种平台上算是比较好装的,也比较适合nb cli的操作需要 是不是应该把给只使用插件的用户的教程放在这里? 把使用脚手架移到教程一节,将教程以脚手架创建的项目结构为核心展开 引导式教程,分步骤,第一步创建项目,第二部选择驱动器 注册适配器 这样的 创建插件一步从脚手架命令开始,讲解创建插件的文件结构,引入python包的概念 简化加载插件一节,将各种加载插件方式移动到api参考部分 加一条警告,不要随便动 bot py ,除非你知道你在干啥 详细化定义插件配置一节,加几个常见字段类型的示例,并且告诉开发者,插件配置应该从哪载入,什么时候实例化 结合脚手架创建的文件结构 config py 进行讲解 定义事件响应器部分,应该先解释会话的概念 权限控制这里可以直接说,为了可复用的控制一个事件能否被响应,我们提供了两种解决方案,然后打个表格做对比 创建事件响应器,这个地方给例子比较好(比如教用户自己写个echo?),然后具体有哪些扔api文档 定义事件处理流程,把 got 和 receive 位置换一下,最好给一个例子做对比 获取上下文信息这一步可以开始提及简单的依赖注入了,给个例子,说明一些依赖是怎样声明的 具体有哪些依赖就不用报菜名了,直接扔api文档链接 删除事件响应器操作一节,补全api相关部分,直接扔链接 优化插件示例一节,按照上面的步骤,构建一个插件应该被打散成了很多步,这里需要给所有文件做个总结,然后可以提一些高阶的东西 移动自定义日志一节到进阶,因为开发入门似乎用不到 将钩子函数一节和进阶首页工作原理篇合并,在讲解工作原理的时候标示出各个钩子的运行时机,给个api文档链接即可 跨插件访问,加上直接 import 这一种方法,讲明什么时候该 require ,什么时候直接 import 就行 权限控制,这个地方想要表达的本质就是 permission 是一个 bot event awaitable ,可以改一下表述方式 移动发布插件到进阶最后,让用户在发布插件前就对nonebot有一个完整的了解 删除定时任务的从nonebot 尝试修改 scheduler 插件为可以直接import的版本 添加可执行示例 如果对以上部分有任何疑问,也可以在官方交流群里面直接联系我们 最后,在这里感谢你们对nonebot社区作出的贡献! | 0 |
116,466 | 11,913,593,251 | IssuesEvent | 2020-03-31 12:16:42 | workarea-commerce/workarea | https://api.github.com/repos/workarea-commerce/workarea | closed | Feedback for "Fulfillment SKUs" doc | documentation | Feedback for "Fulfillment SKUs" (/articles/fulfillment-skus.html):
I find a typo on your documentation page https://developer.workarea.com/articles/fulfillment-skus.html#custom-fulfillment-policies

Thanks 😄 | 1.0 | Feedback for "Fulfillment SKUs" doc - Feedback for "Fulfillment SKUs" (/articles/fulfillment-skus.html):
I find a typo on your documentation page https://developer.workarea.com/articles/fulfillment-skus.html#custom-fulfillment-policies

Thanks 😄 | non_priority | feedback for fulfillment skus doc feedback for fulfillment skus articles fulfillment skus html i find a typo on your documentation page thanks 😄 | 0 |
141,349 | 12,965,560,589 | IssuesEvent | 2020-07-20 22:38:21 | near/near-indexer-for-wallet | https://api.github.com/repos/near/near-indexer-for-wallet | opened | Extend README with some initial information | documentation enhancement | * Express the use-case of the project
* Add NEAR Indexer link
* Provide build instructions (or reference to a relevant NEAR Indexer section if that is the same) | 1.0 | Extend README with some initial information - * Express the use-case of the project
* Add NEAR Indexer link
* Provide build instructions (or reference to a relevant NEAR Indexer section if that is the same) | non_priority | extend readme with some initial information express the use case of the project add near indexer link provide build instructions or reference to a relevant near indexer section if that is the same | 0 |
155,785 | 24,518,440,878 | IssuesEvent | 2022-10-11 07:39:18 | JokeNetwork/faq | https://api.github.com/repos/JokeNetwork/faq | closed | Change CSS to Primer | DESIGN no-issue-activity | ## Proposed changes
Since the project is mainly design to look like a GitHub page, we should use [Primer](https://github.com/primer/css) in the future. | 1.0 | Change CSS to Primer - ## Proposed changes
Since the project is mainly design to look like a GitHub page, we should use [Primer](https://github.com/primer/css) in the future. | non_priority | change css to primer proposed changes since the project is mainly design to look like a github page we should use in the future | 0 |
121,029 | 17,644,551,853 | IssuesEvent | 2021-08-20 02:44:46 | Killy85/game_ai_trainer | https://api.github.com/repos/Killy85/game_ai_trainer | opened | CVE-2021-29555 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl | security vulnerability | ## CVE-2021-29555 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.FusedBatchNorm`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/828f346274841fa7505f7020e88ca36c22e557ab/tensorflow/core/kernels/fused_batch_norm_op.cc#L295-L297) performs a division based on the last dimension of the `x` tensor. Since this is controlled by the user, an attacker can trigger a denial of service. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
<p>Publish Date: 2021-05-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29555>CVE-2021-29555</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq</a></p>
<p>Release Date: 2021-05-14</p>
<p>Fix Resolution: tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-29555 (Medium) detected in tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl - ## CVE-2021-29555 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</b></p></summary>
<p>TensorFlow is an open source machine learning framework for everyone.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl">https://files.pythonhosted.org/packages/d2/ea/ab2c8c0e81bd051cc1180b104c75a865ab0fc66c89be992c4b20bbf6d624/tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl</a></p>
<p>
Dependency Hierarchy:
- :x: **tensorflow-1.13.1-cp27-cp27mu-manylinux1_x86_64.whl** (Vulnerable Library)
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a denial of service via a FPE runtime error in `tf.raw_ops.FusedBatchNorm`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/828f346274841fa7505f7020e88ca36c22e557ab/tensorflow/core/kernels/fused_batch_norm_op.cc#L295-L297) performs a division based on the last dimension of the `x` tensor. Since this is controlled by the user, an attacker can trigger a denial of service. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
<p>Publish Date: 2021-05-14
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-29555>CVE-2021-29555</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>5.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq">https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r35g-4525-29fq</a></p>
<p>Release Date: 2021-05-14</p>
<p>Fix Resolution: tensorflow - 2.5.0, tensorflow-cpu - 2.5.0, tensorflow-gpu - 2.5.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in tensorflow whl cve medium severity vulnerability vulnerable library tensorflow whl tensorflow is an open source machine learning framework for everyone library home page a href dependency hierarchy x tensorflow whl vulnerable library vulnerability details tensorflow is an end to end open source platform for machine learning an attacker can cause a denial of service via a fpe runtime error in tf raw ops fusedbatchnorm this is because the implementation performs a division based on the last dimension of the x tensor since this is controlled by the user an attacker can trigger a denial of service the fix will be included in tensorflow we will also cherrypick this commit on tensorflow tensorflow tensorflow and tensorflow as these are also affected and still in supported range publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution tensorflow tensorflow cpu tensorflow gpu step up your open source security game with whitesource | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.