Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1 value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3 values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16 values | text_combine stringlengths 96 262k | label stringclasses 2 values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
13,891 | 3,785,480,687 | IssuesEvent | 2016-03-20 14:58:24 | gregorio-project/gregorio | https://api.github.com/repos/gregorio-project/gregorio | closed | gresetinitiallines{2} broken? | documentation enhancement question TeX | Compiling this document:
```tex
\documentclass[11pt]{article} % use larger type; default would be 10pt
\usepackage{fontspec}
\usepackage{graphicx} % support the \includegraphics command and options
\usepackage{geometry} % See geometry.pdf to learn the layout options. There are lots.
\geometry{a5paper} % or letterpaper (US) or a5paper or....
\usepackage[]{gregoriotex} % for gregorio score inclusion
\usepackage{libertine} % Decent (free) font for Gregorian, but should be changed if you have high standards
\gresetinitiallines{2}
\begin{document}
\gregorioscore[a]{PopulusSion}
\end{document}
```
with the PopulusSion.gabc from `examples/`, I get this weird warning:
```
Package GregorioTeX Warning: biginitial style is deprecated, but the old
(GregorioTeX) behavior will be used since deprecated usage is
(GregorioTeX) currently enabled. This behavior will disappear
(GregorioTeX) in 5.0, so consider disabling deprecated usage
(GregorioTeX) and switching to the initial style instead. (See
(GregorioTeX) UPGRADE.md for more information) on input line 19.
```
and this wrong output (even after several compilations):

I there something I'm doing wrong?
| 1.0 | gresetinitiallines{2} broken? - Compiling this document:
```tex
\documentclass[11pt]{article} % use larger type; default would be 10pt
\usepackage{fontspec}
\usepackage{graphicx} % support the \includegraphics command and options
\usepackage{geometry} % See geometry.pdf to learn the layout options. There are lots.
\geometry{a5paper} % or letterpaper (US) or a5paper or....
\usepackage[]{gregoriotex} % for gregorio score inclusion
\usepackage{libertine} % Decent (free) font for Gregorian, but should be changed if you have high standards
\gresetinitiallines{2}
\begin{document}
\gregorioscore[a]{PopulusSion}
\end{document}
```
with the PopulusSion.gabc from `examples/`, I get this weird warning:
```
Package GregorioTeX Warning: biginitial style is deprecated, but the old
(GregorioTeX) behavior will be used since deprecated usage is
(GregorioTeX) currently enabled. This behavior will disappear
(GregorioTeX) in 5.0, so consider disabling deprecated usage
(GregorioTeX) and switching to the initial style instead. (See
(GregorioTeX) UPGRADE.md for more information) on input line 19.
```
and this wrong output (even after several compilations):

I there something I'm doing wrong?
| non_priority | gresetinitiallines broken compiling this document tex documentclass article use larger type default would be usepackage fontspec usepackage graphicx support the includegraphics command and options usepackage geometry see geometry pdf to learn the layout options there are lots geometry or letterpaper us or or usepackage gregoriotex for gregorio score inclusion usepackage libertine decent free font for gregorian but should be changed if you have high standards gresetinitiallines begin document gregorioscore populussion end document with the populussion gabc from examples i get this weird warning package gregoriotex warning biginitial style is deprecated but the old gregoriotex behavior will be used since deprecated usage is gregoriotex currently enabled this behavior will disappear gregoriotex in so consider disabling deprecated usage gregoriotex and switching to the initial style instead see gregoriotex upgrade md for more information on input line and this wrong output even after several compilations i there something i m doing wrong | 0 |
203,733 | 23,180,334,924 | IssuesEvent | 2022-08-01 01:01:32 | Mary-Clb/PROJET6_PIQUANTE | https://api.github.com/repos/Mary-Clb/PROJET6_PIQUANTE | opened | bcrypt-5.0.1.tgz: 1 vulnerabilities (highest severity is: 6.1) | security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcrypt-5.0.1.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /tmp/ws-scm/Marie_Bressy_P6_14072021/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/Marie_Bressy_P6_14072021/node_modules/node-fetch/package.json</p>
<p>
</details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2022-0235](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | node-fetch-2.6.1.tgz | Transitive | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-0235</summary>
### Vulnerable Library - <b>node-fetch-2.6.1.tgz</b></p>
<p>A light-weight module that brings window.fetch to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/Marie_Bressy_P6_14072021/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/Marie_Bressy_P6_14072021/node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- bcrypt-5.0.1.tgz (Root Library)
- node-pre-gyp-1.0.5.tgz
- :x: **node-fetch-2.6.1.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
<p>Publish Date: 2022-01-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235>CVE-2022-0235</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a></p>
<p>Release Date: 2022-01-16</p>
<p>Fix Resolution: node-fetch - 2.6.7,3.1.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | True | bcrypt-5.0.1.tgz: 1 vulnerabilities (highest severity is: 6.1) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcrypt-5.0.1.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /tmp/ws-scm/Marie_Bressy_P6_14072021/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/Marie_Bressy_P6_14072021/node_modules/node-fetch/package.json</p>
<p>
</details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | --- | --- |
| [CVE-2022-0235](https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.1 | node-fetch-2.6.1.tgz | Transitive | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2022-0235</summary>
### Vulnerable Library - <b>node-fetch-2.6.1.tgz</b></p>
<p>A light-weight module that brings window.fetch to node.js</p>
<p>Library home page: <a href="https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz">https://registry.npmjs.org/node-fetch/-/node-fetch-2.6.1.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/Marie_Bressy_P6_14072021/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/Marie_Bressy_P6_14072021/node_modules/node-fetch/package.json</p>
<p>
Dependency Hierarchy:
- bcrypt-5.0.1.tgz (Root Library)
- node-pre-gyp-1.0.5.tgz
- :x: **node-fetch-2.6.1.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
node-fetch is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor
<p>Publish Date: 2022-01-16
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2022-0235>CVE-2022-0235</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.1</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/advisories/GHSA-r683-j2x4-v87g">https://github.com/advisories/GHSA-r683-j2x4-v87g</a></p>
<p>Release Date: 2022-01-16</p>
<p>Fix Resolution: node-fetch - 2.6.7,3.1.1</p>
</p>
<p></p>
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
</details> | non_priority | bcrypt tgz vulnerabilities highest severity is vulnerable library bcrypt tgz path to dependency file tmp ws scm marie bressy package json path to vulnerable library tmp ws scm marie bressy node modules node fetch package json vulnerabilities cve severity cvss dependency type fixed in remediation available medium node fetch tgz transitive n a details cve vulnerable library node fetch tgz a light weight module that brings window fetch to node js library home page a href path to dependency file tmp ws scm marie bressy package json path to vulnerable library tmp ws scm marie bressy node modules node fetch package json dependency hierarchy bcrypt tgz root library node pre gyp tgz x node fetch tgz vulnerable library found in base branch master vulnerability details node fetch is vulnerable to exposure of sensitive information to an unauthorized actor publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution node fetch step up your open source security game with mend | 0 |
242,788 | 7,846,839,065 | IssuesEvent | 2018-06-19 16:33:26 | inverse-inc/packetfence | https://api.github.com/repos/inverse-inc/packetfence | closed | Services: bin/pfcmd service pf status/restart not working | Priority: Critical Type: Bug | [root@testing-c7 pf]# rpm -qa packetfence
packetfence-8.0.9-0.201806181250.el7.noarch
If I want to do the status it gives me that error:
````
[root@testing-c7 pf]# bin/pfcmd service pf status
Service Status PID
packetfence-api-frontend.service stopped 0
packetfence-config.service started 12052
packetfence-etcd.service stopped 0
packetfence-fingerbank-collector.service stopped 0
packetfence-haproxy-db.service stopped 0
packetfence-httpd.aaa.service stopped 0
packetfence-httpd.admin.service stopped 0
packetfence-httpd.dispatcher.service stopped 0
packetfence-httpd.parking.service stopped 0
packetfence-httpd.portal.service stopped 0
packetfence-httpd.webservices.service stopped 0
packetfence-iptables.service stopped 0
packetfence-mariadb.service started 678
packetfence-netdata.service stopped 0
packetfence-pfdhcp.service stopped 0
packetfence-pfdhcplistener.service stopped 0
packetfence-pfdns.service stopped 0
packetfence-pffilter.service stopped 0
packetfence-pfipset.service stopped 0
packetfence-pfmon.service stopped 0
packetfence-pfperl-api.service stopped 0
packetfence-pfqueue.service stopped 0
packetfence-pfsso.service stopped 0
packetfence-pfstats.service stopped 0
packetfence-radiusd-acct.service stopped 0
packetfence-radiusd-auth.service stopped 0
Can't call method "pid" on an undefined value at /usr/local/pf/lib/pf/services/manager/pf.pm line 110.
````
| 1.0 | Services: bin/pfcmd service pf status/restart not working - [root@testing-c7 pf]# rpm -qa packetfence
packetfence-8.0.9-0.201806181250.el7.noarch
If I want to do the status it gives me that error:
````
[root@testing-c7 pf]# bin/pfcmd service pf status
Service Status PID
packetfence-api-frontend.service stopped 0
packetfence-config.service started 12052
packetfence-etcd.service stopped 0
packetfence-fingerbank-collector.service stopped 0
packetfence-haproxy-db.service stopped 0
packetfence-httpd.aaa.service stopped 0
packetfence-httpd.admin.service stopped 0
packetfence-httpd.dispatcher.service stopped 0
packetfence-httpd.parking.service stopped 0
packetfence-httpd.portal.service stopped 0
packetfence-httpd.webservices.service stopped 0
packetfence-iptables.service stopped 0
packetfence-mariadb.service started 678
packetfence-netdata.service stopped 0
packetfence-pfdhcp.service stopped 0
packetfence-pfdhcplistener.service stopped 0
packetfence-pfdns.service stopped 0
packetfence-pffilter.service stopped 0
packetfence-pfipset.service stopped 0
packetfence-pfmon.service stopped 0
packetfence-pfperl-api.service stopped 0
packetfence-pfqueue.service stopped 0
packetfence-pfsso.service stopped 0
packetfence-pfstats.service stopped 0
packetfence-radiusd-acct.service stopped 0
packetfence-radiusd-auth.service stopped 0
Can't call method "pid" on an undefined value at /usr/local/pf/lib/pf/services/manager/pf.pm line 110.
````
| priority | services bin pfcmd service pf status restart not working rpm qa packetfence packetfence noarch if i want to do the status it gives me that error bin pfcmd service pf status service status pid packetfence api frontend service stopped packetfence config service started packetfence etcd service stopped packetfence fingerbank collector service stopped packetfence haproxy db service stopped packetfence httpd aaa service stopped packetfence httpd admin service stopped packetfence httpd dispatcher service stopped packetfence httpd parking service stopped packetfence httpd portal service stopped packetfence httpd webservices service stopped packetfence iptables service stopped packetfence mariadb service started packetfence netdata service stopped packetfence pfdhcp service stopped packetfence pfdhcplistener service stopped packetfence pfdns service stopped packetfence pffilter service stopped packetfence pfipset service stopped packetfence pfmon service stopped packetfence pfperl api service stopped packetfence pfqueue service stopped packetfence pfsso service stopped packetfence pfstats service stopped packetfence radiusd acct service stopped packetfence radiusd auth service stopped can t call method pid on an undefined value at usr local pf lib pf services manager pf pm line | 1 |
21,130 | 3,684,029,720 | IssuesEvent | 2016-02-24 16:03:15 | pydata/pandas | https://api.github.com/repos/pydata/pandas | closed | Arithmetic by DataFrame index | API Design Docs Indexing | I encountered a problem with doing any arythmetic from index, in other words, when a index is time (datetime64) and i would like to count something by it, i have no other option than to assign it to some column in dataframe object.
import pandas as pd
```
import pandas as pd
rng = pd.date_range('1/1/2011', periods=4, freq='H')
ts = pd.Series(rng, index=rng)
print "Data:"
print ts
print "\nSubstraction from column"
print ts-ts[0]
print "\nIndex to column"
ts['lol']=ts.index
print ts['lol']-ts['lol'][0]
print "\nSubstraction by index"
df = ts.index
print df-df[0]
```
result:
```
Data:
2011-01-01 00:00:00 2011-01-01 00:00:00
2011-01-01 01:00:00 2011-01-01 01:00:00
2011-01-01 02:00:00 2011-01-01 02:00:00
2011-01-01 03:00:00 2011-01-01 03:00:00
Freq: H, dtype: datetime64[ns]
Substraction from column
2011-01-01 00:00:00 00:00:00
2011-01-01 01:00:00 01:00:00
2011-01-01 02:00:00 02:00:00
2011-01-01 03:00:00 03:00:00
Freq: H, dtype: timedelta64[ns]
Index to column
lol 00:00:00
lol 01:00:00
lol 02:00:00
lol 03:00:00
dtype: timedelta64[ns]
Substraction by index
---------------------------------------------------------------------------
TypeError Traceback (most recent call last)
<ipython-input-146-5a8539747b5a> in <module>()
13 print "\nSubstraction by index"
14 df = ts.index
---> 15 print df-df[0]
16
C:\winpy\WinPython-64bit-2.7.6.4\python-2.7.6.amd64\lib\site-packages\pandas\core\index.pyc in __sub__(self, other)
853
854 def __sub__(self, other):
--> 855 return self.diff(other)
856
857 def __and__(self, other):
C:\winpy\WinPython-64bit-2.7.6.4\python-2.7.6.amd64\lib\site-packages\pandas\core\index.pyc in diff(self, other)
981
982 if not hasattr(other, '__iter__'):
--> 983 raise TypeError('Input must be iterable!')
984
985 if self.equals(other):
TypeError: Input must be iterable!
```
Maybe it's just conceptional problem, but if i want to make something with date index i have to keep additional column (with the same values as index!).
When it comes to huge datasets this can be a problem, because i have to store the same thing twice, or make additional column for calculations, which is not better.
P.S. pd.show_versions():
```
INSTALLED VERSIONS
------------------
commit: None
python: 2.7.6.final.0
python-bits: 64
OS: Windows
OS-release: 7
machine: AMD64
processor: Intel64 Family 6 Model 37 Stepping 2, GenuineIntel
byteorder: little
LC_ALL: None
LANG: None
pandas: 0.13.1
Cython: 0.20.1
numpy: 1.8.1
scipy: 0.13.3
statsmodels: 0.5.0
IPython: 2.0.0
sphinx: 1.2.2
patsy: 0.2.1
scikits.timeseries: None
dateutil: 2.2
pytz: 2013.9
bottleneck: None
tables: 3.1.1
numexpr: 2.3.1
matplotlib: 1.3.1
openpyxl: None
xlrd: 0.9.3
xlwt: 0.7.5
xlsxwriter: None
sqlalchemy: 0.9.4
lxml: None
bs4: None
html5lib: None
bq: None
apiclient: None
``` | 1.0 | Arithmetic by DataFrame index - I encountered a problem with doing any arythmetic from index, in other words, when a index is time (datetime64) and i would like to count something by it, i have no other option than to assign it to some column in dataframe object.
import pandas as pd
```
import pandas as pd
rng = pd.date_range('1/1/2011', periods=4, freq='H')
ts = pd.Series(rng, index=rng)
print "Data:"
print ts
print "\nSubstraction from column"
print ts-ts[0]
print "\nIndex to column"
ts['lol']=ts.index
print ts['lol']-ts['lol'][0]
print "\nSubstraction by index"
df = ts.index
print df-df[0]
```
result:
```
Data:
2011-01-01 00:00:00 2011-01-01 00:00:00
2011-01-01 01:00:00 2011-01-01 01:00:00
2011-01-01 02:00:00 2011-01-01 02:00:00
2011-01-01 03:00:00 2011-01-01 03:00:00
Freq: H, dtype: datetime64[ns]
Substraction from column
2011-01-01 00:00:00 00:00:00
2011-01-01 01:00:00 01:00:00
2011-01-01 02:00:00 02:00:00
2011-01-01 03:00:00 03:00:00
Freq: H, dtype: timedelta64[ns]
Index to column
lol 00:00:00
lol 01:00:00
lol 02:00:00
lol 03:00:00
dtype: timedelta64[ns]
Substraction by index
---------------------------------------------------------------------------
TypeError Traceback (most recent call last)
<ipython-input-146-5a8539747b5a> in <module>()
13 print "\nSubstraction by index"
14 df = ts.index
---> 15 print df-df[0]
16
C:\winpy\WinPython-64bit-2.7.6.4\python-2.7.6.amd64\lib\site-packages\pandas\core\index.pyc in __sub__(self, other)
853
854 def __sub__(self, other):
--> 855 return self.diff(other)
856
857 def __and__(self, other):
C:\winpy\WinPython-64bit-2.7.6.4\python-2.7.6.amd64\lib\site-packages\pandas\core\index.pyc in diff(self, other)
981
982 if not hasattr(other, '__iter__'):
--> 983 raise TypeError('Input must be iterable!')
984
985 if self.equals(other):
TypeError: Input must be iterable!
```
Maybe it's just conceptional problem, but if i want to make something with date index i have to keep additional column (with the same values as index!).
When it comes to huge datasets this can be a problem, because i have to store the same thing twice, or make additional column for calculations, which is not better.
P.S. pd.show_versions():
```
INSTALLED VERSIONS
------------------
commit: None
python: 2.7.6.final.0
python-bits: 64
OS: Windows
OS-release: 7
machine: AMD64
processor: Intel64 Family 6 Model 37 Stepping 2, GenuineIntel
byteorder: little
LC_ALL: None
LANG: None
pandas: 0.13.1
Cython: 0.20.1
numpy: 1.8.1
scipy: 0.13.3
statsmodels: 0.5.0
IPython: 2.0.0
sphinx: 1.2.2
patsy: 0.2.1
scikits.timeseries: None
dateutil: 2.2
pytz: 2013.9
bottleneck: None
tables: 3.1.1
numexpr: 2.3.1
matplotlib: 1.3.1
openpyxl: None
xlrd: 0.9.3
xlwt: 0.7.5
xlsxwriter: None
sqlalchemy: 0.9.4
lxml: None
bs4: None
html5lib: None
bq: None
apiclient: None
``` | non_priority | arithmetic by dataframe index i encountered a problem with doing any arythmetic from index in other words when a index is time and i would like to count something by it i have no other option than to assign it to some column in dataframe object import pandas as pd import pandas as pd rng pd date range periods freq h ts pd series rng index rng print data print ts print nsubstraction from column print ts ts print nindex to column ts ts index print ts ts print nsubstraction by index df ts index print df df result data freq h dtype substraction from column freq h dtype index to column lol lol lol lol dtype substraction by index typeerror traceback most recent call last in print nsubstraction by index df ts index print df df c winpy winpython python lib site packages pandas core index pyc in sub self other def sub self other return self diff other def and self other c winpy winpython python lib site packages pandas core index pyc in diff self other if not hasattr other iter raise typeerror input must be iterable if self equals other typeerror input must be iterable maybe it s just conceptional problem but if i want to make something with date index i have to keep additional column with the same values as index when it comes to huge datasets this can be a problem because i have to store the same thing twice or make additional column for calculations which is not better p s pd show versions installed versions commit none python final python bits os windows os release machine processor family model stepping genuineintel byteorder little lc all none lang none pandas cython numpy scipy statsmodels ipython sphinx patsy scikits timeseries none dateutil pytz bottleneck none tables numexpr matplotlib openpyxl none xlrd xlwt xlsxwriter none sqlalchemy lxml none none none bq none apiclient none | 0 |
206,765 | 23,396,891,043 | IssuesEvent | 2022-08-12 01:20:50 | valdisiljuconoks/TechFellow.ScheduledJobOverview | https://api.github.com/repos/valdisiljuconoks/TechFellow.ScheduledJobOverview | closed | CVE-2014-4075 (Medium) detected in microsoft.aspnet.mvc.4.0.20710.nupkg - autoclosed | security vulnerability | ## CVE-2014-4075 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>microsoft.aspnet.mvc.4.0.20710.nupkg</b></p></summary>
<p>This package contains the runtime assemblies for ASP.NET MVC. ASP.NET MVC gives you a powerful, patt...</p>
<p>Library home page: <a href="https://api.nuget.org/packages/microsoft.aspnet.mvc.4.0.20710.nupkg">https://api.nuget.org/packages/microsoft.aspnet.mvc.4.0.20710.nupkg</a></p>
<p>Path to dependency file: TechFellow.ScheduledJobOverview/src/ScheduledJobOverview/ScheduledJobOverview.csproj</p>
<p>Path to vulnerable library: .aspnet.mvc/4.0.20710/microsoft.aspnet.mvc.4.0.20710.nupkg</p>
<p>
Dependency Hierarchy:
- :x: **microsoft.aspnet.mvc.4.0.20710.nupkg** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valdisiljuconoks/TechFellow.ScheduledJobOverview/commit/387fe69f797ece7bd0719a495881d4318c905bc0">387fe69f797ece7bd0719a495881d4318c905bc0</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Cross-site scripting (XSS) vulnerability in System.Web.Mvc.dll in Microsoft ASP.NET Model View Controller (MVC) 2.0 through 5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted web page, aka "MVC XSS Vulnerability."
<p>Publish Date: 2014-10-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-4075>CVE-2014-4075</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-059#mvc-xss-vulnerability---cve-2014-4075">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-059#mvc-xss-vulnerability---cve-2014-4075</a></p>
<p>Release Date: 2014-10-15</p>
<p>Fix Resolution: Microsoft.AspNet.Mvc - 3.0.50813.1 ,4.0.40804.0 ,5.0.2, 5.1.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2014-4075 (Medium) detected in microsoft.aspnet.mvc.4.0.20710.nupkg - autoclosed - ## CVE-2014-4075 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>microsoft.aspnet.mvc.4.0.20710.nupkg</b></p></summary>
<p>This package contains the runtime assemblies for ASP.NET MVC. ASP.NET MVC gives you a powerful, patt...</p>
<p>Library home page: <a href="https://api.nuget.org/packages/microsoft.aspnet.mvc.4.0.20710.nupkg">https://api.nuget.org/packages/microsoft.aspnet.mvc.4.0.20710.nupkg</a></p>
<p>Path to dependency file: TechFellow.ScheduledJobOverview/src/ScheduledJobOverview/ScheduledJobOverview.csproj</p>
<p>Path to vulnerable library: .aspnet.mvc/4.0.20710/microsoft.aspnet.mvc.4.0.20710.nupkg</p>
<p>
Dependency Hierarchy:
- :x: **microsoft.aspnet.mvc.4.0.20710.nupkg** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/valdisiljuconoks/TechFellow.ScheduledJobOverview/commit/387fe69f797ece7bd0719a495881d4318c905bc0">387fe69f797ece7bd0719a495881d4318c905bc0</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Cross-site scripting (XSS) vulnerability in System.Web.Mvc.dll in Microsoft ASP.NET Model View Controller (MVC) 2.0 through 5.1 allows remote attackers to inject arbitrary web script or HTML via a crafted web page, aka "MVC XSS Vulnerability."
<p>Publish Date: 2014-10-15
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2014-4075>CVE-2014-4075</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 2 Score Details (<b>4.3</b>)</summary>
<p>
Base Score Metrics not available</p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-059#mvc-xss-vulnerability---cve-2014-4075">https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-059#mvc-xss-vulnerability---cve-2014-4075</a></p>
<p>Release Date: 2014-10-15</p>
<p>Fix Resolution: Microsoft.AspNet.Mvc - 3.0.50813.1 ,4.0.40804.0 ,5.0.2, 5.1.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in microsoft aspnet mvc nupkg autoclosed cve medium severity vulnerability vulnerable library microsoft aspnet mvc nupkg this package contains the runtime assemblies for asp net mvc asp net mvc gives you a powerful patt library home page a href path to dependency file techfellow scheduledjoboverview src scheduledjoboverview scheduledjoboverview csproj path to vulnerable library aspnet mvc microsoft aspnet mvc nupkg dependency hierarchy x microsoft aspnet mvc nupkg vulnerable library found in head commit a href vulnerability details cross site scripting xss vulnerability in system web mvc dll in microsoft asp net model view controller mvc through allows remote attackers to inject arbitrary web script or html via a crafted web page aka mvc xss vulnerability publish date url a href cvss score details base score metrics not available suggested fix type upgrade version origin a href release date fix resolution microsoft aspnet mvc step up your open source security game with whitesource | 0 |
414,049 | 12,097,899,085 | IssuesEvent | 2020-04-20 09:24:02 | StrangeLoopGames/EcoIssues | https://api.github.com/repos/StrangeLoopGames/EcoIssues | closed | [master-preview] Hard to build blocks at top. | Priority: High Status: Fixed Week Task | To build ladder you need to point top:

In 8.3.0 you need to point upper stage:

I tried to build stairs but it placed to wrong position:

| 1.0 | [master-preview] Hard to build blocks at top. - To build ladder you need to point top:

In 8.3.0 you need to point upper stage:

I tried to build stairs but it placed to wrong position:

| priority | hard to build blocks at top to build ladder you need to point top in you need to point upper stage i tried to build stairs but it placed to wrong position | 1 |
18,489 | 2,615,172,101 | IssuesEvent | 2015-03-01 06:54:06 | chrsmith/html5rocks | https://api.github.com/repos/chrsmith/html5rocks | closed | WebGL articles by gman | auto-migrated Milestone-Q12012 New Priority-P2 Tutorial Type-Bug | ```
They're great
```
Original issue reported on code.google.com by `ericbidelman@chromium.org` on 23 Jan 2012 at 5:31 | 1.0 | WebGL articles by gman - ```
They're great
```
Original issue reported on code.google.com by `ericbidelman@chromium.org` on 23 Jan 2012 at 5:31 | priority | webgl articles by gman they re great original issue reported on code google com by ericbidelman chromium org on jan at | 1 |
109,708 | 16,888,439,373 | IssuesEvent | 2021-06-23 05:50:16 | mukul-seagate11/cortx-s3server | https://api.github.com/repos/mukul-seagate11/cortx-s3server | opened | WS-2019-0379 (Medium) detected in commons-codec-1.10.jar | security vulnerability | ## WS-2019-0379 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary>
<p>The Apache Commons Codec package contains simple encoder and decoders for
various formats such as Base64 and Hexadecimal. In addition to these
widely used encoders and decoders, the codec package also maintains a
collection of phonetic encoding utilities.</p>
<p>Path to dependency file: cortx-s3server/auth/server/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p>
<p>
Dependency Hierarchy:
- :x: **commons-codec-1.10.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/mukul-seagate11/cortx-s3server/commits/ff136feab513e79a47a878df287759ddb3e6d1ed">ff136feab513e79a47a878df287759ddb3e6d1ed</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.
<p>Publish Date: 2019-05-20
<p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p>
<p>Release Date: 2019-05-20</p>
<p>Fix Resolution: commons-codec:commons-codec:1.13</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | WS-2019-0379 (Medium) detected in commons-codec-1.10.jar - ## WS-2019-0379 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>commons-codec-1.10.jar</b></p></summary>
<p>The Apache Commons Codec package contains simple encoder and decoders for
various formats such as Base64 and Hexadecimal. In addition to these
widely used encoders and decoders, the codec package also maintains a
collection of phonetic encoding utilities.</p>
<p>Path to dependency file: cortx-s3server/auth/server/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/commons-codec/commons-codec/1.10/commons-codec-1.10.jar</p>
<p>
Dependency Hierarchy:
- :x: **commons-codec-1.10.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/mukul-seagate11/cortx-s3server/commits/ff136feab513e79a47a878df287759ddb3e6d1ed">ff136feab513e79a47a878df287759ddb3e6d1ed</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Apache commons-codec before version “commons-codec-1.13-RC1” is vulnerable to information disclosure due to Improper Input validation.
<p>Publish Date: 2019-05-20
<p>URL: <a href=https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113>WS-2019-0379</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113">https://github.com/apache/commons-codec/commit/48b615756d1d770091ea3322eefc08011ee8b113</a></p>
<p>Release Date: 2019-05-20</p>
<p>Fix Resolution: commons-codec:commons-codec:1.13</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | ws medium detected in commons codec jar ws medium severity vulnerability vulnerable library commons codec jar the apache commons codec package contains simple encoder and decoders for various formats such as and hexadecimal in addition to these widely used encoders and decoders the codec package also maintains a collection of phonetic encoding utilities path to dependency file cortx auth server pom xml path to vulnerable library canner repository commons codec commons codec commons codec jar dependency hierarchy x commons codec jar vulnerable library found in head commit a href found in base branch main vulnerability details apache commons codec before version “commons codec ” is vulnerable to information disclosure due to improper input validation publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution commons codec commons codec step up your open source security game with whitesource | 0 |
252,979 | 19,086,859,977 | IssuesEvent | 2021-11-29 07:31:24 | clusternet/clusternet | https://api.github.com/repos/clusternet/clusternet | closed | roadmap adbout clusternet? | kind/documentation | <!-- Please only use this template for submitting enhancement requests
-->
#### What would you like to be added:
#### Why is this needed:
Want to know the roadmap of this project, for example, including cross-cluster service discovery. | 1.0 | roadmap adbout clusternet? - <!-- Please only use this template for submitting enhancement requests
-->
#### What would you like to be added:
#### Why is this needed:
Want to know the roadmap of this project, for example, including cross-cluster service discovery. | non_priority | roadmap adbout clusternet please only use this template for submitting enhancement requests what would you like to be added why is this needed want to know the roadmap of this project for example including cross cluster service discovery | 0 |
233,336 | 7,696,751,354 | IssuesEvent | 2018-05-18 16:17:32 | dondi/GRNsight | https://api.github.com/repos/dondi/GRNsight | closed | Adding the Fall 2017 BIOL/CMSI-367 gene backpages to GRNSight | functionality priority 0 review requested | I would like to begin the process of cleaning up the Biological Databases Web API project and merging it to GRNSight. Below is a preliminary checklist, to be changed as more information arises.
- [x] Fixing any bugs associated with the project.
- [x] ESLinting the Code
- [x] Merging it to the GRNSight.
Here are the API Sources:
https://github.com/dondi/GRNsight/wiki/Web-API-Sources | 1.0 | Adding the Fall 2017 BIOL/CMSI-367 gene backpages to GRNSight - I would like to begin the process of cleaning up the Biological Databases Web API project and merging it to GRNSight. Below is a preliminary checklist, to be changed as more information arises.
- [x] Fixing any bugs associated with the project.
- [x] ESLinting the Code
- [x] Merging it to the GRNSight.
Here are the API Sources:
https://github.com/dondi/GRNsight/wiki/Web-API-Sources | priority | adding the fall biol cmsi gene backpages to grnsight i would like to begin the process of cleaning up the biological databases web api project and merging it to grnsight below is a preliminary checklist to be changed as more information arises fixing any bugs associated with the project eslinting the code merging it to the grnsight here are the api sources | 1 |
72,453 | 19,269,617,084 | IssuesEvent | 2021-12-10 02:30:48 | JaydenDev/freecat | https://api.github.com/repos/JaydenDev/freecat | closed | Binaries don't work | bug build installer | # Command-line output:
<!-- Copy and paste everything from your terminal. Make sure you remove private information. -->
```
C:\Users\hello-smile6\Documents\GitHub\freecat>npm run make
> freecat@1.0.0 make
> electron-forge make
✔ Checking your system
✔ Resolving Forge Config
We need to package your application before we can make it
✔ Preparing to Package Application for arch: x64
✔ Preparing native dependencies
✔ Packaging Application
Making for the following targets: squirrel
✔ Making for target: squirrel - On platform: win32 - For arch: x64
```
# OS and dependency versions:
## Windows:
```
Microsoft Windows [Version 10.0.19042.985]
```
## Node:
```
v16.13.1
```
## NPM:
```
8.1.2
```
<!-- Put some info about your device setup. -->
# Other information
## Screenshot

<!-- Anything else? -->
| 1.0 | Binaries don't work - # Command-line output:
<!-- Copy and paste everything from your terminal. Make sure you remove private information. -->
```
C:\Users\hello-smile6\Documents\GitHub\freecat>npm run make
> freecat@1.0.0 make
> electron-forge make
✔ Checking your system
✔ Resolving Forge Config
We need to package your application before we can make it
✔ Preparing to Package Application for arch: x64
✔ Preparing native dependencies
✔ Packaging Application
Making for the following targets: squirrel
✔ Making for target: squirrel - On platform: win32 - For arch: x64
```
# OS and dependency versions:
## Windows:
```
Microsoft Windows [Version 10.0.19042.985]
```
## Node:
```
v16.13.1
```
## NPM:
```
8.1.2
```
<!-- Put some info about your device setup. -->
# Other information
## Screenshot

<!-- Anything else? -->
| non_priority | binaries don t work command line output c users hello documents github freecat npm run make freecat make electron forge make ✔ checking your system ✔ resolving forge config we need to package your application before we can make it ✔ preparing to package application for arch ✔ preparing native dependencies ✔ packaging application making for the following targets squirrel ✔ making for target squirrel on platform for arch os and dependency versions windows microsoft windows node npm other information screenshot | 0 |
745,361 | 25,980,987,793 | IssuesEvent | 2022-12-19 18:49:13 | group2-cs321/AMS-COLBY | https://api.github.com/repos/group2-cs321/AMS-COLBY | closed | As a superadmin I want to have the option to create multiple users and teams by uploading a CSV file | Medium priority | Should take around 3hs | 1.0 | As a superadmin I want to have the option to create multiple users and teams by uploading a CSV file - Should take around 3hs | priority | as a superadmin i want to have the option to create multiple users and teams by uploading a csv file should take around | 1 |
111,079 | 17,009,704,465 | IssuesEvent | 2021-07-02 01:09:30 | tamirdahan/keycloak | https://api.github.com/repos/tamirdahan/keycloak | opened | CVE-2020-27216 (High) detected in jetty-webapp-9.2.4.v20141103.jar | security vulnerability | ## CVE-2020-27216 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-webapp-9.2.4.v20141103.jar</b></p></summary>
<p>Jetty web application support</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: keycloak/adapters/oidc/spring-boot/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/org/eclipse/jetty/jetty-webapp/9.2.4.v20141103/jetty-webapp-9.2.4.v20141103.jar,canner/.m2/repository/org/eclipse/jetty/jetty-webapp/9.2.4.v20141103/jetty-webapp-9.2.4.v20141103.jar,canner/.m2/repository/org/eclipse/jetty/jetty-webapp/9.2.4.v20141103/jetty-webapp-9.2.4.v20141103.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-webapp-9.2.4.v20141103.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
<p>Publish Date: 2020-10-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27216>CVE-2020-27216</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921">https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921</a></p>
<p>Release Date: 2020-10-20</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-runner:9.4.33,10.0.0.beta3,11.0.0.beta3;org.eclipse.jetty:jetty-webapp:9.4.33,10.0.0.beta3,11.0.0.beta3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-webapp","packageVersion":"9.2.4.v20141103","packageFilePaths":["/adapters/oidc/spring-boot/pom.xml","/adapters/oidc/spring-boot-adapter-core/pom.xml","/adapters/oidc/spring-boot2/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.eclipse.jetty:jetty-webapp:9.2.4.v20141103","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-runner:9.4.33,10.0.0.beta3,11.0.0.beta3;org.eclipse.jetty:jetty-webapp:9.4.33,10.0.0.beta3,11.0.0.beta3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-27216","vulnerabilityDetails":"In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system\u0027s temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27216","cvss3Severity":"high","cvss3Score":"7.0","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}}</REMEDIATE> --> | True | CVE-2020-27216 (High) detected in jetty-webapp-9.2.4.v20141103.jar - ## CVE-2020-27216 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>jetty-webapp-9.2.4.v20141103.jar</b></p></summary>
<p>Jetty web application support</p>
<p>Library home page: <a href="http://www.eclipse.org/jetty">http://www.eclipse.org/jetty</a></p>
<p>Path to dependency file: keycloak/adapters/oidc/spring-boot/pom.xml</p>
<p>Path to vulnerable library: canner/.m2/repository/org/eclipse/jetty/jetty-webapp/9.2.4.v20141103/jetty-webapp-9.2.4.v20141103.jar,canner/.m2/repository/org/eclipse/jetty/jetty-webapp/9.2.4.v20141103/jetty-webapp-9.2.4.v20141103.jar,canner/.m2/repository/org/eclipse/jetty/jetty-webapp/9.2.4.v20141103/jetty-webapp-9.2.4.v20141103.jar</p>
<p>
Dependency Hierarchy:
- :x: **jetty-webapp-9.2.4.v20141103.jar** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system's temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.
<p>Publish Date: 2020-10-23
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27216>CVE-2020-27216</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921">https://bugs.eclipse.org/bugs/show_bug.cgi?id=567921</a></p>
<p>Release Date: 2020-10-20</p>
<p>Fix Resolution: org.eclipse.jetty:jetty-runner:9.4.33,10.0.0.beta3,11.0.0.beta3;org.eclipse.jetty:jetty-webapp:9.4.33,10.0.0.beta3,11.0.0.beta3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":false,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.eclipse.jetty","packageName":"jetty-webapp","packageVersion":"9.2.4.v20141103","packageFilePaths":["/adapters/oidc/spring-boot/pom.xml","/adapters/oidc/spring-boot-adapter-core/pom.xml","/adapters/oidc/spring-boot2/pom.xml"],"isTransitiveDependency":false,"dependencyTree":"org.eclipse.jetty:jetty-webapp:9.2.4.v20141103","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.eclipse.jetty:jetty-runner:9.4.33,10.0.0.beta3,11.0.0.beta3;org.eclipse.jetty:jetty-webapp:9.4.33,10.0.0.beta3,11.0.0.beta3"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2020-27216","vulnerabilityDetails":"In Eclipse Jetty versions 1.0 thru 9.4.32.v20200930, 10.0.0.alpha1 thru 10.0.0.beta2, and 11.0.0.alpha1 thru 11.0.0.beta2O, on Unix like systems, the system\u0027s temporary directory is shared between all users on that system. A collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory. If the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications, including their WEB-INF/lib jar files and JSP files. If any code is ever executed out of this temporary directory, this can lead to a local privilege escalation vulnerability.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-27216","cvss3Severity":"high","cvss3Score":"7.0","cvss3Metrics":{"A":"High","AC":"High","PR":"Low","S":"Unchanged","C":"High","UI":"None","AV":"Local","I":"High"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in jetty webapp jar cve high severity vulnerability vulnerable library jetty webapp jar jetty web application support library home page a href path to dependency file keycloak adapters oidc spring boot pom xml path to vulnerable library canner repository org eclipse jetty jetty webapp jetty webapp jar canner repository org eclipse jetty jetty webapp jetty webapp jar canner repository org eclipse jetty jetty webapp jetty webapp jar dependency hierarchy x jetty webapp jar vulnerable library found in base branch master vulnerability details in eclipse jetty versions thru thru and thru on unix like systems the system s temporary directory is shared between all users on that system a collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory if the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications including their web inf lib jar files and jsp files if any code is ever executed out of this temporary directory this can lead to a local privilege escalation vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org eclipse jetty jetty runner org eclipse jetty jetty webapp isopenpronvulnerability false ispackagebased true isdefaultbranch true packages istransitivedependency false dependencytree org eclipse jetty jetty webapp isminimumfixversionavailable true minimumfixversion org eclipse jetty jetty runner org eclipse jetty jetty webapp basebranches vulnerabilityidentifier cve vulnerabilitydetails in eclipse jetty versions thru thru and thru on unix like systems the system temporary directory is shared between all users on that system a collocated user can observe the process of creating a temporary sub directory in the shared temporary directory and race to complete the creation of the temporary subdirectory if the attacker wins the race then they will have read and write permission to the subdirectory used to unpack web applications including their web inf lib jar files and jsp files if any code is ever executed out of this temporary directory this can lead to a local privilege escalation vulnerability vulnerabilityurl | 0 |
27,369 | 6,845,441,992 | IssuesEvent | 2017-11-13 08:16:04 | loicteixeira/gj-unity-api | https://api.github.com/repos/loicteixeira/gj-unity-api | closed | Add logic to support secret trophies | backlog code enhancement UI | The API does not return whether a trophy is secret. Add a list of secret trophy ids to compare against when generating the trophy window.
| 1.0 | Add logic to support secret trophies - The API does not return whether a trophy is secret. Add a list of secret trophy ids to compare against when generating the trophy window.
| non_priority | add logic to support secret trophies the api does not return whether a trophy is secret add a list of secret trophy ids to compare against when generating the trophy window | 0 |
818,715 | 30,701,273,138 | IssuesEvent | 2023-07-26 23:48:50 | marbl/HG002-issues | https://api.github.com/repos/marbl/HG002-issues | closed | Issue: chr8_MATERNAL:133911700-133911700 | priority shortread_homnonref element_evidence sbb_evidence correction_applied | ### Assembly Region
chr8_MATERNAL:133911700-133911700
### Assembly Version
v0.7
### DeepVariant Call
chr8_MATERNAL 133911700 . G GAT 20.8 PASS . GT:GQ:DP:AD:VAF:PL 1/1:10:13:0,13:1:20,10,0 | 1.0 | Issue: chr8_MATERNAL:133911700-133911700 - ### Assembly Region
chr8_MATERNAL:133911700-133911700
### Assembly Version
v0.7
### DeepVariant Call
chr8_MATERNAL 133911700 . G GAT 20.8 PASS . GT:GQ:DP:AD:VAF:PL 1/1:10:13:0,13:1:20,10,0 | priority | issue maternal assembly region maternal assembly version deepvariant call maternal g gat pass gt gq dp ad vaf pl | 1 |
82,054 | 15,839,292,623 | IssuesEvent | 2021-04-07 00:29:43 | mhutchie/vscode-git-graph | https://api.github.com/repos/mhutchie/vscode-git-graph | closed | Diff views are not shown on first click with wrapTabs = true | vscode-bug | When having "workbench.editor.wrapTabs" : true and the width of the window is so that it would need an additional tab line when the windows is activated because of the menu bar symbols need some more place, the diff view in the side only loads the diff on the second click on the same file.
Better to have a look at the screencast. First normal behaviour is shown then I resize the window as mentioned.

| 1.0 | Diff views are not shown on first click with wrapTabs = true - When having "workbench.editor.wrapTabs" : true and the width of the window is so that it would need an additional tab line when the windows is activated because of the menu bar symbols need some more place, the diff view in the side only loads the diff on the second click on the same file.
Better to have a look at the screencast. First normal behaviour is shown then I resize the window as mentioned.

| non_priority | diff views are not shown on first click with wraptabs true when having workbench editor wraptabs true and the width of the window is so that it would need an additional tab line when the windows is activated because of the menu bar symbols need some more place the diff view in the side only loads the diff on the second click on the same file better to have a look at the screencast first normal behaviour is shown then i resize the window as mentioned | 0 |
160,587 | 20,112,492,908 | IssuesEvent | 2022-02-07 16:15:50 | PGreaneyLYIT/easybuggy4django | https://api.github.com/repos/PGreaneyLYIT/easybuggy4django | opened | CVE-2016-7401 (High) detected in Django-2.0.3-py3-none-any.whl | security vulnerability | ## CVE-2016-7401 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-2.0.3-py3-none-any.whl</b></p></summary>
<p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/3d/81/7e6cf5cb6f0f333946b5d3ee22e17c3c3f329d3bfeb86943a2a3cd861092/Django-2.0.3-py3-none-any.whl">https://files.pythonhosted.org/packages/3d/81/7e6cf5cb6f0f333946b5d3ee22e17c3c3f329d3bfeb86943a2a3cd861092/Django-2.0.3-py3-none-any.whl</a></p>
<p>Path to dependency file: /requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **Django-2.0.3-py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/PGreaneyLYIT/easybuggy4django/commit/b59c4b8048ca845666388c0c0145a5f28a5187a1">b59c4b8048ca845666388c0c0145a5f28a5187a1</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
<p>Publish Date: 2016-10-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-7401>CVE-2016-7401</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">https://nvd.nist.gov/vuln/detail/CVE-2016-7401</a></p>
<p>Release Date: 2016-10-03</p>
<p>Fix Resolution: 1.8.15,1.9.10</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2016-7401 (High) detected in Django-2.0.3-py3-none-any.whl - ## CVE-2016-7401 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>Django-2.0.3-py3-none-any.whl</b></p></summary>
<p>A high-level Python Web framework that encourages rapid development and clean, pragmatic design.</p>
<p>Library home page: <a href="https://files.pythonhosted.org/packages/3d/81/7e6cf5cb6f0f333946b5d3ee22e17c3c3f329d3bfeb86943a2a3cd861092/Django-2.0.3-py3-none-any.whl">https://files.pythonhosted.org/packages/3d/81/7e6cf5cb6f0f333946b5d3ee22e17c3c3f329d3bfeb86943a2a3cd861092/Django-2.0.3-py3-none-any.whl</a></p>
<p>Path to dependency file: /requirements.txt</p>
<p>Path to vulnerable library: /requirements.txt</p>
<p>
Dependency Hierarchy:
- :x: **Django-2.0.3-py3-none-any.whl** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/PGreaneyLYIT/easybuggy4django/commit/b59c4b8048ca845666388c0c0145a5f28a5187a1">b59c4b8048ca845666388c0c0145a5f28a5187a1</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The cookie parsing code in Django before 1.8.15 and 1.9.x before 1.9.10, when used on a site with Google Analytics, allows remote attackers to bypass an intended CSRF protection mechanism by setting arbitrary cookies.
<p>Publish Date: 2016-10-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2016-7401>CVE-2016-7401</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nvd.nist.gov/vuln/detail/CVE-2016-7401">https://nvd.nist.gov/vuln/detail/CVE-2016-7401</a></p>
<p>Release Date: 2016-10-03</p>
<p>Fix Resolution: 1.8.15,1.9.10</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in django none any whl cve high severity vulnerability vulnerable library django none any whl a high level python web framework that encourages rapid development and clean pragmatic design library home page a href path to dependency file requirements txt path to vulnerable library requirements txt dependency hierarchy x django none any whl vulnerable library found in head commit a href found in base branch master vulnerability details the cookie parsing code in django before and x before when used on a site with google analytics allows remote attackers to bypass an intended csrf protection mechanism by setting arbitrary cookies publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
314,659 | 9,601,099,031 | IssuesEvent | 2019-05-10 11:10:15 | pufexi/multiorder | https://api.github.com/repos/pufexi/multiorder | opened | Doplnit stav zasob do Expedice objednavek | high priority | Viz obrazek nize, doplnit kolik je prave skladem, casto se nam stava, ze neco nestihneme vypnout (je na druhem sklade) a holky nevedi zda to tady je a hledaji to ci preklikavaji do Sklady, takze v tom zobrazeni pro expedici tj. objednakvy ?filter=1-1 ?filter=1-2 ?filter=1-3 a ?filter=4 aby se dozobrazilo kolik je prave skladem toho produktu (rezervace se neberou v potaz, proste kolik je skladem)

| 1.0 | Doplnit stav zasob do Expedice objednavek - Viz obrazek nize, doplnit kolik je prave skladem, casto se nam stava, ze neco nestihneme vypnout (je na druhem sklade) a holky nevedi zda to tady je a hledaji to ci preklikavaji do Sklady, takze v tom zobrazeni pro expedici tj. objednakvy ?filter=1-1 ?filter=1-2 ?filter=1-3 a ?filter=4 aby se dozobrazilo kolik je prave skladem toho produktu (rezervace se neberou v potaz, proste kolik je skladem)

| priority | doplnit stav zasob do expedice objednavek viz obrazek nize doplnit kolik je prave skladem casto se nam stava ze neco nestihneme vypnout je na druhem sklade a holky nevedi zda to tady je a hledaji to ci preklikavaji do sklady takze v tom zobrazeni pro expedici tj objednakvy filter filter filter a filter aby se dozobrazilo kolik je prave skladem toho produktu rezervace se neberou v potaz proste kolik je skladem | 1 |
350,894 | 10,510,200,346 | IssuesEvent | 2019-09-27 12:56:00 | MoonSHRD/p2chat-android | https://api.github.com/repos/MoonSHRD/p2chat-android | closed | "who is" | enhancement priority/high | Story: после подписки на новые топики (интересы) и нахождения новых пиров с этими топиками запоминает их и группирует собственно по этим топикам, "пользователей с интересом парк горького" - 9 юзеров. Необходимо перекидывать матчи из p2chat в само приложение, которое вызывает к примеру who_is(user1) - получает собственно matrix профиль и затем это уже отображается на экране | 1.0 | "who is" - Story: после подписки на новые топики (интересы) и нахождения новых пиров с этими топиками запоминает их и группирует собственно по этим топикам, "пользователей с интересом парк горького" - 9 юзеров. Необходимо перекидывать матчи из p2chat в само приложение, которое вызывает к примеру who_is(user1) - получает собственно matrix профиль и затем это уже отображается на экране | priority | who is story после подписки на новые топики интересы и нахождения новых пиров с этими топиками запоминает их и группирует собственно по этим топикам пользователей с интересом парк горького юзеров необходимо перекидывать матчи из в само приложение которое вызывает к примеру who is получает собственно matrix профиль и затем это уже отображается на экране | 1 |
738,684 | 25,572,111,115 | IssuesEvent | 2022-11-30 18:34:39 | developmentseed/osm-teams | https://api.github.com/repos/developmentseed/osm-teams | opened | Improve validation on API endpoints | Type: Enhancement Category: API Priority: High | Some endpoints are using ad-hoc validation (like in [here](https://github.com/developmentseed/osm-teams/blob/96569b05aa0aea12fef16b505bf542f671bae63e/app/manage/teams.js#L384-L393) and [here](https://github.com/developmentseed/osm-teams/blob/15b0f2ff4b4bb68ea5465d34bf1bec49a1a06761/app/manage/organizations.js#L180-L188)) which is not ideal. We should apply a more robust and consistent validation approach to all endpoints like in [here](https://github.com/developmentseed/osm-teams/blob/15b0f2ff4b4bb68ea5465d34bf1bec49a1a06761/app/manage/badges.js#L263-L274).
cc @kamicut | 1.0 | Improve validation on API endpoints - Some endpoints are using ad-hoc validation (like in [here](https://github.com/developmentseed/osm-teams/blob/96569b05aa0aea12fef16b505bf542f671bae63e/app/manage/teams.js#L384-L393) and [here](https://github.com/developmentseed/osm-teams/blob/15b0f2ff4b4bb68ea5465d34bf1bec49a1a06761/app/manage/organizations.js#L180-L188)) which is not ideal. We should apply a more robust and consistent validation approach to all endpoints like in [here](https://github.com/developmentseed/osm-teams/blob/15b0f2ff4b4bb68ea5465d34bf1bec49a1a06761/app/manage/badges.js#L263-L274).
cc @kamicut | priority | improve validation on api endpoints some endpoints are using ad hoc validation like in and which is not ideal we should apply a more robust and consistent validation approach to all endpoints like in cc kamicut | 1 |
211,101 | 23,788,834,155 | IssuesEvent | 2022-09-02 12:47:42 | guardian/amigo | https://api.github.com/repos/guardian/amigo | closed | CVE-2018-14721 (High) detected in jackson-databind-2.7.1.jar, jackson-databind-2.9.5.jar | security vulnerability | ## CVE-2018-14721 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.7.1.jar</b>, <b>jackson-databind-2.9.5.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.7.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.1.jar,canner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.7.1.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.5.jar</p>
<p>
Dependency Hierarchy:
- logstash-logback-encoder-5.1.jar (Root Library)
- :x: **jackson-databind-2.9.5.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/guardian/amigo/commit/42037f878b435e42e9262b44a73ceda0cdcf2a34">42037f878b435e42e9262b44a73ceda0cdcf2a34</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
<p>Publish Date: 2019-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721>CVE-2018-14721</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721</a></p>
<p>Release Date: 2019-01-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2018-14721 (High) detected in jackson-databind-2.7.1.jar, jackson-databind-2.9.5.jar - ## CVE-2018-14721 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>jackson-databind-2.7.1.jar</b>, <b>jackson-databind-2.9.5.jar</b></p></summary>
<p>
<details><summary><b>jackson-databind-2.7.1.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.1.jar,canner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.7.1.jar</p>
<p>
Dependency Hierarchy:
- :x: **jackson-databind-2.7.1.jar** (Vulnerable Library)
</details>
<details><summary><b>jackson-databind-2.9.5.jar</b></p></summary>
<p>General data-binding functionality for Jackson: works on core streaming API</p>
<p>Library home page: <a href="http://github.com/FasterXML/jackson">http://github.com/FasterXML/jackson</a></p>
<p>Path to vulnerable library: /home/wss-scanner/.ivy2/cache/com.fasterxml.jackson.core/jackson-databind/bundles/jackson-databind-2.9.5.jar</p>
<p>
Dependency Hierarchy:
- logstash-logback-encoder-5.1.jar (Root Library)
- :x: **jackson-databind-2.9.5.jar** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/guardian/amigo/commit/42037f878b435e42e9262b44a73ceda0cdcf2a34">42037f878b435e42e9262b44a73ceda0cdcf2a34</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
FasterXML jackson-databind 2.x before 2.9.7 might allow remote attackers to conduct server-side request forgery (SSRF) attacks by leveraging failure to block the axis2-jaxws class from polymorphic deserialization.
<p>Publish Date: 2019-01-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-14721>CVE-2018-14721</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>10.0</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14721</a></p>
<p>Release Date: 2019-01-02</p>
<p>Fix Resolution: com.fasterxml.jackson.core:jackson-databind:2.9.7,2.8.11.3,2.7.9.5,2.6.7.3</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in jackson databind jar jackson databind jar cve high severity vulnerability vulnerable libraries jackson databind jar jackson databind jar jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar canner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy x jackson databind jar vulnerable library jackson databind jar general data binding functionality for jackson works on core streaming api library home page a href path to vulnerable library home wss scanner cache com fasterxml jackson core jackson databind bundles jackson databind jar dependency hierarchy logstash logback encoder jar root library x jackson databind jar vulnerable library found in head commit a href found in base branch main vulnerability details fasterxml jackson databind x before might allow remote attackers to conduct server side request forgery ssrf attacks by leveraging failure to block the jaxws class from polymorphic deserialization publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope changed impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution com fasterxml jackson core jackson databind step up your open source security game with whitesource | 0 |
261,636 | 22,761,551,856 | IssuesEvent | 2022-07-07 21:47:53 | brave/brave-browser | https://api.github.com/repos/brave/brave-browser | closed | Tipping Banner needs better keyboard accessibility - Follow up to 6147 | bug feature/rewards priority/P4 QA/Yes release-notes/include QA/Test-Plan-Specified accessibility | <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description
Found while testing #6147
When you bring up the tip banner (and have enough BAT) the `Send Tip` button is in focus as indicated by the outline on the button. However, if you attempt to tab to choose another amount other than the pre-selected one, you exit the tip banner and there is no way to tab back into the tip banner.
## Steps to Reproduce
<!--Please add a series of steps to reproduce the issue-->
1. Go to a site and open the tip banner.
2. If you have enough BAT for the pre-selected amount, the `Send Tip` button is in focus. If not, tab once so that the `add funds` link is in focus.
3. Tab again.
4. URL bar is now in focus. No matter how many times you select tab, you will never get back into the tip banner.
## Actual result:
Selecting tab from the last tab-selectable item on the tip banner (either `Send Tip` or `add funds`) causes you to exit the tip banner and go to URL bar. Now, you are unable to tab back into the tip banner. You must use a mouse to get back into the tip banner.
## Expected result:
I would expect tab to take me to the first tab selectable item in the banner, I believe this is the X in the circle in the upper right corner.
## Reproduces how often:
easily
## Brave version (brave://version info)
Brave | 1.1.4 Chromium: 78.0.3904.97 (Official Build) beta (64-bit)
-- | --
Revision | 021b9028c246d820be17a10e5b393ee90f41375e-refs/branch-heads/3904@{#859}
OS | macOS Version 10.13.6 (Build 17G5019)
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current release? n/a
- Can you reproduce this issue with the beta channel? yes
- Can you reproduce this issue with the dev channel? yes
- Can you reproduce this issue with the nightly channel? yes
## Other Additional Information:
- Does the issue resolve itself when disabling Brave Shields?
- Does the issue resolve itself when disabling Brave Rewards?
- Is the issue reproducible on the latest version of Chrome?
## Miscellaneous Information:
cc @brave/legacy_qa
cc @mandar-brave @alexwykoff as this relates to tipping efficiency changes
| 1.0 | Tipping Banner needs better keyboard accessibility - Follow up to 6147 - <!-- Have you searched for similar issues? Before submitting this issue, please check the open issues and add a note before logging a new issue.
PLEASE USE THE TEMPLATE BELOW TO PROVIDE INFORMATION ABOUT THE ISSUE.
INSUFFICIENT INFO WILL GET THE ISSUE CLOSED. IT WILL ONLY BE REOPENED AFTER SUFFICIENT INFO IS PROVIDED-->
## Description
Found while testing #6147
When you bring up the tip banner (and have enough BAT) the `Send Tip` button is in focus as indicated by the outline on the button. However, if you attempt to tab to choose another amount other than the pre-selected one, you exit the tip banner and there is no way to tab back into the tip banner.
## Steps to Reproduce
<!--Please add a series of steps to reproduce the issue-->
1. Go to a site and open the tip banner.
2. If you have enough BAT for the pre-selected amount, the `Send Tip` button is in focus. If not, tab once so that the `add funds` link is in focus.
3. Tab again.
4. URL bar is now in focus. No matter how many times you select tab, you will never get back into the tip banner.
## Actual result:
Selecting tab from the last tab-selectable item on the tip banner (either `Send Tip` or `add funds`) causes you to exit the tip banner and go to URL bar. Now, you are unable to tab back into the tip banner. You must use a mouse to get back into the tip banner.
## Expected result:
I would expect tab to take me to the first tab selectable item in the banner, I believe this is the X in the circle in the upper right corner.
## Reproduces how often:
easily
## Brave version (brave://version info)
Brave | 1.1.4 Chromium: 78.0.3904.97 (Official Build) beta (64-bit)
-- | --
Revision | 021b9028c246d820be17a10e5b393ee90f41375e-refs/branch-heads/3904@{#859}
OS | macOS Version 10.13.6 (Build 17G5019)
## Version/Channel Information:
<!--Does this issue happen on any other channels? Or is it specific to a certain channel?-->
- Can you reproduce this issue with the current release? n/a
- Can you reproduce this issue with the beta channel? yes
- Can you reproduce this issue with the dev channel? yes
- Can you reproduce this issue with the nightly channel? yes
## Other Additional Information:
- Does the issue resolve itself when disabling Brave Shields?
- Does the issue resolve itself when disabling Brave Rewards?
- Is the issue reproducible on the latest version of Chrome?
## Miscellaneous Information:
cc @brave/legacy_qa
cc @mandar-brave @alexwykoff as this relates to tipping efficiency changes
| non_priority | tipping banner needs better keyboard accessibility follow up to have you searched for similar issues before submitting this issue please check the open issues and add a note before logging a new issue please use the template below to provide information about the issue insufficient info will get the issue closed it will only be reopened after sufficient info is provided description found while testing when you bring up the tip banner and have enough bat the send tip button is in focus as indicated by the outline on the button however if you attempt to tab to choose another amount other than the pre selected one you exit the tip banner and there is no way to tab back into the tip banner steps to reproduce go to a site and open the tip banner if you have enough bat for the pre selected amount the send tip button is in focus if not tab once so that the add funds link is in focus tab again url bar is now in focus no matter how many times you select tab you will never get back into the tip banner actual result selecting tab from the last tab selectable item on the tip banner either send tip or add funds causes you to exit the tip banner and go to url bar now you are unable to tab back into the tip banner you must use a mouse to get back into the tip banner expected result i would expect tab to take me to the first tab selectable item in the banner i believe this is the x in the circle in the upper right corner reproduces how often easily brave version brave version info brave chromium official build beta bit revision refs branch heads os macos version build version channel information can you reproduce this issue with the current release n a can you reproduce this issue with the beta channel yes can you reproduce this issue with the dev channel yes can you reproduce this issue with the nightly channel yes other additional information does the issue resolve itself when disabling brave shields does the issue resolve itself when disabling brave rewards is the issue reproducible on the latest version of chrome miscellaneous information cc brave legacy qa cc mandar brave alexwykoff as this relates to tipping efficiency changes | 0 |
56,026 | 6,498,853,820 | IssuesEvent | 2017-08-22 19:04:55 | Aubron/scoreshots-templates | https://api.github.com/repos/Aubron/scoreshots-templates | closed | Long-Lost Scheduleshot | Priority: Medium Status: Development Needed Status: Testing Needed |

### Requested by:
Rick, Internal
## Template Description:
This is the scheduling template which sort of vanished off of everyone's radar.
## Dynamic Considerations:
Number of games should be configurable via dropdown from 10, down to (presumably) 2. | 1.0 | Long-Lost Scheduleshot -

### Requested by:
Rick, Internal
## Template Description:
This is the scheduling template which sort of vanished off of everyone's radar.
## Dynamic Considerations:
Number of games should be configurable via dropdown from 10, down to (presumably) 2. | non_priority | long lost scheduleshot requested by rick internal template description this is the scheduling template which sort of vanished off of everyone s radar dynamic considerations number of games should be configurable via dropdown from down to presumably | 0 |
14,175 | 2,791,978,337 | IssuesEvent | 2015-05-10 16:20:17 | numpy/numpy | https://api.github.com/repos/numpy/numpy | reopened | Bug in np.random.dirichlet for small alpha parameters | component: numpy.random Defect | Hi,
I encountered a bug when using np.random.dirichlet with small alpha parameters. Call and traceback are below.
```python
ZeroDivisionError Traceback (most recent call last)
<ipython-input-86-73c2067e20c1> in <module>()
----> 1 np.random.dirichlet([0.0001, 0.0, 0.0001])
mtrand.pyx in mtrand.RandomState.dirichlet (numpy/random/mtrand/mtrand.c:24477)()
mtrand.pyx in mtrand.RandomState.dirichlet (numpy/random/mtrand/mtrand.c:24387)()
ZeroDivisionError: float division
```
I am using numpy-1.9.1.
I believe this is a floating point issue, the distribution has almost all of its mass very close to either (1, 0, 0) or (0, 0, 1) .
The 'float division' error already occurs for larger values<1, e.g. 0.001.
It is likely that this occurs because of the Dirichlet distribution is usually sampled via the Gamma distribution followed by normalization. If all values returned from Gamma sampling are zero than a float division error occurs.
In addition
```python
np.random.beta(0.0001, 0.0001)
```
produces 'nan' most of the time, while it should be alternating 'almost always' between (1, 0) and
(0, 1)
```python scipy.special.betainc(0.0001, 0.0001, 1e-50) = 0.494..```
It might not be able to fix that in the current algorithmic framework but maybe it is possible to discourage/prevent users from supplying too small parameters.
Wow, this wasn't supposed to become such a long post. Thanks to anyone reading/considering this issue.
| 1.0 | Bug in np.random.dirichlet for small alpha parameters - Hi,
I encountered a bug when using np.random.dirichlet with small alpha parameters. Call and traceback are below.
```python
ZeroDivisionError Traceback (most recent call last)
<ipython-input-86-73c2067e20c1> in <module>()
----> 1 np.random.dirichlet([0.0001, 0.0, 0.0001])
mtrand.pyx in mtrand.RandomState.dirichlet (numpy/random/mtrand/mtrand.c:24477)()
mtrand.pyx in mtrand.RandomState.dirichlet (numpy/random/mtrand/mtrand.c:24387)()
ZeroDivisionError: float division
```
I am using numpy-1.9.1.
I believe this is a floating point issue, the distribution has almost all of its mass very close to either (1, 0, 0) or (0, 0, 1) .
The 'float division' error already occurs for larger values<1, e.g. 0.001.
It is likely that this occurs because of the Dirichlet distribution is usually sampled via the Gamma distribution followed by normalization. If all values returned from Gamma sampling are zero than a float division error occurs.
In addition
```python
np.random.beta(0.0001, 0.0001)
```
produces 'nan' most of the time, while it should be alternating 'almost always' between (1, 0) and
(0, 1)
```python scipy.special.betainc(0.0001, 0.0001, 1e-50) = 0.494..```
It might not be able to fix that in the current algorithmic framework but maybe it is possible to discourage/prevent users from supplying too small parameters.
Wow, this wasn't supposed to become such a long post. Thanks to anyone reading/considering this issue.
| non_priority | bug in np random dirichlet for small alpha parameters hi i encountered a bug when using np random dirichlet with small alpha parameters call and traceback are below python zerodivisionerror traceback most recent call last in np random dirichlet mtrand pyx in mtrand randomstate dirichlet numpy random mtrand mtrand c mtrand pyx in mtrand randomstate dirichlet numpy random mtrand mtrand c zerodivisionerror float division i am using numpy i believe this is a floating point issue the distribution has almost all of its mass very close to either or the float division error already occurs for larger values e g it is likely that this occurs because of the dirichlet distribution is usually sampled via the gamma distribution followed by normalization if all values returned from gamma sampling are zero than a float division error occurs in addition python np random beta produces nan most of the time while it should be alternating almost always between and python scipy special betainc it might not be able to fix that in the current algorithmic framework but maybe it is possible to discourage prevent users from supplying too small parameters wow this wasn t supposed to become such a long post thanks to anyone reading considering this issue | 0 |
326,381 | 24,081,594,528 | IssuesEvent | 2022-09-19 07:10:39 | StarLabsm/ForProject | https://api.github.com/repos/StarLabsm/ForProject | closed | feature: test docs | A-documentation A-feature | **Is your feature request related to a problem? Please describe.**
<!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] -->
**Describe the solution you'd like**
<!-- A clear and concise description of what you want to happen. -->
**Describe alternatives you've considered**
<!-- A clear and concise description of any alternative solutions or features you've considered. -->
**Additional context**
<!-- Add any other context or screenshots about the feature request here. -->
| 1.0 | feature: test docs - **Is your feature request related to a problem? Please describe.**
<!-- A clear and concise description of what the problem is. Ex. I'm always frustrated when [...] -->
**Describe the solution you'd like**
<!-- A clear and concise description of what you want to happen. -->
**Describe alternatives you've considered**
<!-- A clear and concise description of any alternative solutions or features you've considered. -->
**Additional context**
<!-- Add any other context or screenshots about the feature request here. -->
| non_priority | feature test docs is your feature request related to a problem please describe describe the solution you d like describe alternatives you ve considered additional context | 0 |
121,370 | 15,894,725,756 | IssuesEvent | 2021-04-11 11:20:21 | ezl/dailyidea.com | https://api.github.com/repos/ezl/dailyidea.com | opened | When trying to "comment attempt by unauth account" do we need a dialogue before posting the idea? | Design Question | Original discussion thread can be found here: #959
Here are the steps (as described by @ezl and edited by myself on step 8):
1. From an unauthenticated account, attempt to post a comment
2. This will result in being asked for an email address to complete posting
3. I entered an EXISTING user email address (my own gmail)
4. I was directed to click the link in my email.
5. I clicked the link
6. I was directed to a waiting page. After it succeeded, the light bulbs turned green and said "going to post"
7. The idea loaded (no confirmation message or streamers/animation)
8. The comment was posted (no dialogue or any information)
My question here would be whether or not we need to add a step between steps 7 and 8 to ask the user whether it's OK to post the comment.
My rationale here is that they're bouncing 2 times between apps:
- They're leaving DailyIdea to their email to authorize
- They're returning back from their email to DI to post
Since their focus went off DI, I think there should be a step in between coming back from email (authorized) and actually posting the comment on the idea. | 1.0 | When trying to "comment attempt by unauth account" do we need a dialogue before posting the idea? - Original discussion thread can be found here: #959
Here are the steps (as described by @ezl and edited by myself on step 8):
1. From an unauthenticated account, attempt to post a comment
2. This will result in being asked for an email address to complete posting
3. I entered an EXISTING user email address (my own gmail)
4. I was directed to click the link in my email.
5. I clicked the link
6. I was directed to a waiting page. After it succeeded, the light bulbs turned green and said "going to post"
7. The idea loaded (no confirmation message or streamers/animation)
8. The comment was posted (no dialogue or any information)
My question here would be whether or not we need to add a step between steps 7 and 8 to ask the user whether it's OK to post the comment.
My rationale here is that they're bouncing 2 times between apps:
- They're leaving DailyIdea to their email to authorize
- They're returning back from their email to DI to post
Since their focus went off DI, I think there should be a step in between coming back from email (authorized) and actually posting the comment on the idea. | non_priority | when trying to comment attempt by unauth account do we need a dialogue before posting the idea original discussion thread can be found here here are the steps as described by ezl and edited by myself on step from an unauthenticated account attempt to post a comment this will result in being asked for an email address to complete posting i entered an existing user email address my own gmail i was directed to click the link in my email i clicked the link i was directed to a waiting page after it succeeded the light bulbs turned green and said going to post the idea loaded no confirmation message or streamers animation the comment was posted no dialogue or any information my question here would be whether or not we need to add a step between steps and to ask the user whether it s ok to post the comment my rationale here is that they re bouncing times between apps they re leaving dailyidea to their email to authorize they re returning back from their email to di to post since their focus went off di i think there should be a step in between coming back from email authorized and actually posting the comment on the idea | 0 |
270,682 | 23,528,940,953 | IssuesEvent | 2022-08-19 13:36:09 | G-Node/WinGIN | https://api.github.com/repos/G-Node/WinGIN | opened | Unable to check out older files | needs testing | The issue was submitted by email: "I am unable to restore a file to a previous version using WinGIN. No older files are being checked out." | 1.0 | Unable to check out older files - The issue was submitted by email: "I am unable to restore a file to a previous version using WinGIN. No older files are being checked out." | non_priority | unable to check out older files the issue was submitted by email i am unable to restore a file to a previous version using wingin no older files are being checked out | 0 |
567,385 | 16,857,481,120 | IssuesEvent | 2021-06-21 08:43:09 | dmwm/WMCore | https://api.github.com/repos/dmwm/WMCore | closed | Change our MySQL driver to stop returning data in the long data type | Feature change Medium Priority WMAgent | **Impact of the new feature**
WMAgent (and T0, but they don't use MySQL)
**Is your feature request related to a problem? Please describe.**
Yes, it's been discussed in this code review comment:
https://github.com/dmwm/WMCore/pull/10605/files#r654225846
in short, `hash()` is no longer reproducible between python2 and python3. So we are investigating the adoption of `hashlib.sha1` (or another algorithm in there) to have reproducible behaviour. One of the issues that we find there is that our python data structure sometimes contain long data type (returned from MariaDB), causing the resulting hash to be different (thus affecting object comparison).
Python2 max integer is very large:
```
(PY2) alannewmacpro:cmsdist amaltaro$ python -c 'import sys; print(sys.maxint)'
9223372036854775807
```
and AFAIK only small enough numbers are currently fetched from MariaDB (run/lumi/event number), maybe some other file/fileset/subscription ids. So it should not be a problem to actually stop casting MariaDB results to Python2 long data type (which is BTW gone in Python3).
**Describe the solution you'd like**
Change the MySQLdb conversion map to stop returning `long` data type, instead `int` should be returned. This is where that map lives:
https://github.com/farcepest/MySQLdb1/blob/MySQLdb-1.2.4b4/MySQLdb/converters.py#L127
According to the documentation, it should be possible to change it while creating the database connection, but I failed to do so with SQLAlchemy:
https://mysqlclient.readthedocs.io/MySQLdb.html#module-MySQLdb.converters
So my suggestion is to actually patch our version of mysqldb (py2-mysqldb.spec) such that it stops casting data to long. This is the most performant approach as well. We are about to stop deploying our services in Python2, so this change won't be there for too long.
**Describe alternatives you've considered**
Cast long to int on our client, but the performance penalty would be significant.
**Additional context**
Related - with further content - to this PR and the GH issues that it's meant to fix: https://github.com/dmwm/WMCore/pull/10605 | 1.0 | Change our MySQL driver to stop returning data in the long data type - **Impact of the new feature**
WMAgent (and T0, but they don't use MySQL)
**Is your feature request related to a problem? Please describe.**
Yes, it's been discussed in this code review comment:
https://github.com/dmwm/WMCore/pull/10605/files#r654225846
in short, `hash()` is no longer reproducible between python2 and python3. So we are investigating the adoption of `hashlib.sha1` (or another algorithm in there) to have reproducible behaviour. One of the issues that we find there is that our python data structure sometimes contain long data type (returned from MariaDB), causing the resulting hash to be different (thus affecting object comparison).
Python2 max integer is very large:
```
(PY2) alannewmacpro:cmsdist amaltaro$ python -c 'import sys; print(sys.maxint)'
9223372036854775807
```
and AFAIK only small enough numbers are currently fetched from MariaDB (run/lumi/event number), maybe some other file/fileset/subscription ids. So it should not be a problem to actually stop casting MariaDB results to Python2 long data type (which is BTW gone in Python3).
**Describe the solution you'd like**
Change the MySQLdb conversion map to stop returning `long` data type, instead `int` should be returned. This is where that map lives:
https://github.com/farcepest/MySQLdb1/blob/MySQLdb-1.2.4b4/MySQLdb/converters.py#L127
According to the documentation, it should be possible to change it while creating the database connection, but I failed to do so with SQLAlchemy:
https://mysqlclient.readthedocs.io/MySQLdb.html#module-MySQLdb.converters
So my suggestion is to actually patch our version of mysqldb (py2-mysqldb.spec) such that it stops casting data to long. This is the most performant approach as well. We are about to stop deploying our services in Python2, so this change won't be there for too long.
**Describe alternatives you've considered**
Cast long to int on our client, but the performance penalty would be significant.
**Additional context**
Related - with further content - to this PR and the GH issues that it's meant to fix: https://github.com/dmwm/WMCore/pull/10605 | priority | change our mysql driver to stop returning data in the long data type impact of the new feature wmagent and but they don t use mysql is your feature request related to a problem please describe yes it s been discussed in this code review comment in short hash is no longer reproducible between and so we are investigating the adoption of hashlib or another algorithm in there to have reproducible behaviour one of the issues that we find there is that our python data structure sometimes contain long data type returned from mariadb causing the resulting hash to be different thus affecting object comparison max integer is very large alannewmacpro cmsdist amaltaro python c import sys print sys maxint and afaik only small enough numbers are currently fetched from mariadb run lumi event number maybe some other file fileset subscription ids so it should not be a problem to actually stop casting mariadb results to long data type which is btw gone in describe the solution you d like change the mysqldb conversion map to stop returning long data type instead int should be returned this is where that map lives according to the documentation it should be possible to change it while creating the database connection but i failed to do so with sqlalchemy so my suggestion is to actually patch our version of mysqldb mysqldb spec such that it stops casting data to long this is the most performant approach as well we are about to stop deploying our services in so this change won t be there for too long describe alternatives you ve considered cast long to int on our client but the performance penalty would be significant additional context related with further content to this pr and the gh issues that it s meant to fix | 1 |
15,319 | 26,938,383,138 | IssuesEvent | 2023-02-07 22:57:26 | BrightSpots/rcv | https://api.github.com/repos/BrightSpots/rcv | closed | Hart CVR fails in v1.3 | bug v1.4 requirement | When trying to tabulate a new CVR from Hart RCTab v1.3 produces this error: "Error during tabulation:
"javax.xml.stream.FactoryConfigurationError: Provider for javax.xml.stream.XMLInputFactory cannot be found
Tabulation failed!"
The same file tabulates in v1.2 without issue.
[2023-02-06_13-29-36_audit_0.log](https://github.com/BrightSpots/rcv/files/10680045/2023-02-06_13-29-36_audit_0.log)
| 1.0 | Hart CVR fails in v1.3 - When trying to tabulate a new CVR from Hart RCTab v1.3 produces this error: "Error during tabulation:
"javax.xml.stream.FactoryConfigurationError: Provider for javax.xml.stream.XMLInputFactory cannot be found
Tabulation failed!"
The same file tabulates in v1.2 without issue.
[2023-02-06_13-29-36_audit_0.log](https://github.com/BrightSpots/rcv/files/10680045/2023-02-06_13-29-36_audit_0.log)
| non_priority | hart cvr fails in when trying to tabulate a new cvr from hart rctab produces this error error during tabulation javax xml stream factoryconfigurationerror provider for javax xml stream xmlinputfactory cannot be found tabulation failed the same file tabulates in without issue | 0 |
226,712 | 18,043,936,522 | IssuesEvent | 2021-09-18 14:51:39 | logicmoo/logicmoo_workspace | https://api.github.com/repos/logicmoo/logicmoo_workspace | opened | logicmoo.pfc.test.sanity_base.LIST_01A JUnit | Test_9999 logicmoo.pfc.test.sanity_base unit_test LIST_01A | (cd /var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base ; timeout --foreground --preserve-status -s SIGKILL -k 10s 10s lmoo-clif list_01a.pfc)
GH_MASTER_ISSUE_FINFO=
ISSUE_SEARCH: https://github.com/logicmoo/logicmoo_workspace/issues?q=is%3Aissue+label%3ALIST_01A
GITLAB: https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://gitlab.logicmoo.org/gitlab/logicmoo/logicmoo_workspace/-/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
Latest: https://jenkins.logicmoo.org/job/logicmoo_workspace/lastBuild/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
This Build: https://jenkins.logicmoo.org/job/logicmoo_workspace/65/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
GITHUB: https://github.com/logicmoo/logicmoo_workspace/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://github.com/logicmoo/logicmoo_workspace/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
```
%
running('/var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base/list_01a.pfc'),
%~ /var/lib/jenkins/.local/share/swi-prolog/pack/logicmoo_utils/prolog/logicmoo_test_header.pl:92
%~ this_test_might_need( :-( use_module( library(logicmoo_plarkc))))
:- expects_dialect(pfc).
header_sane:(must_clause_asserted(G):- cwc, must(clause_asserted_u(G))).
:- ain((must_clause_asserted(G):- cwc, must(clause_asserted_u(G)))).
:- listing(must_clause_asserted).
%~ skipped( listing(must_clause_asserted))
must_clause_asserted(G):- cwc, must(clause_asserted_u(G)).
:- listing(must_clause_asserted).
%~ skipped( listing(must_clause_asserted))
:- must(predicate_property(must_clause_asserted(_),number_of_clauses(1))).
sHOW_MUST_go_on_failed_F__A__I__L_(baseKB:predicate_property(must_clause_asserted(_3664),number_of_clauses(1)))
%~ FIlE: * https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/blob/master/packs_sys/pfc/t/sanity_base/list_01a.pfc#L27
%~ error( sHOW_MUST_go_on_failed_F__A__I__L_( baseKB : predicate_property(Number_of_clauses,number_of_clauses(1))))
%~ FILE: * https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/blob/master/packs_sys/pfc/t/sanity_base/list_01a.pfc#L27
```
totalTime=10
ISSUE_SEARCH: https://github.com/logicmoo/logicmoo_workspace/issues?q=is%3Aissue+label%3ALIST_01A
GITLAB: https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://gitlab.logicmoo.org/gitlab/logicmoo/logicmoo_workspace/-/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
Latest: https://jenkins.logicmoo.org/job/logicmoo_workspace/lastBuild/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
This Build: https://jenkins.logicmoo.org/job/logicmoo_workspace/65/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
GITHUB: https://github.com/logicmoo/logicmoo_workspace/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://github.com/logicmoo/logicmoo_workspace/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
FAILED: /var/lib/jenkins/workspace/logicmoo_workspace/bin/lmoo-junit-minor -k list_01a.pfc (returned 137)
| 3.0 | logicmoo.pfc.test.sanity_base.LIST_01A JUnit - (cd /var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base ; timeout --foreground --preserve-status -s SIGKILL -k 10s 10s lmoo-clif list_01a.pfc)
GH_MASTER_ISSUE_FINFO=
ISSUE_SEARCH: https://github.com/logicmoo/logicmoo_workspace/issues?q=is%3Aissue+label%3ALIST_01A
GITLAB: https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://gitlab.logicmoo.org/gitlab/logicmoo/logicmoo_workspace/-/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
Latest: https://jenkins.logicmoo.org/job/logicmoo_workspace/lastBuild/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
This Build: https://jenkins.logicmoo.org/job/logicmoo_workspace/65/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
GITHUB: https://github.com/logicmoo/logicmoo_workspace/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://github.com/logicmoo/logicmoo_workspace/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
```
%
running('/var/lib/jenkins/workspace/logicmoo_workspace/packs_sys/pfc/t/sanity_base/list_01a.pfc'),
%~ /var/lib/jenkins/.local/share/swi-prolog/pack/logicmoo_utils/prolog/logicmoo_test_header.pl:92
%~ this_test_might_need( :-( use_module( library(logicmoo_plarkc))))
:- expects_dialect(pfc).
header_sane:(must_clause_asserted(G):- cwc, must(clause_asserted_u(G))).
:- ain((must_clause_asserted(G):- cwc, must(clause_asserted_u(G)))).
:- listing(must_clause_asserted).
%~ skipped( listing(must_clause_asserted))
must_clause_asserted(G):- cwc, must(clause_asserted_u(G)).
:- listing(must_clause_asserted).
%~ skipped( listing(must_clause_asserted))
:- must(predicate_property(must_clause_asserted(_),number_of_clauses(1))).
sHOW_MUST_go_on_failed_F__A__I__L_(baseKB:predicate_property(must_clause_asserted(_3664),number_of_clauses(1)))
%~ FIlE: * https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/blob/master/packs_sys/pfc/t/sanity_base/list_01a.pfc#L27
%~ error( sHOW_MUST_go_on_failed_F__A__I__L_( baseKB : predicate_property(Number_of_clauses,number_of_clauses(1))))
%~ FILE: * https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/blob/master/packs_sys/pfc/t/sanity_base/list_01a.pfc#L27
```
totalTime=10
ISSUE_SEARCH: https://github.com/logicmoo/logicmoo_workspace/issues?q=is%3Aissue+label%3ALIST_01A
GITLAB: https://logicmoo.org:2082/gitlab/logicmoo/logicmoo_workspace/-/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://gitlab.logicmoo.org/gitlab/logicmoo/logicmoo_workspace/-/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
Latest: https://jenkins.logicmoo.org/job/logicmoo_workspace/lastBuild/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
This Build: https://jenkins.logicmoo.org/job/logicmoo_workspace/65/testReport/logicmoo.pfc.test.sanity_base/LIST_01A/logicmoo_pfc_test_sanity_base_LIST_01A_JUnit/
GITHUB: https://github.com/logicmoo/logicmoo_workspace/commit/813ec17487381a026b83350c360d0c79a9e2d0ae
https://github.com/logicmoo/logicmoo_workspace/blob/813ec17487381a026b83350c360d0c79a9e2d0ae/packs_sys/pfc/t/sanity_base/list_01a.pfc
FAILED: /var/lib/jenkins/workspace/logicmoo_workspace/bin/lmoo-junit-minor -k list_01a.pfc (returned 137)
| non_priority | logicmoo pfc test sanity base list junit cd var lib jenkins workspace logicmoo workspace packs sys pfc t sanity base timeout foreground preserve status s sigkill k lmoo clif list pfc gh master issue finfo issue search gitlab latest this build github running var lib jenkins workspace logicmoo workspace packs sys pfc t sanity base list pfc var lib jenkins local share swi prolog pack logicmoo utils prolog logicmoo test header pl this test might need use module library logicmoo plarkc expects dialect pfc header sane must clause asserted g cwc must clause asserted u g ain must clause asserted g cwc must clause asserted u g listing must clause asserted skipped listing must clause asserted must clause asserted g cwc must clause asserted u g listing must clause asserted skipped listing must clause asserted must predicate property must clause asserted number of clauses show must go on failed f a i l basekb predicate property must clause asserted number of clauses file error show must go on failed f a i l basekb predicate property number of clauses number of clauses file totaltime issue search gitlab latest this build github failed var lib jenkins workspace logicmoo workspace bin lmoo junit minor k list pfc returned | 0 |
236,944 | 18,144,695,044 | IssuesEvent | 2021-09-25 07:53:18 | girlscript/winter-of-contributing | https://api.github.com/repos/girlscript/winter-of-contributing | closed | Menu Driven Code to implement stack | documentation GWOC21 Assigned C/CPP | ### Description
A menu driven program in C to perform the following operations using stack:
Create(); Push(); Pop(); Traverse()
### Domain
C/CPP
### Type of Contribution
Documentation
### Code of Conduct
- [X] I follow [Contributing Guidelines](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CONTRIBUTING.md) & [Code of conduct](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CODE_OF_CONDUCT.md) of this project. | 1.0 | Menu Driven Code to implement stack - ### Description
A menu driven program in C to perform the following operations using stack:
Create(); Push(); Pop(); Traverse()
### Domain
C/CPP
### Type of Contribution
Documentation
### Code of Conduct
- [X] I follow [Contributing Guidelines](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CONTRIBUTING.md) & [Code of conduct](https://github.com/girlscript/winter-of-contributing/blob/main/.github/CODE_OF_CONDUCT.md) of this project. | non_priority | menu driven code to implement stack description a menu driven program in c to perform the following operations using stack create push pop traverse domain c cpp type of contribution documentation code of conduct i follow of this project | 0 |
574,416 | 17,023,810,406 | IssuesEvent | 2021-07-03 03:58:47 | tomhughes/trac-tickets | https://api.github.com/repos/tomhughes/trac-tickets | closed | no result in nominatim | Component: nominatim Priority: minor Resolution: duplicate Type: task | **[Submitted to the original trac issue database at 6.39pm, Sunday, 22nd July 2012]**
Location in OSM:
In OSM Data exists the place "Sankt Lorenzen im Paltental" near Liezen, austria.
Asking for "St.Lorenzen" or "Sankt Lorenzen" results in some other places and tracks but not the asked place. | 1.0 | no result in nominatim - **[Submitted to the original trac issue database at 6.39pm, Sunday, 22nd July 2012]**
Location in OSM:
In OSM Data exists the place "Sankt Lorenzen im Paltental" near Liezen, austria.
Asking for "St.Lorenzen" or "Sankt Lorenzen" results in some other places and tracks but not the asked place. | priority | no result in nominatim location in osm in osm data exists the place sankt lorenzen im paltental near liezen austria asking for st lorenzen or sankt lorenzen results in some other places and tracks but not the asked place | 1 |
346,964 | 10,422,211,024 | IssuesEvent | 2019-09-16 08:29:24 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | discordapp.com - video or audio doesn't play | browser-firefox-mobile engine-gecko priority-important | <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://discordapp.com/channels/573676562470404096/576581520362569729
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: Yes
**Problem type**: Video or audio doesn't play
**Description**: uwu
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2019/9/c51891eb-8fcb-40c3-ba07-8663ef4f7674.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190910160002</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: nightly</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[JavaScript Warning: "Content Security Policy: Ignoring \'unsafe-inline\' within script-src or style-src: nonce-source or hash-source specified"]', u'[JavaScript Warning: "Content Security Policy: Directive child-src has been deprecated. Please use directive worker-src to control workers, or directive frame-src to control frames respectively."]', u'[console.log([FAST CONNECT] wss://gateway.discord.gg/?encoding=json&v=6&compress=zlib-stream, encoding: json, version: 6) https://discordapp.com/channels/573676562470404096/576581520362569729:44:532]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229173 source: "unction(e){t.__esModule=!0,t.mark=function(e){return void 0;r.mark(e)},t.measure=function(e,t){return void 0;r.measure(e"}]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229222 source: "urn void 0;r.mark(e)},t.measure=function(e,t){return void 0;r.measure(e,t),i(t),a(e)},t.clearMarks=i,t.clearMeasures=a;v"}]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229173 source: "(e){return void 0;r.mark(e)}"}]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229222 source: "(e,t){return void 0;r.measure(e,t),i(t),a(e)}"}]', u'[console.warn(SingleFile is hooking the IntersectionObserver API to detect and load deferred images.) moz-extension://3a78d412-96c5-4cf8-94db-b7d8aa635b0a/lib/hooks/content/content-hooks-frames-web.js:309:10]', u'[console.log(WebRTC is not supported on, Firefox Mobile, 68.0) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.log([BUILD INFO] Release Channel: stable, Build Number: 45429, Version Hash: 60874ea24b9b5f07b19ad447964455e00b5e1d30) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.log([FAST CONNECT] connected in 2187ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.warn(SingleFile is hooking the requestAnimationFrame and cancelAnimationFrame functions to load deferred images in background tabs.) moz-extension://3a78d412-96c5-4cf8-94db-b7d8aa635b0a/lib/hooks/content/content-hooks-frames-web.js:232:9]', u'[console.info([GatewayDiscovery], [STICKY] wss://gateway.discord.gg) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [CONNECT] wss://gateway.discord.gg, encoding: json, version: 6, compression: zlib-stream) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [CONNECTED] wss://gateway.discord.gg/?encoding=json&v=6&compress=zlib-stream in 0 ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [IDENTIFY]) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [HELLO] via ["gateway-prd-main-82gw",{"micros":0.0}], heartbeat interval: 41250, took 16 ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [READY] via ["gateway-prd-main-82gw",{"micros":44407,"calls":["discord-sessions-prd-1-4",{"micros":42608,"calls":["start_session",{"micros":36564,"calls":["api-prd-main-0pk6",{"micros":30639,"calls":["get_user",{"micros":2328},"add_authorized_ip",{"micros":1938},"get_guilds",{"micros":1785},"private_channels",{"micros":8257},"read_states",{"micros":844},"coros_wait",{"micros":1796},"aliases",{"micros":1553},"autosubscribed_users",{"micros":5221},"experiments",{"micros":1605}]}]},"guilds_connect",{"micros":2382,"calls":[]},"presence_connect",{"micros":1,"calls":[]}]}]}] as 210951288634bc5613eff7b7ac6fa013, took 269 ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[JavaScript Warning: "This site appears to use a scroll-linked positioning effect. This may not work well with asynchronous panning; see https://developer.mozilla.org/docs/Mozilla/Performance/ScrollLinkedEffects for further details and to join the discussion on related tools and features!" {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "El elemento <source> no tiene atributo "src". Ha fallado la carga del recurso de medios." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "El elemento <source> no tiene atributo "src". Ha fallado la carga del recurso de medios." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "Ha fallado la carga de todos los recursos candidatos. Carga de medios pausada." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "URI no vlida. Ha fallado la carga del recurso de medios ." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | discordapp.com - video or audio doesn't play - <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://discordapp.com/channels/573676562470404096/576581520362569729
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: Yes
**Problem type**: Video or audio doesn't play
**Description**: uwu
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2019/9/c51891eb-8fcb-40c3-ba07-8663ef4f7674.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>mixed active content blocked: false</li><li>image.mem.shared: true</li><li>buildID: 20190910160002</li><li>tracking content blocked: false</li><li>gfx.webrender.blob-images: true</li><li>hasTouchScreen: true</li><li>mixed passive content blocked: false</li><li>gfx.webrender.enabled: false</li><li>gfx.webrender.all: false</li><li>channel: nightly</li>
</ul>
<p>Console Messages:</p>
<pre>
[u'[JavaScript Warning: "Content Security Policy: Ignoring \'unsafe-inline\' within script-src or style-src: nonce-source or hash-source specified"]', u'[JavaScript Warning: "Content Security Policy: Directive child-src has been deprecated. Please use directive worker-src to control workers, or directive frame-src to control frames respectively."]', u'[console.log([FAST CONNECT] wss://gateway.discord.gg/?encoding=json&v=6&compress=zlib-stream, encoding: json, version: 6) https://discordapp.com/channels/573676562470404096/576581520362569729:44:532]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229173 source: "unction(e){t.__esModule=!0,t.mark=function(e){return void 0;r.mark(e)},t.measure=function(e,t){return void 0;r.measure(e"}]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229222 source: "urn void 0;r.mark(e)},t.measure=function(e,t){return void 0;r.measure(e,t),i(t),a(e)},t.clearMarks=i,t.clearMeasures=a;v"}]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229173 source: "(e){return void 0;r.mark(e)}"}]', u'[JavaScript Warning: "unreachable code after return statement" {file: "https://discordapp.com/assets/4c8f0772e7b2b68f0412.js" line: 58 column: 229222 source: "(e,t){return void 0;r.measure(e,t),i(t),a(e)}"}]', u'[console.warn(SingleFile is hooking the IntersectionObserver API to detect and load deferred images.) moz-extension://3a78d412-96c5-4cf8-94db-b7d8aa635b0a/lib/hooks/content/content-hooks-frames-web.js:309:10]', u'[console.log(WebRTC is not supported on, Firefox Mobile, 68.0) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.log([BUILD INFO] Release Channel: stable, Build Number: 45429, Version Hash: 60874ea24b9b5f07b19ad447964455e00b5e1d30) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.log([FAST CONNECT] connected in 2187ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.warn(SingleFile is hooking the requestAnimationFrame and cancelAnimationFrame functions to load deferred images in background tabs.) moz-extension://3a78d412-96c5-4cf8-94db-b7d8aa635b0a/lib/hooks/content/content-hooks-frames-web.js:232:9]', u'[console.info([GatewayDiscovery], [STICKY] wss://gateway.discord.gg) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [CONNECT] wss://gateway.discord.gg, encoding: json, version: 6, compression: zlib-stream) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [CONNECTED] wss://gateway.discord.gg/?encoding=json&v=6&compress=zlib-stream in 0 ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [IDENTIFY]) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [HELLO] via ["gateway-prd-main-82gw",{"micros":0.0}], heartbeat interval: 41250, took 16 ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[console.info([GatewaySocket], [READY] via ["gateway-prd-main-82gw",{"micros":44407,"calls":["discord-sessions-prd-1-4",{"micros":42608,"calls":["start_session",{"micros":36564,"calls":["api-prd-main-0pk6",{"micros":30639,"calls":["get_user",{"micros":2328},"add_authorized_ip",{"micros":1938},"get_guilds",{"micros":1785},"private_channels",{"micros":8257},"read_states",{"micros":844},"coros_wait",{"micros":1796},"aliases",{"micros":1553},"autosubscribed_users",{"micros":5221},"experiments",{"micros":1605}]}]},"guilds_connect",{"micros":2382,"calls":[]},"presence_connect",{"micros":1,"calls":[]}]}]}] as 210951288634bc5613eff7b7ac6fa013, took 269 ms) https://discordapp.com/assets/4c8f0772e7b2b68f0412.js:58:217534]', u'[JavaScript Warning: "This site appears to use a scroll-linked positioning effect. This may not work well with asynchronous panning; see https://developer.mozilla.org/docs/Mozilla/Performance/ScrollLinkedEffects for further details and to join the discussion on related tools and features!" {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "El elemento <source> no tiene atributo "src". Ha fallado la carga del recurso de medios." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "El elemento <source> no tiene atributo "src". Ha fallado la carga del recurso de medios." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "Ha fallado la carga de todos los recursos candidatos. Carga de medios pausada." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]', u'[JavaScript Warning: "URI no vlida. Ha fallado la carga del recurso de medios ." {file: "https://discordapp.com/channels/573676562470404096/576581520362569729" line: 0}]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | discordapp com video or audio doesn t play url browser version firefox mobile operating system android tested another browser yes problem type video or audio doesn t play description uwu steps to reproduce browser configuration mixed active content blocked false image mem shared true buildid tracking content blocked false gfx webrender blob images true hastouchscreen true mixed passive content blocked false gfx webrender enabled false gfx webrender all false channel nightly console messages u u wss gateway discord gg encoding json v compress zlib stream encoding json version u u u u u u u release channel stable build number version hash u connected in u u wss gateway discord gg u wss gateway discord gg encoding json version compression zlib stream u wss gateway discord gg encoding json v compress zlib stream in ms u u via heartbeat interval took ms u via guilds connect micros calls presence connect micros calls as took ms u u u u u from with ❤️ | 1 |
282,137 | 8,704,012,313 | IssuesEvent | 2018-12-05 18:11:16 | strapi/strapi | https://api.github.com/repos/strapi/strapi | closed | Adding a file to api config folder disables those api | priority: medium status: have to reproduce type: bug 🐛 | <!-- ⚠️ If you do not respect this template your issue will be closed. -->
<!-- =============================================================================== -->
<!-- ⚠️ If you are not using the current Strapi release, you will be asked to update. -->
<!-- Please see the wiki for guides on upgrading to the latest release. -->
<!-- =============================================================================== -->
<!-- ⚠️ Make sure to browse the opened and closed issues before submitting your issue. -->
<!-- ⚠️ Before writing your issue make sure you are using:-->
<!-- Node 10.x.x -->
<!-- npm 6.x.x -->
<!-- The latest version of Strapi. -->
**Informations**
- **Node.js version**: v10.10.0
- **npm version**: 6.4.1
- **Strapi version**: 3.0.0-alpha.14.4.0
- **Database**: 3.6.4
- **Operating system**: Ubuntu 18.04
**What is the current behavior?**
Generated api returns 404 response on all related routes.
**Steps to reproduce the problem**
1. Install new project using command `strapi new projectname`
2. Perform commands
```
cd projectname
strapi generate:api test
strapi start
```
3. Make sure generated api is working correctly, sending request from postman or browser:
```
GET http://localhost:1337/tests
```
Expected response:
```
{
"statusCode": 403,
"error": "Forbidden",
"message": "Forbidden"
}
```
We did not set up any permissions for this api, therefore it's forbidden by default.
4. Create file with name v.js ( this could be any filename starting from letter 'v' - 'v123456.js', etc. ) at the folder `$PROJECT_ROOT/api/test/config `;
This file must export function, like this:
```
function testFunction() {
console.log("this function is not called");
}
module.exports = testFunction;
```
5. Server will restart automatically.
6. Perform the same request from step 3. Result will be:
```
{
"statusCode": 404,
"error": "Not Found",
"message": "Not Found"
}
```
**What is the expected behavior?**
Expected the same response as in step 3.
**Suggested solutions**
Have no idea. | 1.0 | Adding a file to api config folder disables those api - <!-- ⚠️ If you do not respect this template your issue will be closed. -->
<!-- =============================================================================== -->
<!-- ⚠️ If you are not using the current Strapi release, you will be asked to update. -->
<!-- Please see the wiki for guides on upgrading to the latest release. -->
<!-- =============================================================================== -->
<!-- ⚠️ Make sure to browse the opened and closed issues before submitting your issue. -->
<!-- ⚠️ Before writing your issue make sure you are using:-->
<!-- Node 10.x.x -->
<!-- npm 6.x.x -->
<!-- The latest version of Strapi. -->
**Informations**
- **Node.js version**: v10.10.0
- **npm version**: 6.4.1
- **Strapi version**: 3.0.0-alpha.14.4.0
- **Database**: 3.6.4
- **Operating system**: Ubuntu 18.04
**What is the current behavior?**
Generated api returns 404 response on all related routes.
**Steps to reproduce the problem**
1. Install new project using command `strapi new projectname`
2. Perform commands
```
cd projectname
strapi generate:api test
strapi start
```
3. Make sure generated api is working correctly, sending request from postman or browser:
```
GET http://localhost:1337/tests
```
Expected response:
```
{
"statusCode": 403,
"error": "Forbidden",
"message": "Forbidden"
}
```
We did not set up any permissions for this api, therefore it's forbidden by default.
4. Create file with name v.js ( this could be any filename starting from letter 'v' - 'v123456.js', etc. ) at the folder `$PROJECT_ROOT/api/test/config `;
This file must export function, like this:
```
function testFunction() {
console.log("this function is not called");
}
module.exports = testFunction;
```
5. Server will restart automatically.
6. Perform the same request from step 3. Result will be:
```
{
"statusCode": 404,
"error": "Not Found",
"message": "Not Found"
}
```
**What is the expected behavior?**
Expected the same response as in step 3.
**Suggested solutions**
Have no idea. | priority | adding a file to api config folder disables those api informations node js version npm version strapi version alpha database operating system ubuntu what is the current behavior generated api returns response on all related routes steps to reproduce the problem install new project using command strapi new projectname perform commands cd projectname strapi generate api test strapi start make sure generated api is working correctly sending request from postman or browser get expected response statuscode error forbidden message forbidden we did not set up any permissions for this api therefore it s forbidden by default create file with name v js this could be any filename starting from letter v js etc at the folder project root api test config this file must export function like this function testfunction console log this function is not called module exports testfunction server will restart automatically perform the same request from step result will be statuscode error not found message not found what is the expected behavior expected the same response as in step suggested solutions have no idea | 1 |
790,329 | 27,822,948,852 | IssuesEvent | 2023-03-19 12:56:31 | bounswe/bounswe2023group2 | https://api.github.com/repos/bounswe/bounswe2023group2 | closed | Account Features | state: assigned priority: medium state: In progress effort: level 3 | Create mock ups for account features:
- [x] login page
- [x] sign up page
- [x] reset password page | 1.0 | Account Features - Create mock ups for account features:
- [x] login page
- [x] sign up page
- [x] reset password page | priority | account features create mock ups for account features login page sign up page reset password page | 1 |
453,517 | 13,081,283,747 | IssuesEvent | 2020-08-01 10:30:39 | space-wizards/space-station-14 | https://api.github.com/repos/space-wizards/space-station-14 | closed | IGameTiming.CurTime never goes forwards | Priority: 1-high Type: Bug | Causing a few issues, such as weapons not working at all. | 1.0 | IGameTiming.CurTime never goes forwards - Causing a few issues, such as weapons not working at all. | priority | igametiming curtime never goes forwards causing a few issues such as weapons not working at all | 1 |
815,286 | 30,544,588,325 | IssuesEvent | 2023-07-20 02:02:09 | TencentBlueKing/bk-user | https://api.github.com/repos/TencentBlueKing/bk-user | closed | 用户管理SaaS支持应用访问权限 | Type: enhancement Layer: saas Layer: frontend Sign: security Priority: High doing | 访问登录校验bk_token或使用bk_token获取用户信息时对于特殊code=1302403
- 产品页面上需要展示无权限提示
- 必须保证整个产品不可使用,即所有Web API都必须有这个鉴权 | 1.0 | 用户管理SaaS支持应用访问权限 - 访问登录校验bk_token或使用bk_token获取用户信息时对于特殊code=1302403
- 产品页面上需要展示无权限提示
- 必须保证整个产品不可使用,即所有Web API都必须有这个鉴权 | priority | 用户管理saas支持应用访问权限 访问登录校验bk token或使用bk token获取用户信息时对于特殊code 产品页面上需要展示无权限提示 必须保证整个产品不可使用,即所有web api都必须有这个鉴权 | 1 |
486,660 | 14,012,294,461 | IssuesEvent | 2020-10-29 08:50:05 | magento/magento2 | https://api.github.com/repos/magento/magento2 | closed | Wrong order status showing in case customer has ordered 3 qty of one product, and admin invoiced2 refunded 1,shipped 1 and cancelled 1 | Component: order status Issue: Confirmed Issue: Format is valid Issue: Ready for Work Priority: P2 Progress: done Reproduced on 2.4.x Severity: S2 | <!---
Please review our guidelines before adding a new issue: https://github.com/magento/magento2/wiki/Issue-reporting-guidelines
Fields marked with (*) are required. Please don't remove the template.
-->
### Preconditions (*)
<!---
-->
1. magento v 2.4.0
2.
### Steps to reproduce (*)
<!---
-->
1.place an order of 3 qty of any product, create invoice for 1 qty from admin then generate refund for that
2.then again create invoice for 1 qty and do shipment
3.then cancel the order
like this - https://prnt.sc/uepp9g
### Expected result (*)
<!--- Tell us what do you expect to happen. -->
1. order status should be completed in this situation
2.
### Actual result (*)
<!--- Tell us what happened instead. Include error messages and issues. -->
1.showing processing - https://prnt.sc/uepbdj
2. If it is correct then how,please explain
---
Please provide [Severity](https://devdocs.magento.com/guides/v2.3/contributor-guide/contributing.html#backlog) assessment for the Issue as Reporter. This information will help during Confirmation and Issue triage processes.
- [ ] Severity: **S0** _- Affects critical data or functionality and leaves users without workaround._
- [ ] Severity: **S1** _- Affects critical data or functionality and forces users to employ a workaround._
- [ ] Severity: **S2** _- Affects non-critical data or functionality and forces users to employ a workaround._
- [ ] Severity: **S3** _- Affects non-critical data or functionality and does not force users to employ a workaround._
- [ ] Severity: **S4** _- Affects aesthetics, professional look and feel, “quality” or “usability”._
| 1.0 | Wrong order status showing in case customer has ordered 3 qty of one product, and admin invoiced2 refunded 1,shipped 1 and cancelled 1 - <!---
Please review our guidelines before adding a new issue: https://github.com/magento/magento2/wiki/Issue-reporting-guidelines
Fields marked with (*) are required. Please don't remove the template.
-->
### Preconditions (*)
<!---
-->
1. magento v 2.4.0
2.
### Steps to reproduce (*)
<!---
-->
1.place an order of 3 qty of any product, create invoice for 1 qty from admin then generate refund for that
2.then again create invoice for 1 qty and do shipment
3.then cancel the order
like this - https://prnt.sc/uepp9g
### Expected result (*)
<!--- Tell us what do you expect to happen. -->
1. order status should be completed in this situation
2.
### Actual result (*)
<!--- Tell us what happened instead. Include error messages and issues. -->
1.showing processing - https://prnt.sc/uepbdj
2. If it is correct then how,please explain
---
Please provide [Severity](https://devdocs.magento.com/guides/v2.3/contributor-guide/contributing.html#backlog) assessment for the Issue as Reporter. This information will help during Confirmation and Issue triage processes.
- [ ] Severity: **S0** _- Affects critical data or functionality and leaves users without workaround._
- [ ] Severity: **S1** _- Affects critical data or functionality and forces users to employ a workaround._
- [ ] Severity: **S2** _- Affects non-critical data or functionality and forces users to employ a workaround._
- [ ] Severity: **S3** _- Affects non-critical data or functionality and does not force users to employ a workaround._
- [ ] Severity: **S4** _- Affects aesthetics, professional look and feel, “quality” or “usability”._
| priority | wrong order status showing in case customer has ordered qty of one product and admin refunded shipped and cancelled please review our guidelines before adding a new issue fields marked with are required please don t remove the template preconditions magento v steps to reproduce place an order of qty of any product create invoice for qty from admin then generate refund for that then again create invoice for qty and do shipment then cancel the order like this expected result order status should be completed in this situation actual result showing processing if it is correct then how please explain please provide assessment for the issue as reporter this information will help during confirmation and issue triage processes severity affects critical data or functionality and leaves users without workaround severity affects critical data or functionality and forces users to employ a workaround severity affects non critical data or functionality and forces users to employ a workaround severity affects non critical data or functionality and does not force users to employ a workaround severity affects aesthetics professional look and feel “quality” or “usability” | 1 |
418,926 | 12,215,546,109 | IssuesEvent | 2020-05-01 13:11:36 | Laravel-Backpack/CRUD | https://api.github.com/repos/Laravel-Backpack/CRUD | opened | [4.1.x][Feature] Focus on first item when InlineCreate modal opens | Feature Priority: SHOULD | This is a feature we have inside the main form, and it should be present inside the InlineCreate modal too. It allows for keyboard-only data entry. | 1.0 | [4.1.x][Feature] Focus on first item when InlineCreate modal opens - This is a feature we have inside the main form, and it should be present inside the InlineCreate modal too. It allows for keyboard-only data entry. | priority | focus on first item when inlinecreate modal opens this is a feature we have inside the main form and it should be present inside the inlinecreate modal too it allows for keyboard only data entry | 1 |
440,957 | 12,706,884,427 | IssuesEvent | 2020-06-23 07:59:49 | California-Planet-Search/radvel | https://api.github.com/repos/California-Planet-Search/radvel | closed | Gaussian Process Fitting - different Ks on plots? | help wanted priority:high question | Hi, I am using the Gaussian Process feature from radvel and I was curious why is it that the semi-amplitude is different in GPPlot.plot_multipanel from the one from the Corner plot. This happens in the tutorial that you have posted (https://github.com/California-Planet-Search/radvel/blob/master/docs/tutorials/GaussianProcess-tutorial.ipynb).
I ran radvel on my computer with GPs on a different dataset and I get a 1m/s difference between the two plots. I am guessing gp posterior - "gppost"- is not updated after the gp analysis was performed. Maybe there is something that I do not understand and this is how is supposed to be but I figured I could ask.
Radvel version 1.4.1. | 1.0 | Gaussian Process Fitting - different Ks on plots? - Hi, I am using the Gaussian Process feature from radvel and I was curious why is it that the semi-amplitude is different in GPPlot.plot_multipanel from the one from the Corner plot. This happens in the tutorial that you have posted (https://github.com/California-Planet-Search/radvel/blob/master/docs/tutorials/GaussianProcess-tutorial.ipynb).
I ran radvel on my computer with GPs on a different dataset and I get a 1m/s difference between the two plots. I am guessing gp posterior - "gppost"- is not updated after the gp analysis was performed. Maybe there is something that I do not understand and this is how is supposed to be but I figured I could ask.
Radvel version 1.4.1. | priority | gaussian process fitting different ks on plots hi i am using the gaussian process feature from radvel and i was curious why is it that the semi amplitude is different in gpplot plot multipanel from the one from the corner plot this happens in the tutorial that you have posted i ran radvel on my computer with gps on a different dataset and i get a s difference between the two plots i am guessing gp posterior gppost is not updated after the gp analysis was performed maybe there is something that i do not understand and this is how is supposed to be but i figured i could ask radvel version | 1 |
47,315 | 12,003,829,333 | IssuesEvent | 2020-04-09 10:19:27 | ElektraInitiative/libelektra | https://api.github.com/repos/ElektraInitiative/libelektra | opened | crypto_botan: botan 2.13 header deprecation warnings | build dependencies | As of botan 2.13.x (maybe earlier?) we started getting the following header deprecation warnings:
```
In file included from ../src/plugins/crypto/botan_operations.cpp:12:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/hmac.h:14:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(hmac.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:100:2: note: expanded from here
message "this header will be made internal in the future"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:13:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/init.h:16:1: warning: this header is deprecated [-W#pragma-messages]
BOTAN_DEPRECATED_HEADER(init.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:104:42: note: expanded from macro 'BOTAN_DEPRECATED_HEADER'
#define BOTAN_DEPRECATED_HEADER(hdr) _Pragma("message \"this header is deprecated\"")
^
<scratch space>:102:2: note: expanded from here
message "this header is deprecated"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:14:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/lookup.h:35:1: warning: this header is deprecated [-W#pragma-messages]
BOTAN_DEPRECATED_HEADER(lookup.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:104:42: note: expanded from macro 'BOTAN_DEPRECATED_HEADER'
#define BOTAN_DEPRECATED_HEADER(hdr) _Pragma("message \"this header is deprecated\"")
^
<scratch space>:104:2: note: expanded from here
message "this header is deprecated"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:15:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/pbkdf2.h:16:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(pbkdf2.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:106:2: note: expanded from here
message "this header will be made internal in the future"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:17:
In file included from /usr/local/Cellar/botan/2.13.0/include/botan-2/botan/sha2_32.h:12:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/mdx_hash.h:13:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(mdx_hash.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:108:2: note: expanded from here
message "this header will be made internal in the future"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:17:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/sha2_32.h:14:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(sha2_32.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:110:2: note: expanded from here
message "this header will be made internal in the future"
^
6 warnings generated.
``` | 1.0 | crypto_botan: botan 2.13 header deprecation warnings - As of botan 2.13.x (maybe earlier?) we started getting the following header deprecation warnings:
```
In file included from ../src/plugins/crypto/botan_operations.cpp:12:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/hmac.h:14:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(hmac.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:100:2: note: expanded from here
message "this header will be made internal in the future"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:13:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/init.h:16:1: warning: this header is deprecated [-W#pragma-messages]
BOTAN_DEPRECATED_HEADER(init.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:104:42: note: expanded from macro 'BOTAN_DEPRECATED_HEADER'
#define BOTAN_DEPRECATED_HEADER(hdr) _Pragma("message \"this header is deprecated\"")
^
<scratch space>:102:2: note: expanded from here
message "this header is deprecated"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:14:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/lookup.h:35:1: warning: this header is deprecated [-W#pragma-messages]
BOTAN_DEPRECATED_HEADER(lookup.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:104:42: note: expanded from macro 'BOTAN_DEPRECATED_HEADER'
#define BOTAN_DEPRECATED_HEADER(hdr) _Pragma("message \"this header is deprecated\"")
^
<scratch space>:104:2: note: expanded from here
message "this header is deprecated"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:15:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/pbkdf2.h:16:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(pbkdf2.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:106:2: note: expanded from here
message "this header will be made internal in the future"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:17:
In file included from /usr/local/Cellar/botan/2.13.0/include/botan-2/botan/sha2_32.h:12:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/mdx_hash.h:13:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(mdx_hash.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:108:2: note: expanded from here
message "this header will be made internal in the future"
^
In file included from ../src/plugins/crypto/botan_operations.cpp:17:
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/sha2_32.h:14:1: warning: this header will be made internal in the future [-W#pragma-messages]
BOTAN_FUTURE_INTERNAL_HEADER(sha2_32.h)
^
/usr/local/Cellar/botan/2.13.0/include/botan-2/botan/compiler.h:107:49: note: expanded from macro 'BOTAN_FUTURE_INTERNAL_HEADER'
#define BOTAN_FUTURE_INTERNAL_HEADER(hdr) _Pragma("message \"this header will be made internal in the future\"")
^
<scratch space>:110:2: note: expanded from here
message "this header will be made internal in the future"
^
6 warnings generated.
``` | non_priority | crypto botan botan header deprecation warnings as of botan x maybe earlier we started getting the following header deprecation warnings in file included from src plugins crypto botan operations cpp usr local cellar botan include botan botan hmac h warning this header will be made internal in the future botan future internal header hmac h usr local cellar botan include botan botan compiler h note expanded from macro botan future internal header define botan future internal header hdr pragma message this header will be made internal in the future note expanded from here message this header will be made internal in the future in file included from src plugins crypto botan operations cpp usr local cellar botan include botan botan init h warning this header is deprecated botan deprecated header init h usr local cellar botan include botan botan compiler h note expanded from macro botan deprecated header define botan deprecated header hdr pragma message this header is deprecated note expanded from here message this header is deprecated in file included from src plugins crypto botan operations cpp usr local cellar botan include botan botan lookup h warning this header is deprecated botan deprecated header lookup h usr local cellar botan include botan botan compiler h note expanded from macro botan deprecated header define botan deprecated header hdr pragma message this header is deprecated note expanded from here message this header is deprecated in file included from src plugins crypto botan operations cpp usr local cellar botan include botan botan h warning this header will be made internal in the future botan future internal header h usr local cellar botan include botan botan compiler h note expanded from macro botan future internal header define botan future internal header hdr pragma message this header will be made internal in the future note expanded from here message this header will be made internal in the future in file included from src plugins crypto botan operations cpp in file included from usr local cellar botan include botan botan h usr local cellar botan include botan botan mdx hash h warning this header will be made internal in the future botan future internal header mdx hash h usr local cellar botan include botan botan compiler h note expanded from macro botan future internal header define botan future internal header hdr pragma message this header will be made internal in the future note expanded from here message this header will be made internal in the future in file included from src plugins crypto botan operations cpp usr local cellar botan include botan botan h warning this header will be made internal in the future botan future internal header h usr local cellar botan include botan botan compiler h note expanded from macro botan future internal header define botan future internal header hdr pragma message this header will be made internal in the future note expanded from here message this header will be made internal in the future warnings generated | 0 |
233,920 | 7,708,780,971 | IssuesEvent | 2018-05-22 06:56:22 | qutebrowser/qutebrowser | https://api.github.com/repos/qutebrowser/qutebrowser | reopened | Qt 5.11: Page is sometimes split in half | bug: behavior priority: 0 - high qt: 5.11 | - My bug report: [QTBUG-68279](https://bugreports.qt.io/browse/QTBUG-68279)
- Original bug report: [QTBUG-68224](https://bugreports.qt.io/browse/QTBUG-68224)
- Bug fix: https://codereview.qt-project.org/#/c/229443/
- Regression caused by: https://codereview.qt-project.org/#/c/226416/ (for [QTBUG-65595](https://bugreports.qt.io/browse/QTBUG-65595)) | 1.0 | Qt 5.11: Page is sometimes split in half - - My bug report: [QTBUG-68279](https://bugreports.qt.io/browse/QTBUG-68279)
- Original bug report: [QTBUG-68224](https://bugreports.qt.io/browse/QTBUG-68224)
- Bug fix: https://codereview.qt-project.org/#/c/229443/
- Regression caused by: https://codereview.qt-project.org/#/c/226416/ (for [QTBUG-65595](https://bugreports.qt.io/browse/QTBUG-65595)) | priority | qt page is sometimes split in half my bug report original bug report bug fix regression caused by for | 1 |
86,396 | 16,988,606,392 | IssuesEvent | 2021-06-30 17:16:12 | anomanetwork/anoma | https://api.github.com/repos/anomanetwork/anoma | opened | nicer parallelized VP out-of-gas error short-circuiting | ledger refactor / code quality | Following the changes done for #312, it is possible to match on the runtime error that occurred in the WASM execution, if any. We should use that to perform short-circuiting by returning an error inside the `.par_iter().try_fold(...` if the runtime error is a gas error.
Currently, we using a somewhat hacky workaround in which we store the error in `VpGasMeter`, which can then be removed. | 1.0 | nicer parallelized VP out-of-gas error short-circuiting - Following the changes done for #312, it is possible to match on the runtime error that occurred in the WASM execution, if any. We should use that to perform short-circuiting by returning an error inside the `.par_iter().try_fold(...` if the runtime error is a gas error.
Currently, we using a somewhat hacky workaround in which we store the error in `VpGasMeter`, which can then be removed. | non_priority | nicer parallelized vp out of gas error short circuiting following the changes done for it is possible to match on the runtime error that occurred in the wasm execution if any we should use that to perform short circuiting by returning an error inside the par iter try fold if the runtime error is a gas error currently we using a somewhat hacky workaround in which we store the error in vpgasmeter which can then be removed | 0 |
80,681 | 23,279,538,565 | IssuesEvent | 2022-08-05 10:36:11 | VirtusLab/git-machete-intellij-plugin | https://api.github.com/repos/VirtusLab/git-machete-intellij-plugin | closed | Improve Gradle-related Kotlin code | build code quality | After migrating the gradle scripts to Kotlin there are some issues that need to be resolved:
- [x] Find a way to use version catalog aliases in helpers' code in buildSrc/
(one way to do it would be to put the aliases into extra properties of the project in buildSrc)
- [x] Unify plugins' notations in `libraries` and `plugins` in libs.version.toml:
* [x] the versions shared with the `[plugins]` sections should be extracted to `[versions]` section to avoid discrepancies
* [x] or maybe the `[plugins]` section can be removed completely in favor of the newly-added `[libraries]`?
* [x] extra care should be taken to retain `@pins` on certain plugins, as done in `[plugins]` currently (so that they're NOT auto-updated by `gradle versionCatalogUpdate`)
* [x] a comment would be useful why plugins in `[libraries]` are needed in the first place and/or a reference to a blogpost describing this technique
- [x] Remove code that's marked as Deprecated from `CheckerFrameworkConfigurator::applySubtypingChecker`, then [revert `kotlinOptions.allWarningsAsErrors = true` in `buildSrc/build.gradle.kts`](https://github.com/VirtusLab/git-machete-intellij-plugin/pull/989#discussion_r929939862)
- [x] Refactor `IntellijVersionHelper` so that there are no unsafe typecasts: preferably extract a data class to keep the IntelliJ versions retrieved from properties file, to avoid using string keys
- [x] Switch all classes in buildSrc to Kotlin
- [x] Remove all remaining support for Groovy from Gradle code (mostly Spotless)
- [x] Check if it's possible to keep `build.gradle.kts` files [formatted with Spotless](https://github.com/diffplug/spotless/tree/main/plugin-gradle#kotlin) (and not just files in buildSrc/) — see `kotlinGradle { ... }`
- [x] Fix spotless for Kotlin so that it launches automatically with `./gradlew build`
- [x] Fix Gradle warning in `:buildSrc:compileKotlin` task: `'compileJava' task (current target is 11) and 'compileKotlin' task (current target is 1.8) jvm target compatibility should be set to the same Java version`
- [x] Check if there is any built-in way in Kotlin to use static identifiers for projects: something like `api(project(branchLayout.api))`. Probably no point in defining them explicitly if they aren't available OOTB => NO
- [x] Check if it's possible to replace `BuildUtils.foo(project)` calls with just `foo()` (probably an extension method on `Project` would be needed) => YES
- [x] Rewrite the latter half of `UpdateEapBuildNumber#checkForEapWithBuildNumberHigherThan` to use Kotlin regex API
- [x] Consider un-hardcoding names of `IntellijVersions` properties by using `.name`: https://kotlinlang.org/docs/reflection.html#property-references | 1.0 | Improve Gradle-related Kotlin code - After migrating the gradle scripts to Kotlin there are some issues that need to be resolved:
- [x] Find a way to use version catalog aliases in helpers' code in buildSrc/
(one way to do it would be to put the aliases into extra properties of the project in buildSrc)
- [x] Unify plugins' notations in `libraries` and `plugins` in libs.version.toml:
* [x] the versions shared with the `[plugins]` sections should be extracted to `[versions]` section to avoid discrepancies
* [x] or maybe the `[plugins]` section can be removed completely in favor of the newly-added `[libraries]`?
* [x] extra care should be taken to retain `@pins` on certain plugins, as done in `[plugins]` currently (so that they're NOT auto-updated by `gradle versionCatalogUpdate`)
* [x] a comment would be useful why plugins in `[libraries]` are needed in the first place and/or a reference to a blogpost describing this technique
- [x] Remove code that's marked as Deprecated from `CheckerFrameworkConfigurator::applySubtypingChecker`, then [revert `kotlinOptions.allWarningsAsErrors = true` in `buildSrc/build.gradle.kts`](https://github.com/VirtusLab/git-machete-intellij-plugin/pull/989#discussion_r929939862)
- [x] Refactor `IntellijVersionHelper` so that there are no unsafe typecasts: preferably extract a data class to keep the IntelliJ versions retrieved from properties file, to avoid using string keys
- [x] Switch all classes in buildSrc to Kotlin
- [x] Remove all remaining support for Groovy from Gradle code (mostly Spotless)
- [x] Check if it's possible to keep `build.gradle.kts` files [formatted with Spotless](https://github.com/diffplug/spotless/tree/main/plugin-gradle#kotlin) (and not just files in buildSrc/) — see `kotlinGradle { ... }`
- [x] Fix spotless for Kotlin so that it launches automatically with `./gradlew build`
- [x] Fix Gradle warning in `:buildSrc:compileKotlin` task: `'compileJava' task (current target is 11) and 'compileKotlin' task (current target is 1.8) jvm target compatibility should be set to the same Java version`
- [x] Check if there is any built-in way in Kotlin to use static identifiers for projects: something like `api(project(branchLayout.api))`. Probably no point in defining them explicitly if they aren't available OOTB => NO
- [x] Check if it's possible to replace `BuildUtils.foo(project)` calls with just `foo()` (probably an extension method on `Project` would be needed) => YES
- [x] Rewrite the latter half of `UpdateEapBuildNumber#checkForEapWithBuildNumberHigherThan` to use Kotlin regex API
- [x] Consider un-hardcoding names of `IntellijVersions` properties by using `.name`: https://kotlinlang.org/docs/reflection.html#property-references | non_priority | improve gradle related kotlin code after migrating the gradle scripts to kotlin there are some issues that need to be resolved find a way to use version catalog aliases in helpers code in buildsrc one way to do it would be to put the aliases into extra properties of the project in buildsrc unify plugins notations in libraries and plugins in libs version toml the versions shared with the sections should be extracted to section to avoid discrepancies or maybe the section can be removed completely in favor of the newly added extra care should be taken to retain pins on certain plugins as done in currently so that they re not auto updated by gradle versioncatalogupdate a comment would be useful why plugins in are needed in the first place and or a reference to a blogpost describing this technique remove code that s marked as deprecated from checkerframeworkconfigurator applysubtypingchecker then refactor intellijversionhelper so that there are no unsafe typecasts preferably extract a data class to keep the intellij versions retrieved from properties file to avoid using string keys switch all classes in buildsrc to kotlin remove all remaining support for groovy from gradle code mostly spotless check if it s possible to keep build gradle kts files and not just files in buildsrc mdash see kotlingradle fix spotless for kotlin so that it launches automatically with gradlew build fix gradle warning in buildsrc compilekotlin task compilejava task current target is and compilekotlin task current target is jvm target compatibility should be set to the same java version check if there is any built in way in kotlin to use static identifiers for projects something like api project branchlayout api probably no point in defining them explicitly if they aren t available ootb no check if it s possible to replace buildutils foo project calls with just foo probably an extension method on project would be needed yes rewrite the latter half of updateeapbuildnumber checkforeapwithbuildnumberhigherthan to use kotlin regex api consider un hardcoding names of intellijversions properties by using name | 0 |
198,877 | 15,726,856,884 | IssuesEvent | 2021-03-29 11:54:45 | TesseractCoding/NeoAlgo | https://api.github.com/repos/TesseractCoding/NeoAlgo | closed | Update of readme file of cp in Java | Assigned Java documentation gssoc21 | ## 📚 Documentation
The readme file of cp of Java is empty. Better providing the list of problems included in java/cp.
### Have you read the [Contributing Guidelines on Pull Requests](https://github.com/TesseractCoding/NeoAlgo/blob/master/CONTRIBUTING.md#reporting-new-issues)?
Yes. | 1.0 | Update of readme file of cp in Java - ## 📚 Documentation
The readme file of cp of Java is empty. Better providing the list of problems included in java/cp.
### Have you read the [Contributing Guidelines on Pull Requests](https://github.com/TesseractCoding/NeoAlgo/blob/master/CONTRIBUTING.md#reporting-new-issues)?
Yes. | non_priority | update of readme file of cp in java 📚 documentation the readme file of cp of java is empty better providing the list of problems included in java cp have you read the yes | 0 |
296,040 | 9,103,730,909 | IssuesEvent | 2019-02-20 16:30:32 | archesproject/arches-collector | https://api.github.com/repos/archesproject/arches-collector | closed | On iOS, user can't delete an instance | Priority: High Type: Bug | To reproduce:
1. On an iOS device, create a new instance in a project
2. Try to delete the instance by pressing the "trash" icon
3. Note that the app interprets the interaction as a touch on the instance list item, and returns the user to instance editor
This means that the user can't delete an instance. | 1.0 | On iOS, user can't delete an instance - To reproduce:
1. On an iOS device, create a new instance in a project
2. Try to delete the instance by pressing the "trash" icon
3. Note that the app interprets the interaction as a touch on the instance list item, and returns the user to instance editor
This means that the user can't delete an instance. | priority | on ios user can t delete an instance to reproduce on an ios device create a new instance in a project try to delete the instance by pressing the trash icon note that the app interprets the interaction as a touch on the instance list item and returns the user to instance editor this means that the user can t delete an instance | 1 |
70,233 | 15,058,298,659 | IssuesEvent | 2021-02-03 23:11:07 | MValle21/tetres | https://api.github.com/repos/MValle21/tetres | opened | CVE-2018-1000180 (High) detected in bcprov-jdk15on-1.56.jar | security vulnerability | ## CVE-2018-1000180 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk15on-1.56.jar</b></p></summary>
<p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.</p>
<p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p>
<p>Path to dependency file: tetres/Client/Flutter/plugins/tpp/android/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15on/1.56/a153c6f9744a3e9dd6feab5e210e1c9861362ec7/bcprov-jdk15on-1.56.jar</p>
<p>
Dependency Hierarchy:
- lint-gradle-26.5.0.jar (Root Library)
- builder-3.5.0.jar
- :x: **bcprov-jdk15on-1.56.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MValle21/tetres/commit/30f047806744652e17e9860a45741d02d3cb218d">30f047806744652e17e9860a45741d02d3cb218d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
<p>Publish Date: 2018-06-05
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000180>CVE-2018-1000180</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000180">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000180</a></p>
<p>Release Date: 2018-06-05</p>
<p>Fix Resolution: org.bouncycastle:bcprov-jdk15on:1.60,org.bouncycastle:bcprov-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk15on:1.60</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.bouncycastle","packageName":"bcprov-jdk15on","packageVersion":"1.56","packageFilePaths":["/Client/Flutter/plugins/tpp/android/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"com.android.tools.lint:lint-gradle:26.5.0;com.android.tools.build:builder:3.5.0;org.bouncycastle:bcprov-jdk15on:1.56","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.bouncycastle:bcprov-jdk15on:1.60,org.bouncycastle:bcprov-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk15on:1.60"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-1000180","vulnerabilityDetails":"Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000180","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2018-1000180 (High) detected in bcprov-jdk15on-1.56.jar - ## CVE-2018-1000180 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>bcprov-jdk15on-1.56.jar</b></p></summary>
<p>The Bouncy Castle Crypto package is a Java implementation of cryptographic algorithms. This jar contains JCE provider and lightweight API for the Bouncy Castle Cryptography APIs for JDK 1.5 to JDK 1.8.</p>
<p>Library home page: <a href="http://www.bouncycastle.org/java.html">http://www.bouncycastle.org/java.html</a></p>
<p>Path to dependency file: tetres/Client/Flutter/plugins/tpp/android/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.bouncycastle/bcprov-jdk15on/1.56/a153c6f9744a3e9dd6feab5e210e1c9861362ec7/bcprov-jdk15on-1.56.jar</p>
<p>
Dependency Hierarchy:
- lint-gradle-26.5.0.jar (Root Library)
- builder-3.5.0.jar
- :x: **bcprov-jdk15on-1.56.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/MValle21/tetres/commit/30f047806744652e17e9860a45741d02d3cb218d">30f047806744652e17e9860a45741d02d3cb218d</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.
<p>Publish Date: 2018-06-05
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000180>CVE-2018-1000180</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000180">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000180</a></p>
<p>Release Date: 2018-06-05</p>
<p>Fix Resolution: org.bouncycastle:bcprov-jdk15on:1.60,org.bouncycastle:bcprov-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk15on:1.60</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"Java","groupId":"org.bouncycastle","packageName":"bcprov-jdk15on","packageVersion":"1.56","packageFilePaths":["/Client/Flutter/plugins/tpp/android/build.gradle"],"isTransitiveDependency":true,"dependencyTree":"com.android.tools.lint:lint-gradle:26.5.0;com.android.tools.build:builder:3.5.0;org.bouncycastle:bcprov-jdk15on:1.56","isMinimumFixVersionAvailable":true,"minimumFixVersion":"org.bouncycastle:bcprov-jdk15on:1.60,org.bouncycastle:bcprov-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk14:1.60,org.bouncycastle:bcprov-ext-jdk15on:1.60"}],"baseBranches":["master"],"vulnerabilityIdentifier":"CVE-2018-1000180","vulnerabilityDetails":"Bouncy Castle BC 1.54 - 1.59, BC-FJA 1.0.0, BC-FJA 1.0.1 and earlier have a flaw in the Low-level interface to RSA key pair generator, specifically RSA Key Pairs generated in low-level API with added certainty may have less M-R tests than expected. This appears to be fixed in versions BC 1.60 beta 4 and later, BC-FJA 1.0.2 and later.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2018-1000180","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"None","AC":"Low","PR":"None","S":"Unchanged","C":"High","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in bcprov jar cve high severity vulnerability vulnerable library bcprov jar the bouncy castle crypto package is a java implementation of cryptographic algorithms this jar contains jce provider and lightweight api for the bouncy castle cryptography apis for jdk to jdk library home page a href path to dependency file tetres client flutter plugins tpp android build gradle path to vulnerable library home wss scanner gradle caches modules files org bouncycastle bcprov bcprov jar dependency hierarchy lint gradle jar root library builder jar x bcprov jar vulnerable library found in head commit a href found in base branch master vulnerability details bouncy castle bc bc fja bc fja and earlier have a flaw in the low level interface to rsa key pair generator specifically rsa key pairs generated in low level api with added certainty may have less m r tests than expected this appears to be fixed in versions bc beta and later bc fja and later publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org bouncycastle bcprov org bouncycastle bcprov org bouncycastle bcprov ext org bouncycastle bcprov ext isopenpronvulnerability true ispackagebased true isdefaultbranch true packages istransitivedependency true dependencytree com android tools lint lint gradle com android tools build builder org bouncycastle bcprov isminimumfixversionavailable true minimumfixversion org bouncycastle bcprov org bouncycastle bcprov org bouncycastle bcprov ext org bouncycastle bcprov ext basebranches vulnerabilityidentifier cve vulnerabilitydetails bouncy castle bc bc fja bc fja and earlier have a flaw in the low level interface to rsa key pair generator specifically rsa key pairs generated in low level api with added certainty may have less m r tests than expected this appears to be fixed in versions bc beta and later bc fja and later vulnerabilityurl | 0 |
568,995 | 16,992,344,157 | IssuesEvent | 2021-06-30 22:42:42 | celo-org/wallet | https://api.github.com/repos/celo-org/wallet | opened | Update push notification for rewards distribution | Component: Consumer Incentives Priority: P1 enhancement wallet | ### What would you like?
Change the text of the push notifications sent for rewards distributions
### Why is this needed?
We want a different text | 1.0 | Update push notification for rewards distribution - ### What would you like?
Change the text of the push notifications sent for rewards distributions
### Why is this needed?
We want a different text | priority | update push notification for rewards distribution what would you like change the text of the push notifications sent for rewards distributions why is this needed we want a different text | 1 |
565,766 | 16,769,331,502 | IssuesEvent | 2021-06-14 13:04:48 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | bbva.csod.com - design is broken | browser-firefox engine-gecko os-linux priority-normal | <!-- @browser: Firefox 78.0 -->
<!-- @ua_header: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/77014 -->
**URL**: https://bbva.csod.com/lms/scorm/clientLMS/LMS3.aspx?rNum=2&aicc_sid=31263586bbva&packageId=org-CUON043203&qs=%5e%5e%5emTzFNOw4vn4EPUFfLNAwfHWhuWDX3eTIRm08RdHiB4jyHk%2bXBoYanPQVba7OyJ3AjRfpxwTfF3qRdEB8S%2fqOdhfyv0g05XQbqR8SJWPXpLEaMvmuxaEiyuRQe4gjGX3sadK4QptUo3hmUCLmvu9USKu%2frUjbJf68CMMkjUms%2bNPaALkXScacCon63PswDSze%2fR4blrof8PjSyfFqHhJ%2f5w%3d%3d
**Browser / Version**: Firefox 78.0
**Operating System**: Linux
**Tested Another Browser**: Yes Other
**Problem type**: Design is broken
**Description**: Images not loaded
**Steps to Reproduce**:
no carga el contenido del curso en pantalla
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2021/6/397c0b52-706c-4e24-a9f3-4ee8242feca2.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200722151235</li><li>channel: esr78</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2021/6/89195385-bc38-4367-9981-393f71392c7c)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | bbva.csod.com - design is broken - <!-- @browser: Firefox 78.0 -->
<!-- @ua_header: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Firefox/78.0 -->
<!-- @reported_with: desktop-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/77014 -->
**URL**: https://bbva.csod.com/lms/scorm/clientLMS/LMS3.aspx?rNum=2&aicc_sid=31263586bbva&packageId=org-CUON043203&qs=%5e%5e%5emTzFNOw4vn4EPUFfLNAwfHWhuWDX3eTIRm08RdHiB4jyHk%2bXBoYanPQVba7OyJ3AjRfpxwTfF3qRdEB8S%2fqOdhfyv0g05XQbqR8SJWPXpLEaMvmuxaEiyuRQe4gjGX3sadK4QptUo3hmUCLmvu9USKu%2frUjbJf68CMMkjUms%2bNPaALkXScacCon63PswDSze%2fR4blrof8PjSyfFqHhJ%2f5w%3d%3d
**Browser / Version**: Firefox 78.0
**Operating System**: Linux
**Tested Another Browser**: Yes Other
**Problem type**: Design is broken
**Description**: Images not loaded
**Steps to Reproduce**:
no carga el contenido del curso en pantalla
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2021/6/397c0b52-706c-4e24-a9f3-4ee8242feca2.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20200722151235</li><li>channel: esr78</li><li>hasTouchScreen: false</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2021/6/89195385-bc38-4367-9981-393f71392c7c)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | bbva csod com design is broken url browser version firefox operating system linux tested another browser yes other problem type design is broken description images not loaded steps to reproduce no carga el contenido del curso en pantalla view the screenshot img alt screenshot src browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel hastouchscreen false mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️ | 1 |
680,634 | 23,280,558,190 | IssuesEvent | 2022-08-05 11:38:06 | ballerina-platform/ballerina-dev-website | https://api.github.com/repos/ballerina-platform/ballerina-dev-website | closed | Suggestions to improve the Publish packages to Ballerina Central page | Priority/Highest Type/Improvement Area/LearnPages WebsiteRewrite | ## Description
This is a list of suggestions to improve [1]
[1] https://dev.ballerina.io/learn/publish-packages-to-ballerina-central/#Create%20a%20library%20package
## Related website/documentation area
[> Add/Uncomment the relevant area label out of the following. ](https://dev.ballerina.io/learn/publish-packages-to-ballerina-central/#Create%20a%20library%20package)
<!--Area/BBEs-->
<!--Area/HomePageSamples-->
Area/LearnPages
<!--Area/CommonPages-->
<!--Area/Backend-->
<!--Area/UIUX-->
<!--Area/Workflows-->
<!--Area/Blog-->
## Describe the problem(s)
1. The introductory sentence includes the sentence "Use the `bal new` command to create a library package.". Then the section that follows is about creating a library package, and that instructs the user to use another command (i.e., `bal new -t lib`) for the same purpose. This can be confusing.
**Suggestion**: Shall we update the introductory sentence to describe what a package is and to state why a user would need to publish one?
2. Shall we re-organize the **Create a library package** section? Currently, there are the following issues:
- The file list is unnecessarily repeated.
- The **Package layout** link is repeated.
- It is not clear what the correct command to create a new library package is. Is `bal new -t lib` the format of the command, and `bal new --template lib hello` an example? If so, let's clearly state that?
- It is not clear what the last two code blocks are for.
**Suggestion**
Let's structure this section as follows?
1. Explain how to create a library package. If you want to provide both the command format and an example, first give the command format and explain each part of it (e.g., whether "t" represents the template name). Then provide an example.
2. Have the sentence "This creates the following files:" and have the code block with the file structure under it.
3. Under the code block which shows the file structure, explain each file in point format (as already done).
4. Have the sentence "For more information about these files, see [Package layout](https://dev.ballerina.io/learn/package-references/#package-layout). ".
5. If you are having the code block that starts with [package], state what it is.
6. Change the next sentence to "To generate the Ballerina archive, issue the following command:" The give the command below it. (This is because it is a recommended practice to state the purpose before the action).
7. If the next code block shows the resulting logs, include a sentence to state that.
3. Under the **Organizations** heading, there is a missing space after a fullstop (" package.If").
4. Replace "don't" with "do not because it is not recommended to use contractions.
5. The **Organizations** heading seems out of place because all other subheadings are in imperative tone.
## Suggested label(s) (optional)
website_revamp
| 1.0 | Suggestions to improve the Publish packages to Ballerina Central page - ## Description
This is a list of suggestions to improve [1]
[1] https://dev.ballerina.io/learn/publish-packages-to-ballerina-central/#Create%20a%20library%20package
## Related website/documentation area
[> Add/Uncomment the relevant area label out of the following. ](https://dev.ballerina.io/learn/publish-packages-to-ballerina-central/#Create%20a%20library%20package)
<!--Area/BBEs-->
<!--Area/HomePageSamples-->
Area/LearnPages
<!--Area/CommonPages-->
<!--Area/Backend-->
<!--Area/UIUX-->
<!--Area/Workflows-->
<!--Area/Blog-->
## Describe the problem(s)
1. The introductory sentence includes the sentence "Use the `bal new` command to create a library package.". Then the section that follows is about creating a library package, and that instructs the user to use another command (i.e., `bal new -t lib`) for the same purpose. This can be confusing.
**Suggestion**: Shall we update the introductory sentence to describe what a package is and to state why a user would need to publish one?
2. Shall we re-organize the **Create a library package** section? Currently, there are the following issues:
- The file list is unnecessarily repeated.
- The **Package layout** link is repeated.
- It is not clear what the correct command to create a new library package is. Is `bal new -t lib` the format of the command, and `bal new --template lib hello` an example? If so, let's clearly state that?
- It is not clear what the last two code blocks are for.
**Suggestion**
Let's structure this section as follows?
1. Explain how to create a library package. If you want to provide both the command format and an example, first give the command format and explain each part of it (e.g., whether "t" represents the template name). Then provide an example.
2. Have the sentence "This creates the following files:" and have the code block with the file structure under it.
3. Under the code block which shows the file structure, explain each file in point format (as already done).
4. Have the sentence "For more information about these files, see [Package layout](https://dev.ballerina.io/learn/package-references/#package-layout). ".
5. If you are having the code block that starts with [package], state what it is.
6. Change the next sentence to "To generate the Ballerina archive, issue the following command:" The give the command below it. (This is because it is a recommended practice to state the purpose before the action).
7. If the next code block shows the resulting logs, include a sentence to state that.
3. Under the **Organizations** heading, there is a missing space after a fullstop (" package.If").
4. Replace "don't" with "do not because it is not recommended to use contractions.
5. The **Organizations** heading seems out of place because all other subheadings are in imperative tone.
## Suggested label(s) (optional)
website_revamp
| priority | suggestions to improve the publish packages to ballerina central page description this is a list of suggestions to improve related website documentation area area learnpages describe the problem s the introductory sentence includes the sentence use the bal new command to create a library package then the section that follows is about creating a library package and that instructs the user to use another command i e bal new t lib for the same purpose this can be confusing suggestion shall we update the introductory sentence to describe what a package is and to state why a user would need to publish one shall we re organize the create a library package section currently there are the following issues the file list is unnecessarily repeated the package layout link is repeated it is not clear what the correct command to create a new library package is is bal new t lib the format of the command and bal new template lib hello an example if so let s clearly state that it is not clear what the last two code blocks are for suggestion let s structure this section as follows explain how to create a library package if you want to provide both the command format and an example first give the command format and explain each part of it e g whether t represents the template name then provide an example have the sentence this creates the following files and have the code block with the file structure under it under the code block which shows the file structure explain each file in point format as already done have the sentence for more information about these files see if you are having the code block that starts with state what it is change the next sentence to to generate the ballerina archive issue the following command the give the command below it this is because it is a recommended practice to state the purpose before the action if the next code block shows the resulting logs include a sentence to state that under the organizations heading there is a missing space after a fullstop package if replace don t with do not because it is not recommended to use contractions the organizations heading seems out of place because all other subheadings are in imperative tone suggested label s optional website revamp | 1 |
291,016 | 8,916,194,659 | IssuesEvent | 2019-01-19 14:17:57 | Warcraft-GoA-Development-Team/Warcraft-Guardians-of-Azeroth | https://api.github.com/repos/Warcraft-GoA-Development-Team/Warcraft-Guardians-of-Azeroth | opened | Heralds can sacrifice my prisoners without my consent | :beetle: bug - balance :balance_scale: :exclamation: priority high | Master branch
High (?)
Heralds can sacrifice my prisoners without my consent.
And their number of murders is incredibly high.
<details>
<summary>Click to expand</summary>



</details> | 1.0 | Heralds can sacrifice my prisoners without my consent - Master branch
High (?)
Heralds can sacrifice my prisoners without my consent.
And their number of murders is incredibly high.
<details>
<summary>Click to expand</summary>



</details> | priority | heralds can sacrifice my prisoners without my consent master branch high heralds can sacrifice my prisoners without my consent and their number of murders is incredibly high click to expand | 1 |
545,730 | 15,962,265,445 | IssuesEvent | 2021-04-16 00:53:58 | docker-mailserver/docker-mailserver | https://api.github.com/repos/docker-mailserver/docker-mailserver | closed | Encryption of maildata files and folders? | kind/question meta/help wanted meta/needs triage priority/low | # Subject
I'm curious what is recommended for encryption of the emails/text files stores under the maildata volume. I'd like to back these up to S3, but want to prevent them from being read without a key. Can dovecot or postfix even use a key for decryption and encryption?
Thanks! | 1.0 | Encryption of maildata files and folders? - # Subject
I'm curious what is recommended for encryption of the emails/text files stores under the maildata volume. I'd like to back these up to S3, but want to prevent them from being read without a key. Can dovecot or postfix even use a key for decryption and encryption?
Thanks! | priority | encryption of maildata files and folders subject i m curious what is recommended for encryption of the emails text files stores under the maildata volume i d like to back these up to but want to prevent them from being read without a key can dovecot or postfix even use a key for decryption and encryption thanks | 1 |
7,581 | 9,820,981,611 | IssuesEvent | 2019-06-14 05:29:03 | Lothrazar/Storage-Network | https://api.github.com/repos/Lothrazar/Storage-Network | closed | Storage Request Table messes up inventory order | bug compatibility done server | Minecraft version & Mod Version: 1.12.2 / 1.7.4
Single player or Server: Server
Describe problem (what you were doing / what happened): When opening the Storage Request Table, it will reorder all the items in my inventory by pushing them one slot to the right. This is purely visual, clicking on any item will reset the display.
Here is a gif of the issue: https://imgur.com/OSomjLC
Crash log (if any): no crashing | True | Storage Request Table messes up inventory order - Minecraft version & Mod Version: 1.12.2 / 1.7.4
Single player or Server: Server
Describe problem (what you were doing / what happened): When opening the Storage Request Table, it will reorder all the items in my inventory by pushing them one slot to the right. This is purely visual, clicking on any item will reset the display.
Here is a gif of the issue: https://imgur.com/OSomjLC
Crash log (if any): no crashing | non_priority | storage request table messes up inventory order minecraft version mod version single player or server server describe problem what you were doing what happened when opening the storage request table it will reorder all the items in my inventory by pushing them one slot to the right this is purely visual clicking on any item will reset the display here is a gif of the issue crash log if any no crashing | 0 |
48,319 | 13,068,441,140 | IssuesEvent | 2020-07-31 03:35:15 | icecube-trac/tix2 | https://api.github.com/repos/icecube-trac/tix2 | closed | Wrong datatype in steering file for 20208 -> unable to weight via from_simprod (Trac #2178) | Migrated from Trac analysis defect | Hi,
another problem with the steering file of 20208
(http://simprod.icecube.wisc.edu/cgi-bin/simulation/cgi/cfg?dataset=20208)
CORSIKA::eprimarymax string 1e6
should be either int or float, not string.
It being a string leads to this error in simprod:
File "/data/user/flauber/software/py2-v3.0.1/combo/stable/build/lib/icecube/weighting /weighting.py", line 834, in from_simprod
emax=steering['CORSIKA::eprimarymax']*I3Units.GeV,
TypeError: can't multiply sequence by non-int of type 'float'
Migrated from https://code.icecube.wisc.edu/ticket/2178
```json
{
"status": "closed",
"changetime": "2018-08-27T15:15:55",
"description": "Hi,\n\nanother problem with the steering file of 20208\n(http://simprod.icecube.wisc.edu/cgi-bin/simulation/cgi/cfg?dataset=20208)\n\nCORSIKA::eprimarymax\tstring\t1e6\nshould be either int or float, not string.\nIt being a string leads to this error in simprod:\n\n File \"/data/user/flauber/software/py2-v3.0.1/combo/stable/build/lib/icecube/weighting /weighting.py\", line 834, in from_simprod\n emax=steering['CORSIKA::eprimarymax']*I3Units.GeV,\n TypeError: can't multiply sequence by non-int of type 'float'\n\n",
"reporter": "flauber",
"cc": "",
"resolution": "fixed",
"_ts": "1535382955013988",
"component": "analysis",
"summary": "Wrong datatype in steering file for 20208 -> unable to weight via from_simprod",
"priority": "normal",
"keywords": "",
"time": "2018-07-30T13:16:33",
"milestone": "",
"owner": "",
"type": "defect"
}
```
| 1.0 | Wrong datatype in steering file for 20208 -> unable to weight via from_simprod (Trac #2178) - Hi,
another problem with the steering file of 20208
(http://simprod.icecube.wisc.edu/cgi-bin/simulation/cgi/cfg?dataset=20208)
CORSIKA::eprimarymax string 1e6
should be either int or float, not string.
It being a string leads to this error in simprod:
File "/data/user/flauber/software/py2-v3.0.1/combo/stable/build/lib/icecube/weighting /weighting.py", line 834, in from_simprod
emax=steering['CORSIKA::eprimarymax']*I3Units.GeV,
TypeError: can't multiply sequence by non-int of type 'float'
Migrated from https://code.icecube.wisc.edu/ticket/2178
```json
{
"status": "closed",
"changetime": "2018-08-27T15:15:55",
"description": "Hi,\n\nanother problem with the steering file of 20208\n(http://simprod.icecube.wisc.edu/cgi-bin/simulation/cgi/cfg?dataset=20208)\n\nCORSIKA::eprimarymax\tstring\t1e6\nshould be either int or float, not string.\nIt being a string leads to this error in simprod:\n\n File \"/data/user/flauber/software/py2-v3.0.1/combo/stable/build/lib/icecube/weighting /weighting.py\", line 834, in from_simprod\n emax=steering['CORSIKA::eprimarymax']*I3Units.GeV,\n TypeError: can't multiply sequence by non-int of type 'float'\n\n",
"reporter": "flauber",
"cc": "",
"resolution": "fixed",
"_ts": "1535382955013988",
"component": "analysis",
"summary": "Wrong datatype in steering file for 20208 -> unable to weight via from_simprod",
"priority": "normal",
"keywords": "",
"time": "2018-07-30T13:16:33",
"milestone": "",
"owner": "",
"type": "defect"
}
```
| non_priority | wrong datatype in steering file for unable to weight via from simprod trac hi another problem with the steering file of corsika eprimarymax string should be either int or float not string it being a string leads to this error in simprod file data user flauber software combo stable build lib icecube weighting weighting py line in from simprod emax steering gev typeerror can t multiply sequence by non int of type float migrated from json status closed changetime description hi n nanother problem with the steering file of n be either int or float not string nit being a string leads to this error in simprod n n file data user flauber software combo stable build lib icecube weighting weighting py line in from simprod n emax steering gev n typeerror can t multiply sequence by non int of type float n n reporter flauber cc resolution fixed ts component analysis summary wrong datatype in steering file for unable to weight via from simprod priority normal keywords time milestone owner type defect | 0 |
109,444 | 4,387,434,025 | IssuesEvent | 2016-08-08 15:46:51 | MinetestForFun/server-minetestforfun-hungry_games | https://api.github.com/repos/MinetestForFun/server-minetestforfun-hungry_games | closed | Server crash | Modding ➤ BugFix Priority: High Server crash | ```
2016-07-25 23:37:24: ERROR[Main]: ServerError: Lua: Runtime error from mod 'kill_history' in callback on_dieplayer(): ..../games/minetestforfun_hg/mods/kill_history/init.lua:81: attempt to index local 'coltab' (a nil value)
2016-07-25 23:37:24: ERROR[Main]: stack traceback:
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:81: in function 'get_colour'
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:204: in function 'update_huds'
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:115: in function 'add'
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:269: in function '?'
2016-07-25 23:37:24: ERROR[Main]: ...me/quentinbd/mff-hg/bin/../builtin/game/register.lua:369: in function <...me/quentinbd/mff-hg/bin/../builtin/game/register.lua:349>
```
:large_orange_diamond: | 1.0 | Server crash - ```
2016-07-25 23:37:24: ERROR[Main]: ServerError: Lua: Runtime error from mod 'kill_history' in callback on_dieplayer(): ..../games/minetestforfun_hg/mods/kill_history/init.lua:81: attempt to index local 'coltab' (a nil value)
2016-07-25 23:37:24: ERROR[Main]: stack traceback:
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:81: in function 'get_colour'
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:204: in function 'update_huds'
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:115: in function 'add'
2016-07-25 23:37:24: ERROR[Main]: ..../games/minetestforfun_hg/mods/kill_history/init.lua:269: in function '?'
2016-07-25 23:37:24: ERROR[Main]: ...me/quentinbd/mff-hg/bin/../builtin/game/register.lua:369: in function <...me/quentinbd/mff-hg/bin/../builtin/game/register.lua:349>
```
:large_orange_diamond: | priority | server crash error servererror lua runtime error from mod kill history in callback on dieplayer games minetestforfun hg mods kill history init lua attempt to index local coltab a nil value error stack traceback error games minetestforfun hg mods kill history init lua in function get colour error games minetestforfun hg mods kill history init lua in function update huds error games minetestforfun hg mods kill history init lua in function add error games minetestforfun hg mods kill history init lua in function error me quentinbd mff hg bin builtin game register lua in function large orange diamond | 1 |
78,665 | 3,512,662,749 | IssuesEvent | 2016-01-11 03:38:55 | SpongePowered/SpongeVanilla | https://api.github.com/repos/SpongePowered/SpongeVanilla | closed | Crash when generating a new world | accepted bug high-priority | ```
---- Minecraft Crash Report ----
// My bad.
Time: 1/10/16 9:51 PM
Description: Exception in server tick loop
java.lang.IllegalArgumentException
at com.google.common.base.Preconditions.checkArgument(Preconditions.java:111)
at net.minecraft.world.gen.feature.WorldGenLakes.setLiquidType(SourceFile:102)
at org.spongepowered.common.world.gen.builders.LakeBuilder.build(LakeBuilder.java:86)
at net.minecraft.world.gen.ChunkProviderGenerate.addPopulators(SourceFile:157)
at net.minecraft.world.World.updateWorldGenerator(SourceFile:1936)
at net.minecraft.world.WorldServer.beforeInit(SourceFile:92)
at net.minecraft.world.WorldServer.func_175643_b(SourceFile)
at net.minecraft.server.MinecraftServer.func_71247_a(SourceFile:437)
at net.minecraft.server.dedicated.DedicatedServer.func_71197_b(SourceFile:210)
at net.minecraft.server.MinecraftServer.run(SourceFile:417)
at java.lang.Thread.run(Thread.java:745)
A detailed walkthrough of the error, its code path and all known details is as follows:
---------------------------------------------------------------------------------------
-- System Details --
Details:
Minecraft Version: 1.8
Operating System: Linux (amd64) version 4.3.3-2-ARCH
Java Version: 1.8.0_66, Oracle Corporation
Java VM Version: OpenJDK 64-Bit Server VM (mixed mode), Oracle Corporation
Memory: 796593920 bytes (759 MB) / 1296039936 bytes (1236 MB) up to 7462191104 bytes (7116 MB)
JVM Flags: 0 total;
IntCache: cache: 0, tcache: 0, allocated: 0, tallocated: 0
Plugins:
Plugin{id=minecraft, name=Minecraft, version=1.8}
Plugin{id=sponge, name=SpongeVanilla, version=1.8-3.1.0-BETA-160}
Plugin{id=spongeapi, name=SpongeAPI, version=3.1.0-SNAPSHOT}
Profiler Position: N/A (disabled)
Player Count: 0 / 20; []
Is Modded: Definitely; Server brand changed to 'SpongeVanilla'
Type: Dedicated Server (map_server.txt)
``` | 1.0 | Crash when generating a new world - ```
---- Minecraft Crash Report ----
// My bad.
Time: 1/10/16 9:51 PM
Description: Exception in server tick loop
java.lang.IllegalArgumentException
at com.google.common.base.Preconditions.checkArgument(Preconditions.java:111)
at net.minecraft.world.gen.feature.WorldGenLakes.setLiquidType(SourceFile:102)
at org.spongepowered.common.world.gen.builders.LakeBuilder.build(LakeBuilder.java:86)
at net.minecraft.world.gen.ChunkProviderGenerate.addPopulators(SourceFile:157)
at net.minecraft.world.World.updateWorldGenerator(SourceFile:1936)
at net.minecraft.world.WorldServer.beforeInit(SourceFile:92)
at net.minecraft.world.WorldServer.func_175643_b(SourceFile)
at net.minecraft.server.MinecraftServer.func_71247_a(SourceFile:437)
at net.minecraft.server.dedicated.DedicatedServer.func_71197_b(SourceFile:210)
at net.minecraft.server.MinecraftServer.run(SourceFile:417)
at java.lang.Thread.run(Thread.java:745)
A detailed walkthrough of the error, its code path and all known details is as follows:
---------------------------------------------------------------------------------------
-- System Details --
Details:
Minecraft Version: 1.8
Operating System: Linux (amd64) version 4.3.3-2-ARCH
Java Version: 1.8.0_66, Oracle Corporation
Java VM Version: OpenJDK 64-Bit Server VM (mixed mode), Oracle Corporation
Memory: 796593920 bytes (759 MB) / 1296039936 bytes (1236 MB) up to 7462191104 bytes (7116 MB)
JVM Flags: 0 total;
IntCache: cache: 0, tcache: 0, allocated: 0, tallocated: 0
Plugins:
Plugin{id=minecraft, name=Minecraft, version=1.8}
Plugin{id=sponge, name=SpongeVanilla, version=1.8-3.1.0-BETA-160}
Plugin{id=spongeapi, name=SpongeAPI, version=3.1.0-SNAPSHOT}
Profiler Position: N/A (disabled)
Player Count: 0 / 20; []
Is Modded: Definitely; Server brand changed to 'SpongeVanilla'
Type: Dedicated Server (map_server.txt)
``` | priority | crash when generating a new world minecraft crash report my bad time pm description exception in server tick loop java lang illegalargumentexception at com google common base preconditions checkargument preconditions java at net minecraft world gen feature worldgenlakes setliquidtype sourcefile at org spongepowered common world gen builders lakebuilder build lakebuilder java at net minecraft world gen chunkprovidergenerate addpopulators sourcefile at net minecraft world world updateworldgenerator sourcefile at net minecraft world worldserver beforeinit sourcefile at net minecraft world worldserver func b sourcefile at net minecraft server minecraftserver func a sourcefile at net minecraft server dedicated dedicatedserver func b sourcefile at net minecraft server minecraftserver run sourcefile at java lang thread run thread java a detailed walkthrough of the error its code path and all known details is as follows system details details minecraft version operating system linux version arch java version oracle corporation java vm version openjdk bit server vm mixed mode oracle corporation memory bytes mb bytes mb up to bytes mb jvm flags total intcache cache tcache allocated tallocated plugins plugin id minecraft name minecraft version plugin id sponge name spongevanilla version beta plugin id spongeapi name spongeapi version snapshot profiler position n a disabled player count is modded definitely server brand changed to spongevanilla type dedicated server map server txt | 1 |
18,434 | 2,615,171,033 | IssuesEvent | 2015-03-01 06:52:57 | chrsmith/html5rocks | https://api.github.com/repos/chrsmith/html5rocks | closed | Tutorial: Synchronous FileSystem - example code not calling worker | auto-migrated Milestone-Q12012 Priority-P2 Tutorial Type-Bug | ```
http://master.html5rocks.appspot.com/en/tutorials/file/filesystem-sync/
Section: Passing around Files, Blobs, and ArrayBuffers
The example code for this does does not actually post the FileList to the
worker, as described ("The worker simply passes through the file list"). Adding
the following to the anonymous function passed to loadInlineWorker produces the
desired result:
worker.postMessage(files);
Also, there is a missing closing bracket in loadInlineWorker where callback is
invoked.
```
Original issue reported on code.google.com by `johngste...@gmail.com` on 14 Nov 2011 at 5:43 | 1.0 | Tutorial: Synchronous FileSystem - example code not calling worker - ```
http://master.html5rocks.appspot.com/en/tutorials/file/filesystem-sync/
Section: Passing around Files, Blobs, and ArrayBuffers
The example code for this does does not actually post the FileList to the
worker, as described ("The worker simply passes through the file list"). Adding
the following to the anonymous function passed to loadInlineWorker produces the
desired result:
worker.postMessage(files);
Also, there is a missing closing bracket in loadInlineWorker where callback is
invoked.
```
Original issue reported on code.google.com by `johngste...@gmail.com` on 14 Nov 2011 at 5:43 | priority | tutorial synchronous filesystem example code not calling worker section passing around files blobs and arraybuffers the example code for this does does not actually post the filelist to the worker as described the worker simply passes through the file list adding the following to the anonymous function passed to loadinlineworker produces the desired result worker postmessage files also there is a missing closing bracket in loadinlineworker where callback is invoked original issue reported on code google com by johngste gmail com on nov at | 1 |
53,796 | 3,050,857,315 | IssuesEvent | 2015-08-12 02:34:36 | yawlfoundation/yawl | https://api.github.com/repos/yawlfoundation/yawl | closed | Documentation: info on WSInvoker | auto-migrated Milestone-2.0 Priority-Medium Type-Enhancement | ```
Update the documentation for the WSInvoker by specifying that the following
restrictions apply to the web service that can be invoked by this custom
service:
- RPC-style only
- synchronous only
- input and output messages for the selected operation must have only one
part (to be verified)
- the part must be of type string, int, double, float, boolean and decimal
The attached is an example of this service
```
Original issue reported on code.google.com by `marcello...@gmail.com` on 3 Apr 2009 at 8:13 | 1.0 | Documentation: info on WSInvoker - ```
Update the documentation for the WSInvoker by specifying that the following
restrictions apply to the web service that can be invoked by this custom
service:
- RPC-style only
- synchronous only
- input and output messages for the selected operation must have only one
part (to be verified)
- the part must be of type string, int, double, float, boolean and decimal
The attached is an example of this service
```
Original issue reported on code.google.com by `marcello...@gmail.com` on 3 Apr 2009 at 8:13 | priority | documentation info on wsinvoker update the documentation for the wsinvoker by specifying that the following restrictions apply to the web service that can be invoked by this custom service rpc style only synchronous only input and output messages for the selected operation must have only one part to be verified the part must be of type string int double float boolean and decimal the attached is an example of this service original issue reported on code google com by marcello gmail com on apr at | 1 |
393,383 | 11,614,712,491 | IssuesEvent | 2020-02-26 13:04:29 | rathena/rathena | https://api.github.com/repos/rathena/rathena | closed | Cannot use Flash Combo at Ghost 3 and above | component:core mode:prerenewal mode:renewal priority:low status:confirmed type:bug | <!-- NOTE: Anything within these brackets will be hidden on the preview of the Issue. -->
* **rAthena Hash**: https://github.com/rathena/rathena/commit/1fc4b8de2063c90b74b7da95e3b105306a825c21
<!-- Please specify the rAthena [GitHub hash](https://help.github.com/articles/autolinked-references-and-urls/#commit-shas) on which you encountered this issue.
How to get your GitHub Hash:
1. cd your/rAthena/directory/
2. git rev-parse --short HEAD
3. Copy the resulting hash.
-->
* **Client Date**: 20180620
<!-- Please specify the client date you used. -->
* **Server Mode**: Renewal
<!-- Which mode does your server use: Pre-Renewal or Renewal? -->
* **Description of Issue**: I dont know this is intended or not. But after 16th anniversary patch, Flash Combo isnt working anymore at Ghost 3 element and above mob.
I think because of Tiger Canon code here ? https://github.com/rathena/rathena/blob/1fc4b8de2063c90b74b7da95e3b105306a825c21/src/map/skill.cpp#L3754
If this actually intended, so let me know, ill close this issue.
* Result: Flash Combo didnt do anything, but the skill will be in cooldown.<!-- Describe the issue that you experienced in detail. -->
* Expected Result: Can hit mob element Ghost 3 before. I dont know if this is intended or as it should be now.<!-- Describe what you would expect to happen in detail. -->
* How to Reproduce: Try to use Flash Combo at Evil Snake Lord or mob element Ghost 3 in Biolab Nightmare Dungeon.<!-- If you have not stated in the description of the result already, please give us a short guide how we can reproduce your issue. -->
* **Modifications that may affect results**: https://github.com/rathena/rathena/commit/e6a6c0533cf8a232a890e85d702417d3463c0dd1
<!-- * Please provide any information that could influence the expected result. -->
<!-- * This can be either configurations you changed, database values you changed, or even external source modifications. -->
| 1.0 | Cannot use Flash Combo at Ghost 3 and above - <!-- NOTE: Anything within these brackets will be hidden on the preview of the Issue. -->
* **rAthena Hash**: https://github.com/rathena/rathena/commit/1fc4b8de2063c90b74b7da95e3b105306a825c21
<!-- Please specify the rAthena [GitHub hash](https://help.github.com/articles/autolinked-references-and-urls/#commit-shas) on which you encountered this issue.
How to get your GitHub Hash:
1. cd your/rAthena/directory/
2. git rev-parse --short HEAD
3. Copy the resulting hash.
-->
* **Client Date**: 20180620
<!-- Please specify the client date you used. -->
* **Server Mode**: Renewal
<!-- Which mode does your server use: Pre-Renewal or Renewal? -->
* **Description of Issue**: I dont know this is intended or not. But after 16th anniversary patch, Flash Combo isnt working anymore at Ghost 3 element and above mob.
I think because of Tiger Canon code here ? https://github.com/rathena/rathena/blob/1fc4b8de2063c90b74b7da95e3b105306a825c21/src/map/skill.cpp#L3754
If this actually intended, so let me know, ill close this issue.
* Result: Flash Combo didnt do anything, but the skill will be in cooldown.<!-- Describe the issue that you experienced in detail. -->
* Expected Result: Can hit mob element Ghost 3 before. I dont know if this is intended or as it should be now.<!-- Describe what you would expect to happen in detail. -->
* How to Reproduce: Try to use Flash Combo at Evil Snake Lord or mob element Ghost 3 in Biolab Nightmare Dungeon.<!-- If you have not stated in the description of the result already, please give us a short guide how we can reproduce your issue. -->
* **Modifications that may affect results**: https://github.com/rathena/rathena/commit/e6a6c0533cf8a232a890e85d702417d3463c0dd1
<!-- * Please provide any information that could influence the expected result. -->
<!-- * This can be either configurations you changed, database values you changed, or even external source modifications. -->
| priority | cannot use flash combo at ghost and above rathena hash please specify the rathena on which you encountered this issue how to get your github hash cd your rathena directory git rev parse short head copy the resulting hash client date server mode renewal description of issue i dont know this is intended or not but after anniversary patch flash combo isnt working anymore at ghost element and above mob i think because of tiger canon code here if this actually intended so let me know ill close this issue result flash combo didnt do anything but the skill will be in cooldown expected result can hit mob element ghost before i dont know if this is intended or as it should be now how to reproduce try to use flash combo at evil snake lord or mob element ghost in biolab nightmare dungeon modifications that may affect results | 1 |
238,394 | 7,779,138,331 | IssuesEvent | 2018-06-05 15:55:45 | mozilla/addons-frontend | https://api.github.com/repos/mozilla/addons-frontend | closed | Delete profile picture text overlaps its border when clicked | component: user profile priority: p4 size: S type: bug | Steps to reproduce:
1.Go to AMO-dev and log in with an account having a profile picture
2.Go to edit profile page
3.Click on "Delete this picture" photo
Expected results:
The text should properly fit inside the blue border displayed when clicking the text
Actual results:
The text overlaps the blue border
Please see video for this bug :

| 1.0 | Delete profile picture text overlaps its border when clicked - Steps to reproduce:
1.Go to AMO-dev and log in with an account having a profile picture
2.Go to edit profile page
3.Click on "Delete this picture" photo
Expected results:
The text should properly fit inside the blue border displayed when clicking the text
Actual results:
The text overlaps the blue border
Please see video for this bug :

| priority | delete profile picture text overlaps its border when clicked steps to reproduce go to amo dev and log in with an account having a profile picture go to edit profile page click on delete this picture photo expected results the text should properly fit inside the blue border displayed when clicking the text actual results the text overlaps the blue border please see video for this bug | 1 |
627,859 | 19,915,723,474 | IssuesEvent | 2022-01-25 22:22:07 | Azure/azure-sdk-tools | https://api.github.com/repos/Azure/azure-sdk-tools | closed | [APIView] Should not create automatic diff if the only difference is tooling number | enhancement APIView Central-EngSys APIView Priority 1 Python | Example:
https://apiview.dev/Assemblies/Review/18826b88a9ba482fab51d53572e740a6

| 1.0 | [APIView] Should not create automatic diff if the only difference is tooling number - Example:
https://apiview.dev/Assemblies/Review/18826b88a9ba482fab51d53572e740a6

| priority | should not create automatic diff if the only difference is tooling number example | 1 |
69,726 | 30,466,296,294 | IssuesEvent | 2023-07-17 10:35:55 | Azure/azure-sdk-for-net | https://api.github.com/repos/Azure/azure-sdk-for-net | closed | Cannot update Data Transparent Data Encryption State | SQL Service Attention Mgmt customer-reported bug issue-addressed | ### Library name and version
Azure.ResourceManager.Sql 1.1.0
### Describe the bug
I am trying to update data transparent data encryption state from C# code. However, i can not update due to NullReferenceException thrown from inside package:

My step is only getting it from azure resource and update state property to enable/disable it.
### Expected behavior
Can enable/disable data encryption
### Actual behavior
Throw NullReferenceException
StackTrace:
at Azure.ResourceManager.Sql.LogicalDatabaseTransparentDataEncryptionResource.<UpdateAsync>d__16.MoveNext()
at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)
at System.Runtime.CompilerServices.ConfiguredTaskAwaitable`1.ConfiguredTaskAwaiter.GetResult()
### Reproduction Steps
1. Retrieve logicalDatabaseTransparentDataEncryption
2. set state = enable/disable
3. Call logicalDatabaseTransparentDataEncryptionResource.UpdateAsync with data above: logicalDatabaseTransparentDataEncryption
### Environment
NET SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.19044
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 70ae3df4a6
.NET SDKs installed:
2.1.818 [C:\Program Files\dotnet\sdk]
6.0.300 [C:\Program Files\dotnet\sdk]
.NET runtimes installed:
Microsoft.AspNetCore.All 2.1.30 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.All]
Microsoft.AspNetCore.App 2.1.30 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 2.1.30 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
| 1.0 | Cannot update Data Transparent Data Encryption State - ### Library name and version
Azure.ResourceManager.Sql 1.1.0
### Describe the bug
I am trying to update data transparent data encryption state from C# code. However, i can not update due to NullReferenceException thrown from inside package:

My step is only getting it from azure resource and update state property to enable/disable it.
### Expected behavior
Can enable/disable data encryption
### Actual behavior
Throw NullReferenceException
StackTrace:
at Azure.ResourceManager.Sql.LogicalDatabaseTransparentDataEncryptionResource.<UpdateAsync>d__16.MoveNext()
at System.Runtime.CompilerServices.TaskAwaiter.ThrowForNonSuccess(Task task)
at System.Runtime.CompilerServices.TaskAwaiter.HandleNonSuccessAndDebuggerNotification(Task task)
at System.Runtime.CompilerServices.ConfiguredTaskAwaitable`1.ConfiguredTaskAwaiter.GetResult()
### Reproduction Steps
1. Retrieve logicalDatabaseTransparentDataEncryption
2. set state = enable/disable
3. Call logicalDatabaseTransparentDataEncryptionResource.UpdateAsync with data above: logicalDatabaseTransparentDataEncryption
### Environment
NET SDK (reflecting any global.json):
Version: 6.0.300
Commit: 8473146e7d
Runtime Environment:
OS Name: Windows
OS Version: 10.0.19044
OS Platform: Windows
RID: win10-x64
Base Path: C:\Program Files\dotnet\sdk\6.0.300\
Host (useful for support):
Version: 6.0.5
Commit: 70ae3df4a6
.NET SDKs installed:
2.1.818 [C:\Program Files\dotnet\sdk]
6.0.300 [C:\Program Files\dotnet\sdk]
.NET runtimes installed:
Microsoft.AspNetCore.All 2.1.30 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.All]
Microsoft.AspNetCore.App 2.1.30 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.AspNetCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.AspNetCore.App]
Microsoft.NETCore.App 2.1.30 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.NETCore.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.NETCore.App]
Microsoft.WindowsDesktop.App 6.0.5 [C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App]
| non_priority | cannot update data transparent data encryption state library name and version azure resourcemanager sql describe the bug i am trying to update data transparent data encryption state from c code however i can not update due to nullreferenceexception thrown from inside package my step is only getting it from azure resource and update state property to enable disable it expected behavior can enable disable data encryption actual behavior throw nullreferenceexception stacktrace at azure resourcemanager sql logicaldatabasetransparentdataencryptionresource d movenext at system runtime compilerservices taskawaiter throwfornonsuccess task task at system runtime compilerservices taskawaiter handlenonsuccessanddebuggernotification task task at system runtime compilerservices configuredtaskawaitable configuredtaskawaiter getresult reproduction steps retrieve logicaldatabasetransparentdataencryption set state enable disable call logicaldatabasetransparentdataencryptionresource updateasync with data above logicaldatabasetransparentdataencryption environment net sdk reflecting any global json version commit runtime environment os name windows os version os platform windows rid base path c program files dotnet sdk host useful for support version commit net sdks installed net runtimes installed microsoft aspnetcore all microsoft aspnetcore app microsoft aspnetcore app microsoft netcore app microsoft netcore app microsoft windowsdesktop app | 0 |
121,202 | 4,806,298,612 | IssuesEvent | 2016-11-02 18:10:07 | openshift/origin-web-console | https://api.github.com/repos/openshift/origin-web-console | closed | Secrets page contains doubled border underneath h1 | area/styles kind/bug priority/P3 | <img width="1018" alt="screen shot 2016-11-01 at 10 26 25 am" src="https://cloud.githubusercontent.com/assets/895728/19893079/466d1a40-a01e-11e6-9c7c-5b7521929a45.PNG">
Related issue: #779 | 1.0 | Secrets page contains doubled border underneath h1 - <img width="1018" alt="screen shot 2016-11-01 at 10 26 25 am" src="https://cloud.githubusercontent.com/assets/895728/19893079/466d1a40-a01e-11e6-9c7c-5b7521929a45.PNG">
Related issue: #779 | priority | secrets page contains doubled border underneath img width alt screen shot at am src related issue | 1 |
805,742 | 29,660,877,265 | IssuesEvent | 2023-06-10 06:03:59 | renovatebot/renovate | https://api.github.com/repos/renovatebot/renovate | closed | Use `structureClone()` function for deep clone if available | type:refactor good first issue status:blocked priority-5-triage | ### Describe the proposed change(s).
It seems to be available starting from Node v17. See also:
https://developer.mozilla.org/en-US/docs/Web/API/structuredClone
| 1.0 | Use `structureClone()` function for deep clone if available - ### Describe the proposed change(s).
It seems to be available starting from Node v17. See also:
https://developer.mozilla.org/en-US/docs/Web/API/structuredClone
| priority | use structureclone function for deep clone if available describe the proposed change s it seems to be available starting from node see also | 1 |
16,777 | 2,945,224,761 | IssuesEvent | 2015-07-03 11:20:28 | Kiri-rin/markdownsharp | https://api.github.com/repos/Kiri-rin/markdownsharp | closed | Add SkipCodeBlocks Option | auto-migrated Priority-Medium Type-Defect | ```
This adds the ability to set a markdown option to skip code blocks
which is helpful when parsing output that was originally built
with xml like a nuspec where it automatically indents everything
four spaces for you. When that gets pushed to nuget.org or
chocolatey.org, the content is parsed and incorrectly assumes
that it is a code block. Having the option to shut that off is
quite beneficial versus trying to tell everyone to remove the
indention for new lines.
Patch attached.
```
Original issue reported on code.google.com by `trueblu...@gmail.com` on 1 Jan 2015 at 2:35
Attachments:
* [SkipCodeBlocks.patch](https://storage.googleapis.com/google-code-attachments/markdownsharp/issue-68/comment-0/SkipCodeBlocks.patch)
| 1.0 | Add SkipCodeBlocks Option - ```
This adds the ability to set a markdown option to skip code blocks
which is helpful when parsing output that was originally built
with xml like a nuspec where it automatically indents everything
four spaces for you. When that gets pushed to nuget.org or
chocolatey.org, the content is parsed and incorrectly assumes
that it is a code block. Having the option to shut that off is
quite beneficial versus trying to tell everyone to remove the
indention for new lines.
Patch attached.
```
Original issue reported on code.google.com by `trueblu...@gmail.com` on 1 Jan 2015 at 2:35
Attachments:
* [SkipCodeBlocks.patch](https://storage.googleapis.com/google-code-attachments/markdownsharp/issue-68/comment-0/SkipCodeBlocks.patch)
| non_priority | add skipcodeblocks option this adds the ability to set a markdown option to skip code blocks which is helpful when parsing output that was originally built with xml like a nuspec where it automatically indents everything four spaces for you when that gets pushed to nuget org or chocolatey org the content is parsed and incorrectly assumes that it is a code block having the option to shut that off is quite beneficial versus trying to tell everyone to remove the indention for new lines patch attached original issue reported on code google com by trueblu gmail com on jan at attachments | 0 |
285,757 | 31,155,548,047 | IssuesEvent | 2023-08-16 12:55:31 | nidhi7598/linux-4.1.15_CVE-2018-5873 | https://api.github.com/repos/nidhi7598/linux-4.1.15_CVE-2018-5873 | opened | CVE-2023-31248 (High) detected in linuxlinux-4.1.52 | Mend: dependency security vulnerability | ## CVE-2023-31248 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.52</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_tables_api.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_tables_api.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
<p>Publish Date: 2023-07-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-31248>CVE-2023-31248</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-31248">https://www.linuxkernelcves.com/cves/CVE-2023-31248</a></p>
<p>Release Date: 2023-07-05</p>
<p>Fix Resolution: v5.10.188,v5.15.121,v6.1.39,v6.4.4,v6.5-rc2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2023-31248 (High) detected in linuxlinux-4.1.52 - ## CVE-2023-31248 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linuxlinux-4.1.52</b></p></summary>
<p>
<p>The Linux Kernel</p>
<p>Library home page: <a href=https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux>https://mirrors.edge.kernel.org/pub/linux/kernel/v4.x/?wsslib=linux</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (2)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_tables_api.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/net/netfilter/nf_tables_api.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> Vulnerability Details</summary>
<p>
Linux Kernel nftables Use-After-Free Local Privilege Escalation Vulnerability; `nft_chain_lookup_byid()` failed to check whether a chain was active and CAP_NET_ADMIN is in any user or network namespace
<p>Publish Date: 2023-07-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-31248>CVE-2023-31248</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2023-31248">https://www.linuxkernelcves.com/cves/CVE-2023-31248</a></p>
<p>Release Date: 2023-07-05</p>
<p>Fix Resolution: v5.10.188,v5.15.121,v6.1.39,v6.4.4,v6.5-rc2</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linuxlinux cve high severity vulnerability vulnerable library linuxlinux the linux kernel library home page a href found in base branch master vulnerable source files net netfilter nf tables api c net netfilter nf tables api c vulnerability details linux kernel nftables use after free local privilege escalation vulnerability nft chain lookup byid failed to check whether a chain was active and cap net admin is in any user or network namespace publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with mend | 0 |
56,117 | 11,504,821,313 | IssuesEvent | 2020-02-13 00:25:25 | phetsims/normal-modes | https://api.github.com/repos/phetsims/normal-modes | closed | review design of Speed control, use TimeControlNode | design:general dev:code-review meeting:design | Noticed during #2 (code review), and related to https://github.com/phetsims/scenery-phet/issues/575 (redesign of TimeControlNode).
This sim has a time control, see screenshot below. It should be using `SCENERY_PHET/TimeControlNode`. The slider is not part of TimeControlNode. Is this a necessary part of the design, or could this sim be using radio buttons ala TimeControlNode?
<img width="232" alt="screenshot_111" src="https://user-images.githubusercontent.com/3046552/74186529-096fe980-4c08-11ea-8047-892d39c57a6e.png">
| 1.0 | review design of Speed control, use TimeControlNode - Noticed during #2 (code review), and related to https://github.com/phetsims/scenery-phet/issues/575 (redesign of TimeControlNode).
This sim has a time control, see screenshot below. It should be using `SCENERY_PHET/TimeControlNode`. The slider is not part of TimeControlNode. Is this a necessary part of the design, or could this sim be using radio buttons ala TimeControlNode?
<img width="232" alt="screenshot_111" src="https://user-images.githubusercontent.com/3046552/74186529-096fe980-4c08-11ea-8047-892d39c57a6e.png">
| non_priority | review design of speed control use timecontrolnode noticed during code review and related to redesign of timecontrolnode this sim has a time control see screenshot below it should be using scenery phet timecontrolnode the slider is not part of timecontrolnode is this a necessary part of the design or could this sim be using radio buttons ala timecontrolnode img width alt screenshot src | 0 |
368,684 | 10,883,248,013 | IssuesEvent | 2019-11-18 04:02:40 | etternagame/etterna | https://api.github.com/repos/etternagame/etterna | closed | Remove or Fix Blind Modifier | Good First Issue Priority: Low Type: Bug Type: Maintenance | this is very broken and was effectively replaced by the Judgment Text toggle
intended behavior is that it just turns visual judgment feedback off but instead it causes notes to disappear instantly no matter what timing window you have (you can hit notes that arent on the screen) | 1.0 | Remove or Fix Blind Modifier - this is very broken and was effectively replaced by the Judgment Text toggle
intended behavior is that it just turns visual judgment feedback off but instead it causes notes to disappear instantly no matter what timing window you have (you can hit notes that arent on the screen) | priority | remove or fix blind modifier this is very broken and was effectively replaced by the judgment text toggle intended behavior is that it just turns visual judgment feedback off but instead it causes notes to disappear instantly no matter what timing window you have you can hit notes that arent on the screen | 1 |
154,225 | 19,710,929,796 | IssuesEvent | 2022-01-13 05:10:53 | ChoeMinji/redis-6.2.3 | https://api.github.com/repos/ChoeMinji/redis-6.2.3 | opened | CVE-2021-32675 (High) detected in multiple libraries | security vulnerability | ## CVE-2021-32675 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>redis6.2.6</b>, <b>redis6.2.6</b>, <b>redis6.2.6</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways: Using network access control tools like firewalls, iptables, security groups, etc. or Enabling TLS and requiring users to authenticate using client side certificates.
<p>Publish Date: 2021-10-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32675>CVE-2021-32675</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a></p>
<p>Release Date: 2021-10-04</p>
<p>Fix Resolution: 5.0.14, 6.0.16, 6.2.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-32675 (High) detected in multiple libraries - ## CVE-2021-32675 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>redis6.2.6</b>, <b>redis6.2.6</b>, <b>redis6.2.6</b></p></summary>
<p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Redis is an open source, in-memory database that persists on disk. When parsing an incoming Redis Standard Protocol (RESP) request, Redis allocates memory according to user-specified values which determine the number of elements (in the multi-bulk header) and size of each element (in the bulk header). An attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory. Because the same parsing mechanism is used to handle authentication requests, this vulnerability can also be exploited by unauthenticated users. The problem is fixed in Redis versions 6.2.6, 6.0.16 and 5.0.14. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways: Using network access control tools like firewalls, iptables, security groups, etc. or Enabling TLS and requiring users to authenticate using client side certificates.
<p>Publish Date: 2021-10-04
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-32675>CVE-2021-32675</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p">https://github.com/redis/redis/security/advisories/GHSA-f6pw-v9gw-v64p</a></p>
<p>Release Date: 2021-10-04</p>
<p>Fix Resolution: 5.0.14, 6.0.16, 6.2.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in multiple libraries cve high severity vulnerability vulnerable libraries vulnerability details redis is an open source in memory database that persists on disk when parsing an incoming redis standard protocol resp request redis allocates memory according to user specified values which determine the number of elements in the multi bulk header and size of each element in the bulk header an attacker delivering specially crafted requests over multiple connections can cause the server to allocate significant amount of memory because the same parsing mechanism is used to handle authentication requests this vulnerability can also be exploited by unauthenticated users the problem is fixed in redis versions and an additional workaround to mitigate this problem without patching the redis server executable is to block access to prevent unauthenticated users from connecting to redis this can be done in different ways using network access control tools like firewalls iptables security groups etc or enabling tls and requiring users to authenticate using client side certificates publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
699,909 | 24,036,558,730 | IssuesEvent | 2022-09-15 19:46:47 | rancher/rancher | https://api.github.com/repos/rancher/rancher | opened | [Backport v2.6] [BUG][Monitoring v2]Prometheus target serviceMonitor/kube-system/rancher-monitoring-coredns is down in k3s hardened cluster - connect refused | priority/1 kind/bug-qa area/monitoring feature/charts-monitoring-v2 team/area3 | This is a backport issue for https://github.com/rancher/rancher/issues/38820, automatically created via rancherbot by @MKlimuszka
Original issue description:
**Rancher Server Setup**
- Rancher version: `2.6-head Commit ID cb9ccde`
- Installation option (Docker install/Helm Chart): `Helm`
- If Helm Chart, Kubernetes Cluster and version (RKE1, RKE2, k3s, EKS, etc): `k3s`
- Proxy/Cert Details:
**Information about the Cluster**
- Kubernetes version: `v1.24.4`
- Cluster Type (Local/Downstream):
- If downstream, what type of cluster? (Custom/Imported or specify provider for Hosted/Infrastructure Provider): `imported`
<!--
* Custom = Running a docker command on a node
* Imported = Running kubectl apply onto an existing k8s cluster
* Hosted = EKS, GKE, AKS, etc
* Infrastructure Provider = Rancher provisioning the nodes using different node drivers (e.g. AWS, Digital Ocean, etc)
-->
**User Information**
- What is the role of the user logged in? (Admin/Cluster Owner/Cluster Member/Project Owner/Project Member/Custom)
- If custom, define the set of permissions: `standard user`
**Describe the bug**
<!--A clear and concise description of what the bug is.-->
After installing monitoring, prometheus target: serviceMonitor/kube-system/rancher-monitoring-coredns/ is down. restarting the pod does not resolve issue.
I don't see this error on a non-hardened cluster
**To Reproduce**
1. import hardened k3s cluster
2. create standard user
3. install monitoring (100.1.3+up19.0.3)
4. install alerting drivers chart (100.0.3)
5. navigate to cluster>monitoring
6. select 'prometheus targets' link
**Result**
prometheus target is down
**Expected Result**
<!--A clear and concise description of what you expected to happen.-->
all prometheus targets are healthy/running
**Screenshots**
<!-- If applicable, add screenshots to help explain your problem.-->

**Additional context**
<!--Add any other context about the problem here.-->
| 1.0 | [Backport v2.6] [BUG][Monitoring v2]Prometheus target serviceMonitor/kube-system/rancher-monitoring-coredns is down in k3s hardened cluster - connect refused - This is a backport issue for https://github.com/rancher/rancher/issues/38820, automatically created via rancherbot by @MKlimuszka
Original issue description:
**Rancher Server Setup**
- Rancher version: `2.6-head Commit ID cb9ccde`
- Installation option (Docker install/Helm Chart): `Helm`
- If Helm Chart, Kubernetes Cluster and version (RKE1, RKE2, k3s, EKS, etc): `k3s`
- Proxy/Cert Details:
**Information about the Cluster**
- Kubernetes version: `v1.24.4`
- Cluster Type (Local/Downstream):
- If downstream, what type of cluster? (Custom/Imported or specify provider for Hosted/Infrastructure Provider): `imported`
<!--
* Custom = Running a docker command on a node
* Imported = Running kubectl apply onto an existing k8s cluster
* Hosted = EKS, GKE, AKS, etc
* Infrastructure Provider = Rancher provisioning the nodes using different node drivers (e.g. AWS, Digital Ocean, etc)
-->
**User Information**
- What is the role of the user logged in? (Admin/Cluster Owner/Cluster Member/Project Owner/Project Member/Custom)
- If custom, define the set of permissions: `standard user`
**Describe the bug**
<!--A clear and concise description of what the bug is.-->
After installing monitoring, prometheus target: serviceMonitor/kube-system/rancher-monitoring-coredns/ is down. restarting the pod does not resolve issue.
I don't see this error on a non-hardened cluster
**To Reproduce**
1. import hardened k3s cluster
2. create standard user
3. install monitoring (100.1.3+up19.0.3)
4. install alerting drivers chart (100.0.3)
5. navigate to cluster>monitoring
6. select 'prometheus targets' link
**Result**
prometheus target is down
**Expected Result**
<!--A clear and concise description of what you expected to happen.-->
all prometheus targets are healthy/running
**Screenshots**
<!-- If applicable, add screenshots to help explain your problem.-->

**Additional context**
<!--Add any other context about the problem here.-->
| priority | prometheus target servicemonitor kube system rancher monitoring coredns is down in hardened cluster connect refused this is a backport issue for automatically created via rancherbot by mklimuszka original issue description rancher server setup rancher version head commit id installation option docker install helm chart helm if helm chart kubernetes cluster and version eks etc proxy cert details information about the cluster kubernetes version cluster type local downstream if downstream what type of cluster custom imported or specify provider for hosted infrastructure provider imported custom running a docker command on a node imported running kubectl apply onto an existing cluster hosted eks gke aks etc infrastructure provider rancher provisioning the nodes using different node drivers e g aws digital ocean etc user information what is the role of the user logged in admin cluster owner cluster member project owner project member custom if custom define the set of permissions standard user describe the bug after installing monitoring prometheus target servicemonitor kube system rancher monitoring coredns is down restarting the pod does not resolve issue i don t see this error on a non hardened cluster to reproduce import hardened cluster create standard user install monitoring install alerting drivers chart navigate to cluster monitoring select prometheus targets link result prometheus target is down expected result all prometheus targets are healthy running screenshots additional context | 1 |
771,473 | 27,086,188,729 | IssuesEvent | 2023-02-14 17:09:25 | balena-os/balena-supervisor | https://api.github.com/repos/balena-os/balena-supervisor | closed | Two networks with the same name can make the supervisor unable to apply the target state (network is ambiguous) | type/bug High priority | Seen once, in a device that was updated from version 7.1.11 to 7.1.14. I'm not sure if anything particular about this device or its application might have triggered this particular situation.
Basically, there were two networks with the same name (`<appId>_default`) and this made balena complain with a `server error - 500` because a command referencing the network by its name was ambiguous. Both networks had the `io.resin.supervised` label. I still don't see how the supervisor would create an additional network with the same name if the network already exists - unless there's some weird race condition or something like that. Needs investigation, so if this happens again please record supervisor logs and what precise actions got the device in this state.
Workaround was to delete one of the conflicting networks with `balena network rm <network ID>`.
<img src="https://frontapp.com/assets/img/icons/favicon-32x32.png" height="16" width="16" alt="Front logo" /> [Front conversations](https://app.frontapp.com/open/top_cznn)
<img src="https://frontapp.com/assets/img/icons/favicon-32x32.png" height="16" width="16" alt="Front logo" /> [Front conversations](https://app.frontapp.com/open/top_gtgj) | 1.0 | Two networks with the same name can make the supervisor unable to apply the target state (network is ambiguous) - Seen once, in a device that was updated from version 7.1.11 to 7.1.14. I'm not sure if anything particular about this device or its application might have triggered this particular situation.
Basically, there were two networks with the same name (`<appId>_default`) and this made balena complain with a `server error - 500` because a command referencing the network by its name was ambiguous. Both networks had the `io.resin.supervised` label. I still don't see how the supervisor would create an additional network with the same name if the network already exists - unless there's some weird race condition or something like that. Needs investigation, so if this happens again please record supervisor logs and what precise actions got the device in this state.
Workaround was to delete one of the conflicting networks with `balena network rm <network ID>`.
<img src="https://frontapp.com/assets/img/icons/favicon-32x32.png" height="16" width="16" alt="Front logo" /> [Front conversations](https://app.frontapp.com/open/top_cznn)
<img src="https://frontapp.com/assets/img/icons/favicon-32x32.png" height="16" width="16" alt="Front logo" /> [Front conversations](https://app.frontapp.com/open/top_gtgj) | priority | two networks with the same name can make the supervisor unable to apply the target state network is ambiguous seen once in a device that was updated from version to i m not sure if anything particular about this device or its application might have triggered this particular situation basically there were two networks with the same name default and this made balena complain with a server error because a command referencing the network by its name was ambiguous both networks had the io resin supervised label i still don t see how the supervisor would create an additional network with the same name if the network already exists unless there s some weird race condition or something like that needs investigation so if this happens again please record supervisor logs and what precise actions got the device in this state workaround was to delete one of the conflicting networks with balena network rm | 1 |
655,218 | 21,681,368,303 | IssuesEvent | 2022-05-09 07:00:02 | PierreHervelin/projet2-metaverse | https://api.github.com/repos/PierreHervelin/projet2-metaverse | closed | Component PlayerModel | question client 3D priority-1 feature | (A voir si c'est possible @Ki2lian)
Le PlayerModel implémenterai seulement le mesh, avec une position, un model, une animation etc...
Le Player implémenterai toute la logique d'action de l'utilisateur sur le PlayerModel.
Le joueur qu'on contrôle serait un Player, les autres joueurs seraient des PlayerModel | 1.0 | Component PlayerModel - (A voir si c'est possible @Ki2lian)
Le PlayerModel implémenterai seulement le mesh, avec une position, un model, une animation etc...
Le Player implémenterai toute la logique d'action de l'utilisateur sur le PlayerModel.
Le joueur qu'on contrôle serait un Player, les autres joueurs seraient des PlayerModel | priority | component playermodel a voir si c est possible le playermodel implémenterai seulement le mesh avec une position un model une animation etc le player implémenterai toute la logique d action de l utilisateur sur le playermodel le joueur qu on contrôle serait un player les autres joueurs seraient des playermodel | 1 |
309,531 | 26,667,554,690 | IssuesEvent | 2023-01-26 06:42:17 | pytorch/pytorch | https://api.github.com/repos/pytorch/pytorch | opened | DISABLED test_dynamic_shapes_right_side_dynamic_shapes (torch._dynamo.testing.make_test_cls_with_patches.<locals>.DummyTestClass) | triaged module: flaky-tests skipped module: dynamo | Platforms: linux
This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_dynamic_shapes_right_side_dynamic_shapes&suite=torch._dynamo.testing.make_test_cls_with_patches.<locals>.DummyTestClass) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/10891615823).
Over the past 3 hours, it has been determined flaky in 2 workflow(s) with 2 failures and 2 successes.
**Debugging instructions (after clicking on the recent samples link):**
DO NOT ASSUME THINGS ARE OKAY IF THE CI IS GREEN. We now shield flaky tests from developers so CI will thus be green but it will be harder to parse the logs.
To find relevant log snippets:
1. Click on the workflow logs linked above
2. Click on the Test step of the job so that it is expanded. Otherwise, the grepping will not work.
3. Grep for `test_dynamic_shapes_right_side_dynamic_shapes`
4. There should be several instances run (as flaky tests are rerun in CI) from which you can study the logs.
| 1.0 | DISABLED test_dynamic_shapes_right_side_dynamic_shapes (torch._dynamo.testing.make_test_cls_with_patches.<locals>.DummyTestClass) - Platforms: linux
This test was disabled because it is failing in CI. See [recent examples](https://hud.pytorch.org/flakytest?name=test_dynamic_shapes_right_side_dynamic_shapes&suite=torch._dynamo.testing.make_test_cls_with_patches.<locals>.DummyTestClass) and the most recent trunk [workflow logs](https://github.com/pytorch/pytorch/runs/10891615823).
Over the past 3 hours, it has been determined flaky in 2 workflow(s) with 2 failures and 2 successes.
**Debugging instructions (after clicking on the recent samples link):**
DO NOT ASSUME THINGS ARE OKAY IF THE CI IS GREEN. We now shield flaky tests from developers so CI will thus be green but it will be harder to parse the logs.
To find relevant log snippets:
1. Click on the workflow logs linked above
2. Click on the Test step of the job so that it is expanded. Otherwise, the grepping will not work.
3. Grep for `test_dynamic_shapes_right_side_dynamic_shapes`
4. There should be several instances run (as flaky tests are rerun in CI) from which you can study the logs.
| non_priority | disabled test dynamic shapes right side dynamic shapes torch dynamo testing make test cls with patches dummytestclass platforms linux this test was disabled because it is failing in ci see and the most recent trunk over the past hours it has been determined flaky in workflow s with failures and successes debugging instructions after clicking on the recent samples link do not assume things are okay if the ci is green we now shield flaky tests from developers so ci will thus be green but it will be harder to parse the logs to find relevant log snippets click on the workflow logs linked above click on the test step of the job so that it is expanded otherwise the grepping will not work grep for test dynamic shapes right side dynamic shapes there should be several instances run as flaky tests are rerun in ci from which you can study the logs | 0 |
344,960 | 30,775,979,727 | IssuesEvent | 2023-07-31 06:29:41 | supakeen/pinnwand | https://api.github.com/repos/supakeen/pinnwand | closed | Add a browser test suite | enhancement tests | `pinnwand` is currently tested extensively in unit tests and with integration tests (if I can call them that) for its API. It's lacking a browser test suite where an automated browser performs actions on the application to ensure that the HTML, JavaScript and CSS didn't break.
Adding a test suite based on `playwright` or `selenium` would be a nice to have. | 1.0 | Add a browser test suite - `pinnwand` is currently tested extensively in unit tests and with integration tests (if I can call them that) for its API. It's lacking a browser test suite where an automated browser performs actions on the application to ensure that the HTML, JavaScript and CSS didn't break.
Adding a test suite based on `playwright` or `selenium` would be a nice to have. | non_priority | add a browser test suite pinnwand is currently tested extensively in unit tests and with integration tests if i can call them that for its api it s lacking a browser test suite where an automated browser performs actions on the application to ensure that the html javascript and css didn t break adding a test suite based on playwright or selenium would be a nice to have | 0 |
795,853 | 28,089,181,432 | IssuesEvent | 2023-03-30 11:57:06 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | m.youtube.com - see bug description | priority-critical type-webrender-enabled browser-fenix engine-gecko | <!-- @browser: Firefox Mobile 113.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 11; Mobile; rv:109.0) Gecko/113.0 Firefox/113.0 -->
<!-- @reported_with: android-components-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/120187 -->
<!-- @extra_labels: browser-fenix, type-webrender-enabled -->
**URL**: https://m.youtube.com/shorts/4PZSB9bV1Zg
**Browser / Version**: Firefox Mobile 113.0
**Operating System**: Android 11
**Tested Another Browser**: Yes Chrome
**Problem type**: Something else
**Description**: Video playback is not smooth.
**Steps to Reproduce**:
Video playback on YouTube is not smooth as if the video is dripping frames. When watching shorts the scrolling also seems laggy.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: true</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20230327211143</li><li>channel: nightly</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2023/3/9994793b-da15-487d-ba0e-dcf938a52c7f)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | m.youtube.com - see bug description - <!-- @browser: Firefox Mobile 113.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 11; Mobile; rv:109.0) Gecko/113.0 Firefox/113.0 -->
<!-- @reported_with: android-components-reporter -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/120187 -->
<!-- @extra_labels: browser-fenix, type-webrender-enabled -->
**URL**: https://m.youtube.com/shorts/4PZSB9bV1Zg
**Browser / Version**: Firefox Mobile 113.0
**Operating System**: Android 11
**Tested Another Browser**: Yes Chrome
**Problem type**: Something else
**Description**: Video playback is not smooth.
**Steps to Reproduce**:
Video playback on YouTube is not smooth as if the video is dripping frames. When watching shorts the scrolling also seems laggy.
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: true</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20230327211143</li><li>channel: nightly</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2023/3/9994793b-da15-487d-ba0e-dcf938a52c7f)
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | m youtube com see bug description url browser version firefox mobile operating system android tested another browser yes chrome problem type something else description video playback is not smooth steps to reproduce video playback on youtube is not smooth as if the video is dripping frames when watching shorts the scrolling also seems laggy browser configuration gfx webrender all true gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel nightly hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with ❤️ | 1 |
590,242 | 17,774,550,958 | IssuesEvent | 2021-08-30 17:27:34 | GoogleCloudPlatform/golang-samples | https://api.github.com/repos/GoogleCloudPlatform/golang-samples | closed | vision/product_search: TestGetSimilarProducts failed | type: bug priority: p1 api: vision samples flakybot: issue | Note: #2187 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky.
----
commit: 88b2a1089882340cbb1a55b67718645c5ee9af99
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/5217657a-08aa-4983-b787-650d10e2e338), [Sponge](http://sponge2/5217657a-08aa-4983-b787-650d10e2e338)
status: failed
<details><summary>Test output</summary><br><pre>get_similar_products_test.go:39: getSimilarProducts: ProductSearch: rpc error: code = NotFound desc = No matching products found. Please verify that the ProductSet exists, has images and has been indexed.</pre></details> | 1.0 | vision/product_search: TestGetSimilarProducts failed - Note: #2187 was also for this test, but it was closed more than 10 days ago. So, I didn't mark it flaky.
----
commit: 88b2a1089882340cbb1a55b67718645c5ee9af99
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/5217657a-08aa-4983-b787-650d10e2e338), [Sponge](http://sponge2/5217657a-08aa-4983-b787-650d10e2e338)
status: failed
<details><summary>Test output</summary><br><pre>get_similar_products_test.go:39: getSimilarProducts: ProductSearch: rpc error: code = NotFound desc = No matching products found. Please verify that the ProductSet exists, has images and has been indexed.</pre></details> | priority | vision product search testgetsimilarproducts failed note was also for this test but it was closed more than days ago so i didn t mark it flaky commit buildurl status failed test output get similar products test go getsimilarproducts productsearch rpc error code notfound desc no matching products found please verify that the productset exists has images and has been indexed | 1 |
305,496 | 26,390,761,926 | IssuesEvent | 2023-01-12 15:31:14 | zephyrproject-rtos/zephyr | https://api.github.com/repos/zephyrproject-rtos/zephyr | closed | define a recommended process in zephyr for a CI framework integration | Feature Request area: Test Framework | in Zephyr, the current test framework runs stanbalone. and it is not defined for any CI system integartion.
As Zephyr projects is getting more complexity, the test framework needs to be designed such as a CI framwork can be easily adapted to.

to meet any CI frameworks, current test frameworks needs to be:
1. generate test plan by commit contents. and accept runtime filter from commnet messages.
for example below CI: krenel_regression, in commint message can be a dirction to do the kernel regression test plan
```
...
CI: kernel_regression
Signed-off-by: Hake Huang <hake.huang@oss.nxp.com>
```
2. build and run testing based on cloud system, and support distribution build/run in parallelly, mainly for efficiency.
3. report result in a json/xml format, and if running distributelly, we need provide a way to merge those results.
4. test cases coverage shall be tracked, or at least for kernel cases.
5. test result analysis system shall be recommanded for better analysis the CI results.
Related requirements:
https://github.com/zephyrproject-rtos/zephyr/issues/52855
https://github.com/zephyrproject-rtos/zephyr/issues/52701
| 1.0 | define a recommended process in zephyr for a CI framework integration - in Zephyr, the current test framework runs stanbalone. and it is not defined for any CI system integartion.
As Zephyr projects is getting more complexity, the test framework needs to be designed such as a CI framwork can be easily adapted to.

to meet any CI frameworks, current test frameworks needs to be:
1. generate test plan by commit contents. and accept runtime filter from commnet messages.
for example below CI: krenel_regression, in commint message can be a dirction to do the kernel regression test plan
```
...
CI: kernel_regression
Signed-off-by: Hake Huang <hake.huang@oss.nxp.com>
```
2. build and run testing based on cloud system, and support distribution build/run in parallelly, mainly for efficiency.
3. report result in a json/xml format, and if running distributelly, we need provide a way to merge those results.
4. test cases coverage shall be tracked, or at least for kernel cases.
5. test result analysis system shall be recommanded for better analysis the CI results.
Related requirements:
https://github.com/zephyrproject-rtos/zephyr/issues/52855
https://github.com/zephyrproject-rtos/zephyr/issues/52701
| non_priority | define a recommended process in zephyr for a ci framework integration in zephyr the current test framework runs stanbalone and it is not defined for any ci system integartion as zephyr projects is getting more complexity the test framework needs to be designed such as a ci framwork can be easily adapted to to meet any ci frameworks current test frameworks needs to be generate test plan by commit contents and accept runtime filter from commnet messages for example below ci krenel regression in commint message can be a dirction to do the kernel regression test plan ci kernel regression signed off by hake huang build and run testing based on cloud system and support distribution build run in parallelly mainly for efficiency report result in a json xml format and if running distributelly we need provide a way to merge those results test cases coverage shall be tracked or at least for kernel cases test result analysis system shall be recommanded for better analysis the ci results related requirements | 0 |
264,403 | 28,179,905,719 | IssuesEvent | 2023-04-04 01:02:39 | r4vnn/devslop | https://api.github.com/repos/r4vnn/devslop | closed | CVE-2021-23440 (High) detected in set-value-2.0.1.tgz - autoclosed | Mend: dependency security vulnerability | ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-2.0.1.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p>
<p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/set-value/package.json,/node_modules/set-value/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- webpack-4.39.2.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- :x: **set-value-2.0.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/r4vnn/devslop/commit/3437ea512d73ad9cae18d692c18facdeea1aa2bc">3437ea512d73ad9cae18d692c18facdeea1aa2bc</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440.
<p>Publish Date: 2021-09-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23440>CVE-2021-23440</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-09-12</p>
<p>Fix Resolution (set-value): 4.0.1</p>
<p>Direct dependency fix Resolution (@angular-devkit/build-angular): 13.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-23440 (High) detected in set-value-2.0.1.tgz - autoclosed - ## CVE-2021-23440 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>set-value-2.0.1.tgz</b></p></summary>
<p>Create nested values and any intermediaries using dot notation (`'a.b.c'`) paths.</p>
<p>Library home page: <a href="https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz">https://registry.npmjs.org/set-value/-/set-value-2.0.1.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/set-value/package.json,/node_modules/set-value/package.json</p>
<p>
Dependency Hierarchy:
- build-angular-0.803.20.tgz (Root Library)
- webpack-4.39.2.tgz
- micromatch-3.1.10.tgz
- snapdragon-0.8.2.tgz
- base-0.11.2.tgz
- cache-base-1.0.1.tgz
- :x: **set-value-2.0.1.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/r4vnn/devslop/commit/3437ea512d73ad9cae18d692c18facdeea1aa2bc">3437ea512d73ad9cae18d692c18facdeea1aa2bc</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects the package set-value before <2.0.1, >=3.0.0 <4.0.1. A type confusion vulnerability can lead to a bypass of CVE-2019-10747 when the user-provided keys used in the path parameter are arrays.
Mend Note: After conducting further research, Mend has determined that all versions of set-value up to version 4.0.0 are vulnerable to CVE-2021-23440.
<p>Publish Date: 2021-09-12
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23440>CVE-2021-23440</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>9.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Release Date: 2021-09-12</p>
<p>Fix Resolution (set-value): 4.0.1</p>
<p>Direct dependency fix Resolution (@angular-devkit/build-angular): 13.0.0</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with Mend [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in set value tgz autoclosed cve high severity vulnerability vulnerable library set value tgz create nested values and any intermediaries using dot notation a b c paths library home page a href path to dependency file package json path to vulnerable library node modules set value package json node modules set value package json dependency hierarchy build angular tgz root library webpack tgz micromatch tgz snapdragon tgz base tgz cache base tgz x set value tgz vulnerable library found in head commit a href vulnerability details this affects the package set value before a type confusion vulnerability can lead to a bypass of cve when the user provided keys used in the path parameter are arrays mend note after conducting further research mend has determined that all versions of set value up to version are vulnerable to cve publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version release date fix resolution set value direct dependency fix resolution angular devkit build angular step up your open source security game with mend | 0 |
96,059 | 19,862,342,875 | IssuesEvent | 2022-01-22 02:44:17 | trezor/trezor-suite | https://api.github.com/repos/trezor/trezor-suite | opened | Clean up messages | code | The following merge improved messages.ts and en.json.
https://github.com/trezor/trezor-suite/pull/4777
https://github.com/trezor/trezor-suite/pull/4778
Therefore, I considered cleaning up message files.
I've written python code that does a full-text search of all the files to see if the keys contained in the messages.ts file are actually used.
This code will eventually output new messages.ts and master.json based on the key actually used.
I will attach this code:
[cleanup_messages.zip](https://github.com/trezor/trezor-suite/files/7917482/cleanup_messages.zip)
How to use
----------
Create a work folder in the folder where the trezor-suite repository is located and place `cleanup_messages.py`.
Make sure the repository HEAD is on the latest develop branch.
```
cd work
cp -r ../trezor-suite/packages/components .
cp -r ../trezor-suite/packages/suite .
cp -r ../trezor-suite/packages/suite-desktop .
cp -r ../trezor-suite/packages/suite-web-landing .
cp ../trezor-suite/packages/suite/src/support/messages.ts .
python3 cleanup_messages.py
```
Cleaned up files will be output in about an hour.
The result I did was that the latest message.ts contained 1680 keys, but after cleanup it was 1402. As a result, 278 unused keys have been removed.
Uploading the output new_master.json to crowdin will reduce the translation effort by 17%.
Please consider it.
Thanks,
motty
fujicoin.org | 1.0 | Clean up messages - The following merge improved messages.ts and en.json.
https://github.com/trezor/trezor-suite/pull/4777
https://github.com/trezor/trezor-suite/pull/4778
Therefore, I considered cleaning up message files.
I've written python code that does a full-text search of all the files to see if the keys contained in the messages.ts file are actually used.
This code will eventually output new messages.ts and master.json based on the key actually used.
I will attach this code:
[cleanup_messages.zip](https://github.com/trezor/trezor-suite/files/7917482/cleanup_messages.zip)
How to use
----------
Create a work folder in the folder where the trezor-suite repository is located and place `cleanup_messages.py`.
Make sure the repository HEAD is on the latest develop branch.
```
cd work
cp -r ../trezor-suite/packages/components .
cp -r ../trezor-suite/packages/suite .
cp -r ../trezor-suite/packages/suite-desktop .
cp -r ../trezor-suite/packages/suite-web-landing .
cp ../trezor-suite/packages/suite/src/support/messages.ts .
python3 cleanup_messages.py
```
Cleaned up files will be output in about an hour.
The result I did was that the latest message.ts contained 1680 keys, but after cleanup it was 1402. As a result, 278 unused keys have been removed.
Uploading the output new_master.json to crowdin will reduce the translation effort by 17%.
Please consider it.
Thanks,
motty
fujicoin.org | non_priority | clean up messages the following merge improved messages ts and en json therefore i considered cleaning up message files i ve written python code that does a full text search of all the files to see if the keys contained in the messages ts file are actually used this code will eventually output new messages ts and master json based on the key actually used i will attach this code how to use create a work folder in the folder where the trezor suite repository is located and place cleanup messages py make sure the repository head is on the latest develop branch cd work cp r trezor suite packages components cp r trezor suite packages suite cp r trezor suite packages suite desktop cp r trezor suite packages suite web landing cp trezor suite packages suite src support messages ts cleanup messages py cleaned up files will be output in about an hour the result i did was that the latest message ts contained keys but after cleanup it was as a result unused keys have been removed uploading the output new master json to crowdin will reduce the translation effort by please consider it thanks motty fujicoin org | 0 |
508,622 | 14,703,850,286 | IssuesEvent | 2021-01-04 15:38:16 | mozilla/addons-server | https://api.github.com/repos/mozilla/addons-server | closed | Fix less v4 breakage | priority: p3 | identified in https://github.com/mozilla/addons-server/pull/16205#issuecomment-753931483 by @diox
less v4 makes a number of [changes](https://github.com/less/less.js/pull/3573), one of which is less/less.js@67ce103 "Require parens after mixin call" - this is causing the less compilation step to fail. We don't fail during the assets build for this so it doesn't trigger a fail in CI; it's unclear what the actual result of this is on AMO either because there's *a lot* of cruft from the legacy frontend so it may be an unused file anyway.
It will be safer to fix the syntax failure in the less file for now. | 1.0 | Fix less v4 breakage - identified in https://github.com/mozilla/addons-server/pull/16205#issuecomment-753931483 by @diox
less v4 makes a number of [changes](https://github.com/less/less.js/pull/3573), one of which is less/less.js@67ce103 "Require parens after mixin call" - this is causing the less compilation step to fail. We don't fail during the assets build for this so it doesn't trigger a fail in CI; it's unclear what the actual result of this is on AMO either because there's *a lot* of cruft from the legacy frontend so it may be an unused file anyway.
It will be safer to fix the syntax failure in the less file for now. | priority | fix less breakage identified in by diox less makes a number of one of which is less less js require parens after mixin call this is causing the less compilation step to fail we don t fail during the assets build for this so it doesn t trigger a fail in ci it s unclear what the actual result of this is on amo either because there s a lot of cruft from the legacy frontend so it may be an unused file anyway it will be safer to fix the syntax failure in the less file for now | 1 |
105,705 | 16,657,290,988 | IssuesEvent | 2021-06-05 19:08:13 | kstring/traefik | https://api.github.com/repos/kstring/traefik | closed | CVE-2020-7751 (High) detected in pathval-1.1.0.tgz | security vulnerability | ## CVE-2020-7751 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-1.1.0.tgz</b></p></summary>
<p>Object value retrieval given a string path</p>
<p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz">https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz</a></p>
<p>Path to dependency file: traefik/webui/package.json</p>
<p>Path to vulnerable library: traefik/webui/node_modules/pathval/package.json</p>
<p>
Dependency Hierarchy:
- chai-4.2.0.tgz (Root Library)
- :x: **pathval-1.1.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kstring/traefik/commit/db45ffa19c08ba47b40c0561e575b475c0dfa146">db45ffa19c08ba47b40c0561e575b475c0dfa146</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects all versions of package pathval.
<p>Publish Date: 2020-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7751>CVE-2020-7751</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-7751 (High) detected in pathval-1.1.0.tgz - ## CVE-2020-7751 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>pathval-1.1.0.tgz</b></p></summary>
<p>Object value retrieval given a string path</p>
<p>Library home page: <a href="https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz">https://registry.npmjs.org/pathval/-/pathval-1.1.0.tgz</a></p>
<p>Path to dependency file: traefik/webui/package.json</p>
<p>Path to vulnerable library: traefik/webui/node_modules/pathval/package.json</p>
<p>
Dependency Hierarchy:
- chai-4.2.0.tgz (Root Library)
- :x: **pathval-1.1.0.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/kstring/traefik/commit/db45ffa19c08ba47b40c0561e575b475c0dfa146">db45ffa19c08ba47b40c0561e575b475c0dfa146</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
This affects all versions of package pathval.
<p>Publish Date: 2020-10-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-7751>CVE-2020-7751</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.2</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in pathval tgz cve high severity vulnerability vulnerable library pathval tgz object value retrieval given a string path library home page a href path to dependency file traefik webui package json path to vulnerable library traefik webui node modules pathval package json dependency hierarchy chai tgz root library x pathval tgz vulnerable library found in head commit a href found in base branch master vulnerability details this affects all versions of package pathval publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href step up your open source security game with whitesource | 0 |
241 | 4,918,405,895 | IssuesEvent | 2016-11-24 08:47:43 | DevExpress/testcafe | https://api.github.com/repos/DevExpress/testcafe | opened | TestCafe scroll to target element incorrectly | SYSTEM: automations TYPE: bug | ### Are you requesting a feature or reporting a bug?
bug
### What is the current behavior?
TestCafe doesn't scroll container to show target element fully while performing an action on it
### What is the expected behavior?
TestCafe should scroll container to show element fully, when it possible (element is smaller, than container)
### How would you reproduce the current behavior (if this is a bug)?
Run test
#### Provide the test code and the tested page URL (if applicable)
Tested page URL:
```html
<html>
<head>
<title>Index</title>
<style>
.row {
height: 24px;
width: 75px;
background: grey;
border: 1px solid black;
}
</style>
</head>
<body>
<div id="verticalContainer" style="overflow-y:scroll; left: 100px; position: absolute; height:70px; width:100px">
<div id="targetTop" class="row"></div>
<div class="row"></div>
<div id="targetBottom" class="row"></div>
</div>
</body>
</html>
```
Test code
```js
const verticalContainer = Selector('#verticalContainer');
test('Scroll a vertical container to the bottom element', async t => {
await t.click('#targetBottom');
expect(await verticalContainer.scrollTop).to.be.least(8);
});
```
### Specify your
* operating system: Win10 x64
* testcafe version: 0.11.0-alpha
* node.js version: v6.9.1 | 1.0 | TestCafe scroll to target element incorrectly - ### Are you requesting a feature or reporting a bug?
bug
### What is the current behavior?
TestCafe doesn't scroll container to show target element fully while performing an action on it
### What is the expected behavior?
TestCafe should scroll container to show element fully, when it possible (element is smaller, than container)
### How would you reproduce the current behavior (if this is a bug)?
Run test
#### Provide the test code and the tested page URL (if applicable)
Tested page URL:
```html
<html>
<head>
<title>Index</title>
<style>
.row {
height: 24px;
width: 75px;
background: grey;
border: 1px solid black;
}
</style>
</head>
<body>
<div id="verticalContainer" style="overflow-y:scroll; left: 100px; position: absolute; height:70px; width:100px">
<div id="targetTop" class="row"></div>
<div class="row"></div>
<div id="targetBottom" class="row"></div>
</div>
</body>
</html>
```
Test code
```js
const verticalContainer = Selector('#verticalContainer');
test('Scroll a vertical container to the bottom element', async t => {
await t.click('#targetBottom');
expect(await verticalContainer.scrollTop).to.be.least(8);
});
```
### Specify your
* operating system: Win10 x64
* testcafe version: 0.11.0-alpha
* node.js version: v6.9.1 | non_priority | testcafe scroll to target element incorrectly are you requesting a feature or reporting a bug bug what is the current behavior testcafe doesn t scroll container to show target element fully while performing an action on it what is the expected behavior testcafe should scroll container to show element fully when it possible element is smaller than container how would you reproduce the current behavior if this is a bug run test provide the test code and the tested page url if applicable tested page url html index row height width background grey border solid black test code js const verticalcontainer selector verticalcontainer test scroll a vertical container to the bottom element async t await t click targetbottom expect await verticalcontainer scrolltop to be least specify your operating system testcafe version alpha node js version | 0 |
127,338 | 18,010,411,284 | IssuesEvent | 2021-09-16 07:56:57 | maddyCode23/linux-4.1.15 | https://api.github.com/repos/maddyCode23/linux-4.1.15 | opened | CVE-2020-25669 (High) detected in linux-stable-rtv4.1.33 | security vulnerability | ## CVE-2020-25669 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/input/keyboard/sunkbd.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/input/keyboard/sunkbd.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/input/keyboard/sunkbd.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
<p>Publish Date: 2021-05-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25669>CVE-2020-25669</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-25669">https://www.linuxkernelcves.com/cves/CVE-2020-25669</a></p>
<p>Release Date: 2020-09-17</p>
<p>Fix Resolution: v4.4.245, v4.9.245, v4.14.208, v4.19.159, v5.4.79, v5.9.10, v5.10-rc5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2020-25669 (High) detected in linux-stable-rtv4.1.33 - ## CVE-2020-25669 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv4.1.33</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/maddyCode23/linux-4.1.15/commit/f1f3d2b150be669390b32dfea28e773471bdd6e7">f1f3d2b150be669390b32dfea28e773471bdd6e7</a></p>
</p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/input/keyboard/sunkbd.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/input/keyboard/sunkbd.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/input/keyboard/sunkbd.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
<p>Publish Date: 2021-05-26
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2020-25669>CVE-2020-25669</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2020-25669">https://www.linuxkernelcves.com/cves/CVE-2020-25669</a></p>
<p>Release Date: 2020-09-17</p>
<p>Fix Resolution: v4.4.245, v4.9.245, v4.14.208, v4.19.159, v5.4.79, v5.9.10, v5.10-rc5</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in linux stable cve high severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href vulnerable source files drivers input keyboard sunkbd c drivers input keyboard sunkbd c drivers input keyboard sunkbd c vulnerability details a vulnerability was found in the linux kernel where the function sunkbd reinit having been scheduled by sunkbd interrupt before sunkbd being freed though the dangling pointer is set to null in sunkbd disconnect there is still an alias in sunkbd reinit causing use after free publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
163,543 | 6,200,582,758 | IssuesEvent | 2017-07-06 01:47:16 | coreos/bugs | https://api.github.com/repos/coreos/bugs | closed | HAProxy does not respond after update to 1409.2.0 | component/kernel kind/regression priority/P0 team/os | # Issue Report #
## Bug ##
### Container Linux Version ###
```
NAME="Container Linux by CoreOS"
ID=coreos
VERSION=1409.2.0
VERSION_ID=1409.2.0
BUILD_ID=2017-06-19-2321
PRETTY_NAME="Container Linux by CoreOS 1409.2.0 (Ladybug)"
ANSI_COLOR="38;5;75"
HOME_URL="https://coreos.com/"
BUG_REPORT_URL="https://issues.coreos.com"
COREOS_BOARD="amd64-usr"
```
### Environment ###
AWS t1.small instance HVM
### Expected Behavior ###
Marathon-LB HAProxy should respond on port `9090`
### Actual Behavior ###
This is inside Docker container, but same applies when accessing the port from outside.
Marathon-LB was happily running on a host, but today, after update to 1409.2.0 it stopped responding on the port it binds to. `curl`, `telnet` or any other request simply hang. The service is running in a `PRIVILEGED` container with `HOST` network mode.
```
root@marathon-lb:/marathon-lb# telnet localhost 9091
Trying ::1...
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
^]
telnet> q
Connection closed.
root@marathon-lb:/marathon-lb# telnet localhost 9090
Trying ::1...
Trying 127.0.0.1...
^C
root@ip-10-10-5-77:/marathon-lb# netstat -antp | grep 90
tcp 0 0 0.0.0.0:9090 0.0.0.0:* LISTEN 84/haproxy
tcp 0 0 0.0.0.0:9091 0.0.0.0:* LISTEN 84/haproxy
```
### Reproduction Steps ###
1. Start `marathon-lb:latest` docker container with following arguments:
```
"args": [
"sse",
"--group",
"external",
"--marathon",
"http://master.mesos:8080"
]
```
--net="host" --privileged
2. Try telneting to port `9090` or hitting health endpoint `curl localhost:9090/_haproxy_health_check`.
### Other Information ###
All the requests hang as if they are being firewalled. All other ports are accessible. Tried changing port to a different number, but it still hangs. Works fine on previous OS versions, happen immediately after update.
| 1.0 | HAProxy does not respond after update to 1409.2.0 - # Issue Report #
## Bug ##
### Container Linux Version ###
```
NAME="Container Linux by CoreOS"
ID=coreos
VERSION=1409.2.0
VERSION_ID=1409.2.0
BUILD_ID=2017-06-19-2321
PRETTY_NAME="Container Linux by CoreOS 1409.2.0 (Ladybug)"
ANSI_COLOR="38;5;75"
HOME_URL="https://coreos.com/"
BUG_REPORT_URL="https://issues.coreos.com"
COREOS_BOARD="amd64-usr"
```
### Environment ###
AWS t1.small instance HVM
### Expected Behavior ###
Marathon-LB HAProxy should respond on port `9090`
### Actual Behavior ###
This is inside Docker container, but same applies when accessing the port from outside.
Marathon-LB was happily running on a host, but today, after update to 1409.2.0 it stopped responding on the port it binds to. `curl`, `telnet` or any other request simply hang. The service is running in a `PRIVILEGED` container with `HOST` network mode.
```
root@marathon-lb:/marathon-lb# telnet localhost 9091
Trying ::1...
Trying 127.0.0.1...
Connected to localhost.
Escape character is '^]'.
^]
telnet> q
Connection closed.
root@marathon-lb:/marathon-lb# telnet localhost 9090
Trying ::1...
Trying 127.0.0.1...
^C
root@ip-10-10-5-77:/marathon-lb# netstat -antp | grep 90
tcp 0 0 0.0.0.0:9090 0.0.0.0:* LISTEN 84/haproxy
tcp 0 0 0.0.0.0:9091 0.0.0.0:* LISTEN 84/haproxy
```
### Reproduction Steps ###
1. Start `marathon-lb:latest` docker container with following arguments:
```
"args": [
"sse",
"--group",
"external",
"--marathon",
"http://master.mesos:8080"
]
```
--net="host" --privileged
2. Try telneting to port `9090` or hitting health endpoint `curl localhost:9090/_haproxy_health_check`.
### Other Information ###
All the requests hang as if they are being firewalled. All other ports are accessible. Tried changing port to a different number, but it still hangs. Works fine on previous OS versions, happen immediately after update.
| priority | haproxy does not respond after update to issue report bug container linux version name container linux by coreos id coreos version version id build id pretty name container linux by coreos ladybug ansi color home url bug report url coreos board usr environment aws small instance hvm expected behavior marathon lb haproxy should respond on port actual behavior this is inside docker container but same applies when accessing the port from outside marathon lb was happily running on a host but today after update to it stopped responding on the port it binds to curl telnet or any other request simply hang the service is running in a privileged container with host network mode root marathon lb marathon lb telnet localhost trying trying connected to localhost escape character is telnet q connection closed root marathon lb marathon lb telnet localhost trying trying c root ip marathon lb netstat antp grep tcp listen haproxy tcp listen haproxy reproduction steps start marathon lb latest docker container with following arguments args sse group external marathon net host privileged try telneting to port or hitting health endpoint curl localhost haproxy health check other information all the requests hang as if they are being firewalled all other ports are accessible tried changing port to a different number but it still hangs works fine on previous os versions happen immediately after update | 1 |
262,655 | 27,983,024,381 | IssuesEvent | 2023-03-26 11:37:10 | kimai/kimai | https://api.github.com/repos/kimai/kimai | closed | Users can register even when user registration is disabled | bug security waiting for feedback | ### Describe the issue
I have registered bogus users which may have bypassed the registration form.
### I already tried
- [X] I've read and searched [the documentation](https://www.kimai.org/documentation/).
- [X] I've searched for similar issues in this repository.
- [X] I've searched for similar issues in [the discussions](https://github.com/kimai/kimai/discussions).
### Kimai version
1.28.1
### How do you run Kimai?
Virtual Server or alike
### Which PHP version are you using?
8.1
### Logfile
_No response_
### Screenshots

| True | Users can register even when user registration is disabled - ### Describe the issue
I have registered bogus users which may have bypassed the registration form.
### I already tried
- [X] I've read and searched [the documentation](https://www.kimai.org/documentation/).
- [X] I've searched for similar issues in this repository.
- [X] I've searched for similar issues in [the discussions](https://github.com/kimai/kimai/discussions).
### Kimai version
1.28.1
### How do you run Kimai?
Virtual Server or alike
### Which PHP version are you using?
8.1
### Logfile
_No response_
### Screenshots

| non_priority | users can register even when user registration is disabled describe the issue i have registered bogus users which may have bypassed the registration form i already tried i ve read and searched i ve searched for similar issues in this repository i ve searched for similar issues in kimai version how do you run kimai virtual server or alike which php version are you using logfile no response screenshots | 0 |
40,231 | 6,808,453,011 | IssuesEvent | 2017-11-04 02:57:32 | has2k1/plotnine | https://api.github.com/repos/has2k1/plotnine | closed | Transforming the axis with my function | documentation question | Hello,
I am trying to do a custom scaling of the x-axis. I see that the scale_x_continuous function accepts a "trans" parameter, which can be a function. Here's my function (pretty simple)
```python
def scale_frets(frets):
return ([math.log(x + 1, 1.3) for x in frets])
```
It's not clear how I should use this. Should I be calling by a string representation of the name, like:
```python
scale_x_continuous(trans = 'scale_frets', breaks = list(range(0,1)), minor_breaks = list(range(0,22)), limits=(0, 21))
```
Thank you.
(p.s. in case you're wondering, I'm making a graphical representation of a guitar neck. I'm not sure my scaling function is correct, but once I get this function working I'll play around with it until it looks right.)
| 1.0 | Transforming the axis with my function - Hello,
I am trying to do a custom scaling of the x-axis. I see that the scale_x_continuous function accepts a "trans" parameter, which can be a function. Here's my function (pretty simple)
```python
def scale_frets(frets):
return ([math.log(x + 1, 1.3) for x in frets])
```
It's not clear how I should use this. Should I be calling by a string representation of the name, like:
```python
scale_x_continuous(trans = 'scale_frets', breaks = list(range(0,1)), minor_breaks = list(range(0,22)), limits=(0, 21))
```
Thank you.
(p.s. in case you're wondering, I'm making a graphical representation of a guitar neck. I'm not sure my scaling function is correct, but once I get this function working I'll play around with it until it looks right.)
| non_priority | transforming the axis with my function hello i am trying to do a custom scaling of the x axis i see that the scale x continuous function accepts a trans parameter which can be a function here s my function pretty simple python def scale frets frets return it s not clear how i should use this should i be calling by a string representation of the name like python scale x continuous trans scale frets breaks list range minor breaks list range limits thank you p s in case you re wondering i m making a graphical representation of a guitar neck i m not sure my scaling function is correct but once i get this function working i ll play around with it until it looks right | 0 |
160,034 | 6,068,528,151 | IssuesEvent | 2017-06-15 00:08:01 | cyberpwnn/Wormholes | https://api.github.com/repos/cyberpwnn/Wormholes | opened | Projections Bleed occasionally | bug high priority | Projection bleeding happens when a viewport is moved too far from the last viewport, and the resulting space in between the viewports has edges which are no longer kept track by the ghost rasterer (meaning the only way to remove them is to re-look through a projection in that location) | 1.0 | Projections Bleed occasionally - Projection bleeding happens when a viewport is moved too far from the last viewport, and the resulting space in between the viewports has edges which are no longer kept track by the ghost rasterer (meaning the only way to remove them is to re-look through a projection in that location) | priority | projections bleed occasionally projection bleeding happens when a viewport is moved too far from the last viewport and the resulting space in between the viewports has edges which are no longer kept track by the ghost rasterer meaning the only way to remove them is to re look through a projection in that location | 1 |
365,106 | 10,775,656,516 | IssuesEvent | 2019-11-03 15:43:25 | eJourn-al/eJournal | https://api.github.com/repos/eJourn-al/eJournal | closed | Copy assignment causes 500 error for existing journals | Priority: High Status: Review Needed Type: Bug Workload: Low | **Describe the bug**
Upon changing an assignment by copying its structure from another assignment, loading an existing journal for the updated assignment causes a 500 error (traced back to the `get_nodes` function).
**To Reproduce**
Steps to reproduce the behavior:
1. Fill the preset database
2. As the `Teacher`, copy the assignment structure from 'Logboek' into 'Colloquium'
3. Try to load a student journal
4. See error
**Expected behavior**
Existing journals should obviously remain functional.
Maybe we should not allow copying once an assignment has been created. | 1.0 | Copy assignment causes 500 error for existing journals - **Describe the bug**
Upon changing an assignment by copying its structure from another assignment, loading an existing journal for the updated assignment causes a 500 error (traced back to the `get_nodes` function).
**To Reproduce**
Steps to reproduce the behavior:
1. Fill the preset database
2. As the `Teacher`, copy the assignment structure from 'Logboek' into 'Colloquium'
3. Try to load a student journal
4. See error
**Expected behavior**
Existing journals should obviously remain functional.
Maybe we should not allow copying once an assignment has been created. | priority | copy assignment causes error for existing journals describe the bug upon changing an assignment by copying its structure from another assignment loading an existing journal for the updated assignment causes a error traced back to the get nodes function to reproduce steps to reproduce the behavior fill the preset database as the teacher copy the assignment structure from logboek into colloquium try to load a student journal see error expected behavior existing journals should obviously remain functional maybe we should not allow copying once an assignment has been created | 1 |
484,264 | 13,937,150,864 | IssuesEvent | 2020-10-22 13:49:27 | trezor/trezor-suite | https://api.github.com/repos/trezor/trezor-suite | closed | Uncaught Exception: Error: cannot run bridge binary | Bug High priority | **Info:**
- OS: macOS
- Wallet Version: latest build from develop (dmg and zip)
**Describe the bug**
Suite throws `Uncaught Exception: Error: cannot run bridge binary ` right after launch
**Steps to reproduce:**
1. download latest build from develop eg. https://gitlab.com/satoshilabs/trezor/trezor-suite/-/jobs/802058440
2. launch Suite
**Expected result:**
working app
**Actual result:**
App stuck at error
**Screenshots:**
<img width="1117" alt="Screenshot 2020-10-21 at 12 36 40" src="https://user-images.githubusercontent.com/6961901/96708828-14376c80-139a-11eb-80de-50db4e326c15.png">
**Note(s):**
```
Uncaught Exception:
Error: cannot run bridge binary - Error: spawn /private/var/folders/h9/v60sqtqd5mq9wpnt_g8n2sqh0000gn/T/AppTranslocation/1B1D1534-A6C0-4BBA-AF2C-BC2A1C187E59/d/Trezor Suite.app/Contents/Resources/bridge/trezord-mac-x64 ENOENT
at error (/private/var/folders/h9/v60sqtqd5mq9wpnt_g8n2sqh0000gn/T/AppTranslocation/1B1D1534-A6C0-4BBA-AF2C-BC2A1C187E59/d/Trezor Suite.app/Contents/Resources/app.asar/dist/bridge.js:35:11)
at ChildProcess.<anonymous> (/private/var/folders/h9/v60sqtqd5mq9wpnt_g8n2sqh0000gn/T/AppTranslocation/1B1D1534-A6C0-4BBA-AF2C-BC2A1C187E59/d/Trezor Suite.app/Contents/Resources/app.asar/dist/bridge.js:82:9)
at ChildProcess.emit (events.js:310:20)
at Process.ChildProcess._handle.onexit (internal/child_process.js:273:12)
at onErrorNT (internal/child_process.js:469:16)
at processTicksAndRejections (internal/process/task_queues.js:84:21)
```
| 1.0 | Uncaught Exception: Error: cannot run bridge binary - **Info:**
- OS: macOS
- Wallet Version: latest build from develop (dmg and zip)
**Describe the bug**
Suite throws `Uncaught Exception: Error: cannot run bridge binary ` right after launch
**Steps to reproduce:**
1. download latest build from develop eg. https://gitlab.com/satoshilabs/trezor/trezor-suite/-/jobs/802058440
2. launch Suite
**Expected result:**
working app
**Actual result:**
App stuck at error
**Screenshots:**
<img width="1117" alt="Screenshot 2020-10-21 at 12 36 40" src="https://user-images.githubusercontent.com/6961901/96708828-14376c80-139a-11eb-80de-50db4e326c15.png">
**Note(s):**
```
Uncaught Exception:
Error: cannot run bridge binary - Error: spawn /private/var/folders/h9/v60sqtqd5mq9wpnt_g8n2sqh0000gn/T/AppTranslocation/1B1D1534-A6C0-4BBA-AF2C-BC2A1C187E59/d/Trezor Suite.app/Contents/Resources/bridge/trezord-mac-x64 ENOENT
at error (/private/var/folders/h9/v60sqtqd5mq9wpnt_g8n2sqh0000gn/T/AppTranslocation/1B1D1534-A6C0-4BBA-AF2C-BC2A1C187E59/d/Trezor Suite.app/Contents/Resources/app.asar/dist/bridge.js:35:11)
at ChildProcess.<anonymous> (/private/var/folders/h9/v60sqtqd5mq9wpnt_g8n2sqh0000gn/T/AppTranslocation/1B1D1534-A6C0-4BBA-AF2C-BC2A1C187E59/d/Trezor Suite.app/Contents/Resources/app.asar/dist/bridge.js:82:9)
at ChildProcess.emit (events.js:310:20)
at Process.ChildProcess._handle.onexit (internal/child_process.js:273:12)
at onErrorNT (internal/child_process.js:469:16)
at processTicksAndRejections (internal/process/task_queues.js:84:21)
```
| priority | uncaught exception error cannot run bridge binary info os macos wallet version latest build from develop dmg and zip describe the bug suite throws uncaught exception error cannot run bridge binary right after launch steps to reproduce download latest build from develop eg launch suite expected result working app actual result app stuck at error screenshots img width alt screenshot at src note s uncaught exception error cannot run bridge binary error spawn private var folders t apptranslocation d trezor suite app contents resources bridge trezord mac enoent at error private var folders t apptranslocation d trezor suite app contents resources app asar dist bridge js at childprocess private var folders t apptranslocation d trezor suite app contents resources app asar dist bridge js at childprocess emit events js at process childprocess handle onexit internal child process js at onerrornt internal child process js at processticksandrejections internal process task queues js | 1 |
624,448 | 19,697,917,645 | IssuesEvent | 2022-01-12 14:02:12 | opensquare-network/statescan | https://api.github.com/repos/opensquare-network/statescan | closed | Customize 500 internal server error page | priority:high | 
Currently we show the default 500 page by next, but we should show one by SubSquare. | 1.0 | Customize 500 internal server error page - 
Currently we show the default 500 page by next, but we should show one by SubSquare. | priority | customize internal server error page currently we show the default page by next but we should show one by subsquare | 1 |
654,505 | 21,654,536,297 | IssuesEvent | 2022-05-06 12:55:24 | rocky-linux/rockylinux.org | https://api.github.com/repos/rocky-linux/rockylinux.org | closed | Translation Completed: Traditional Chinese | priority: medium tag: content type: enhancement | **Language Translated: Traditional Chinese
**Localized Language Name: Traditional Chinese
**ISO 639-1 Language Code: zh-tw
**Localized Date Format: `YYYY-MM-DD`
| 1.0 | Translation Completed: Traditional Chinese - **Language Translated: Traditional Chinese
**Localized Language Name: Traditional Chinese
**ISO 639-1 Language Code: zh-tw
**Localized Date Format: `YYYY-MM-DD`
| priority | translation completed traditional chinese language translated traditional chinese localized language name traditional chinese iso language code zh tw localized date format yyyy mm dd | 1 |
459,118 | 13,186,594,450 | IssuesEvent | 2020-08-13 00:40:52 | fog/fog-google | https://api.github.com/repos/fog/fog-google | closed | Incorrect metadata format in comment | docs priority/medium | I am having trouble setting the metadata for a server when I structure the metadata object according to documentation below:
https://github.com/fog/fog-google/blob/46d1bee9516bdbf3d020f012f7b7aee9039efd47/lib/fog/compute/google/requests/set_server_metadata.rb#L24
It seems like having a metadata object that includes an `items` key does not get parsed correctly. However, setting the object to what the value of `items` was seems to work. This also seems to be the way it is used in the test in:
https://github.com/fog/fog-google/blob/46d1bee9516bdbf3d020f012f7b7aee9039efd47/test/integration/compute/core_compute/test_servers.rb#L42
Or perhaps I am calling the method incorrectly? It throws the following error when including the `items` key:
```
/Users/user/.vagrant.d/gems/2.4.9/gems/google-api-client-0.23.9/generated/google/apis/compute_v1/classes.rb:11437:in
`initialize': wrong number of arguments (given 1, expected 0) (ArgumentError)
``` | 1.0 | Incorrect metadata format in comment - I am having trouble setting the metadata for a server when I structure the metadata object according to documentation below:
https://github.com/fog/fog-google/blob/46d1bee9516bdbf3d020f012f7b7aee9039efd47/lib/fog/compute/google/requests/set_server_metadata.rb#L24
It seems like having a metadata object that includes an `items` key does not get parsed correctly. However, setting the object to what the value of `items` was seems to work. This also seems to be the way it is used in the test in:
https://github.com/fog/fog-google/blob/46d1bee9516bdbf3d020f012f7b7aee9039efd47/test/integration/compute/core_compute/test_servers.rb#L42
Or perhaps I am calling the method incorrectly? It throws the following error when including the `items` key:
```
/Users/user/.vagrant.d/gems/2.4.9/gems/google-api-client-0.23.9/generated/google/apis/compute_v1/classes.rb:11437:in
`initialize': wrong number of arguments (given 1, expected 0) (ArgumentError)
``` | priority | incorrect metadata format in comment i am having trouble setting the metadata for a server when i structure the metadata object according to documentation below it seems like having a metadata object that includes an items key does not get parsed correctly however setting the object to what the value of items was seems to work this also seems to be the way it is used in the test in or perhaps i am calling the method incorrectly it throws the following error when including the items key users user vagrant d gems gems google api client generated google apis compute classes rb in initialize wrong number of arguments given expected argumenterror | 1 |
81,014 | 15,596,822,405 | IssuesEvent | 2021-03-18 16:15:29 | Path-Check/gaen-mobile | https://api.github.com/repos/Path-Check/gaen-mobile | closed | CVE-2021-22878 (Medium) detected in multiple libraries | security vulnerability | ## CVE-2021-22878 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>RealmSwift-10.1.1</b>, <b>Flipper-Folly-2.3.0</b>, <b>YogaKit-1.18.1</b>, <b>Yoga-1.14.0</b>, <b>Realm-10.1.1</b>, <b>Flipper-RSocket-1.1.0</b>, <b>Realm/Headers-10.1.1</b></p></summary>
<p>
<details><summary><b>RealmSwift-10.1.1</b></p></summary>
<p>The Realm Mobile Database, for Swift. (If you want to use Realm from Objective-C, see the “Realm” pod.)
The Realm Mobile Database is a fast, easy-to-use replacement for Core Data & SQLite. Use it with the Realm Mobile Platform for realtime, automatic data sync. Works on iOS, macOS, tvOS & watchOS. Learn more and get help at https://realm.io.</p>
<p>Library home page: <a href="https://github.com/realm/realm-cocoa/archive/v10.1.1.zip">https://github.com/realm/realm-cocoa/archive/v10.1.1.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- :x: **RealmSwift-10.1.1** (Vulnerable Library)
</details>
<details><summary><b>Flipper-Folly-2.3.0</b></p></summary>
<p></p>
<p>Library home page: <a href="https://github.com/facebook/folly/archive/v2020.04.06.00.zip">https://github.com/facebook/folly/archive/v2020.04.06.00.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- Flipper-RSocket-1.1.0 (Root Library)
- :x: **Flipper-Folly-2.3.0** (Vulnerable Library)
</details>
<details><summary><b>YogaKit-1.18.1</b></p></summary>
<p>Yoga is a cross-platform layout engine enabling maximum collaboration within your team by implementing an API many designers are familiar with, and opening it up to developers across different platforms.</p>
<p>Library home page: <a href="https://github.com/facebook/yoga/archive/1.18.0.zip">https://github.com/facebook/yoga/archive/1.18.0.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- FlipperKit/FlipperKitLayoutPlugin-0.62.0 (Root Library)
- :x: **YogaKit-1.18.1** (Vulnerable Library)
</details>
<details><summary><b>Yoga-1.14.0</b></p></summary>
<p>Yoga is a cross-platform layout engine enabling maximum collaboration within your team by implementing an API many designers are familiar with, and opening it up to developers across different platforms.</p>
<p>Library home page: <a href="https://github.com/facebook/yoga/archive/1.14.0.zip">https://github.com/facebook/yoga/archive/1.14.0.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- react-native-splash-screen-3.2.0 (Root Library)
- React-0.63.4
- React-Core-0.63.4
- React-Core/Default-0.63.4
- :x: **Yoga-1.14.0** (Vulnerable Library)
</details>
<details><summary><b>Realm-10.1.1</b></p></summary>
<p>The Realm Mobile Database, for Objective-C. (If you want to use Realm from Swift, see the “RealmSwift” pod.)
The Realm Mobile Database is a fast, easy-to-use replacement for Core Data & SQLite. Use it with the Realm Mobile Platform for realtime, automatic data sync. Works on iOS, macOS, tvOS & watchOS. Learn more and get help at https://realm.io.</p>
<p>Library home page: <a href="https://github.com/realm/realm-cocoa/archive/v10.1.1.zip">https://github.com/realm/realm-cocoa/archive/v10.1.1.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- :x: **Realm-10.1.1** (Vulnerable Library)
</details>
<details><summary><b>Flipper-RSocket-1.1.0</b></p></summary>
<p></p>
<p>Library home page: <a href="https://github.com/priteshrnandgaonkar/rsocket-cpp/archive/0.11.0.zip">https://github.com/priteshrnandgaonkar/rsocket-cpp/archive/0.11.0.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- :x: **Flipper-RSocket-1.1.0** (Vulnerable Library)
</details>
<details><summary><b>Realm/Headers-10.1.1</b></p></summary>
<p>The Realm Mobile Database, for Objective-C. (If you want to use Realm from Swift, see the “RealmSwift” pod.)
The Realm Mobile Database is a fast, easy-to-use replacement for Core Data & SQLite. Use it with the Realm Mobile Platform for realtime, automatic data sync. Works on iOS, macOS, tvOS & watchOS. Learn more and get help at https://realm.io.</p>
<p>Library home page: <a href="https://github.com/realm/realm-cocoa/archive/v10.1.1.zip">https://github.com/realm/realm-cocoa/archive/v10.1.1.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- Realm-10.1.1 (Root Library)
- :x: **Realm/Headers-10.1.1** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Path-Check/gaen-mobile/commit/b3db907b448e28dda0f9df14442cf20a695d1210">b3db907b448e28dda0f9df14442cf20a695d1210</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`.
<p>Publish Date: 2021-03-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22878>CVE-2021-22878</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nextcloud.com/security/advisory/?id=NC-SA-2021-005">https://nextcloud.com/security/advisory/?id=NC-SA-2021-005</a></p>
<p>Release Date: 2021-03-03</p>
<p>Fix Resolution: v20.0.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-22878 (Medium) detected in multiple libraries - ## CVE-2021-22878 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>RealmSwift-10.1.1</b>, <b>Flipper-Folly-2.3.0</b>, <b>YogaKit-1.18.1</b>, <b>Yoga-1.14.0</b>, <b>Realm-10.1.1</b>, <b>Flipper-RSocket-1.1.0</b>, <b>Realm/Headers-10.1.1</b></p></summary>
<p>
<details><summary><b>RealmSwift-10.1.1</b></p></summary>
<p>The Realm Mobile Database, for Swift. (If you want to use Realm from Objective-C, see the “Realm” pod.)
The Realm Mobile Database is a fast, easy-to-use replacement for Core Data & SQLite. Use it with the Realm Mobile Platform for realtime, automatic data sync. Works on iOS, macOS, tvOS & watchOS. Learn more and get help at https://realm.io.</p>
<p>Library home page: <a href="https://github.com/realm/realm-cocoa/archive/v10.1.1.zip">https://github.com/realm/realm-cocoa/archive/v10.1.1.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- :x: **RealmSwift-10.1.1** (Vulnerable Library)
</details>
<details><summary><b>Flipper-Folly-2.3.0</b></p></summary>
<p></p>
<p>Library home page: <a href="https://github.com/facebook/folly/archive/v2020.04.06.00.zip">https://github.com/facebook/folly/archive/v2020.04.06.00.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- Flipper-RSocket-1.1.0 (Root Library)
- :x: **Flipper-Folly-2.3.0** (Vulnerable Library)
</details>
<details><summary><b>YogaKit-1.18.1</b></p></summary>
<p>Yoga is a cross-platform layout engine enabling maximum collaboration within your team by implementing an API many designers are familiar with, and opening it up to developers across different platforms.</p>
<p>Library home page: <a href="https://github.com/facebook/yoga/archive/1.18.0.zip">https://github.com/facebook/yoga/archive/1.18.0.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- FlipperKit/FlipperKitLayoutPlugin-0.62.0 (Root Library)
- :x: **YogaKit-1.18.1** (Vulnerable Library)
</details>
<details><summary><b>Yoga-1.14.0</b></p></summary>
<p>Yoga is a cross-platform layout engine enabling maximum collaboration within your team by implementing an API many designers are familiar with, and opening it up to developers across different platforms.</p>
<p>Library home page: <a href="https://github.com/facebook/yoga/archive/1.14.0.zip">https://github.com/facebook/yoga/archive/1.14.0.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- react-native-splash-screen-3.2.0 (Root Library)
- React-0.63.4
- React-Core-0.63.4
- React-Core/Default-0.63.4
- :x: **Yoga-1.14.0** (Vulnerable Library)
</details>
<details><summary><b>Realm-10.1.1</b></p></summary>
<p>The Realm Mobile Database, for Objective-C. (If you want to use Realm from Swift, see the “RealmSwift” pod.)
The Realm Mobile Database is a fast, easy-to-use replacement for Core Data & SQLite. Use it with the Realm Mobile Platform for realtime, automatic data sync. Works on iOS, macOS, tvOS & watchOS. Learn more and get help at https://realm.io.</p>
<p>Library home page: <a href="https://github.com/realm/realm-cocoa/archive/v10.1.1.zip">https://github.com/realm/realm-cocoa/archive/v10.1.1.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- :x: **Realm-10.1.1** (Vulnerable Library)
</details>
<details><summary><b>Flipper-RSocket-1.1.0</b></p></summary>
<p></p>
<p>Library home page: <a href="https://github.com/priteshrnandgaonkar/rsocket-cpp/archive/0.11.0.zip">https://github.com/priteshrnandgaonkar/rsocket-cpp/archive/0.11.0.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock,gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- :x: **Flipper-RSocket-1.1.0** (Vulnerable Library)
</details>
<details><summary><b>Realm/Headers-10.1.1</b></p></summary>
<p>The Realm Mobile Database, for Objective-C. (If you want to use Realm from Swift, see the “RealmSwift” pod.)
The Realm Mobile Database is a fast, easy-to-use replacement for Core Data & SQLite. Use it with the Realm Mobile Platform for realtime, automatic data sync. Works on iOS, macOS, tvOS & watchOS. Learn more and get help at https://realm.io.</p>
<p>Library home page: <a href="https://github.com/realm/realm-cocoa/archive/v10.1.1.zip">https://github.com/realm/realm-cocoa/archive/v10.1.1.zip</a></p>
<p>Path to dependency file: gaen-mobile/ios/Podfile.lock</p>
<p>Path to vulnerable library: gaen-mobile/ios/Podfile.lock</p>
<p>
Dependency Hierarchy:
- Realm-10.1.1 (Root Library)
- :x: **Realm/Headers-10.1.1** (Vulnerable Library)
</details>
<p>Found in HEAD commit: <a href="https://github.com/Path-Check/gaen-mobile/commit/b3db907b448e28dda0f9df14442cf20a695d1210">b3db907b448e28dda0f9df14442cf20a695d1210</a></p>
<p>Found in base branch: <b>develop</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`.
<p>Publish Date: 2021-03-03
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-22878>CVE-2021-22878</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.8</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: High
- User Interaction: Required
- Scope: Changed
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://nextcloud.com/security/advisory/?id=NC-SA-2021-005">https://nextcloud.com/security/advisory/?id=NC-SA-2021-005</a></p>
<p>Release Date: 2021-03-03</p>
<p>Fix Resolution: v20.0.6</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in multiple libraries cve medium severity vulnerability vulnerable libraries realmswift flipper folly yogakit yoga realm flipper rsocket realm headers realmswift the realm mobile database for swift if you want to use realm from objective c see the “realm” pod the realm mobile database is a fast easy to use replacement for core data sqlite use it with the realm mobile platform for realtime automatic data sync works on ios macos tvos watchos learn more and get help at library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock dependency hierarchy x realmswift vulnerable library flipper folly library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock gaen mobile ios podfile lock dependency hierarchy flipper rsocket root library x flipper folly vulnerable library yogakit yoga is a cross platform layout engine enabling maximum collaboration within your team by implementing an api many designers are familiar with and opening it up to developers across different platforms library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock dependency hierarchy flipperkit flipperkitlayoutplugin root library x yogakit vulnerable library yoga yoga is a cross platform layout engine enabling maximum collaboration within your team by implementing an api many designers are familiar with and opening it up to developers across different platforms library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock gaen mobile ios podfile lock dependency hierarchy react native splash screen root library react react core react core default x yoga vulnerable library realm the realm mobile database for objective c if you want to use realm from swift see the “realmswift” pod the realm mobile database is a fast easy to use replacement for core data sqlite use it with the realm mobile platform for realtime automatic data sync works on ios macos tvos watchos learn more and get help at library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock gaen mobile ios podfile lock dependency hierarchy x realm vulnerable library flipper rsocket library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock gaen mobile ios podfile lock dependency hierarchy x flipper rsocket vulnerable library realm headers the realm mobile database for objective c if you want to use realm from swift see the “realmswift” pod the realm mobile database is a fast easy to use replacement for core data sqlite use it with the realm mobile platform for realtime automatic data sync works on ios macos tvos watchos learn more and get help at library home page a href path to dependency file gaen mobile ios podfile lock path to vulnerable library gaen mobile ios podfile lock dependency hierarchy realm root library x realm headers vulnerable library found in head commit a href found in base branch develop vulnerability details nextcloud server prior to is vulnerable to reflected cross site scripting xss due to lack of sanitization in oc notification show publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required high user interaction required scope changed impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
214,379 | 7,269,385,604 | IssuesEvent | 2018-02-20 13:32:35 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.halfords.com - site is not usable | browser-firefox priority-normal | <!-- @browser: Firefox 58.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 -->
<!-- @reported_with: web -->
**URL**: http://www.halfords.com/motoring/car-accessories/car-mats-boot-liners
**Browser / Version**: Firefox 58.0
**Operating System**: Windows 7
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: Filters on left dont work. Click 'Boot Liners' and no filtering occurs.
**Steps to Reproduce**:
_From [webcompat.com](https://webcompat.com/) with ❤️_ | 1.0 | www.halfords.com - site is not usable - <!-- @browser: Firefox 58.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0 -->
<!-- @reported_with: web -->
**URL**: http://www.halfords.com/motoring/car-accessories/car-mats-boot-liners
**Browser / Version**: Firefox 58.0
**Operating System**: Windows 7
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: Filters on left dont work. Click 'Boot Liners' and no filtering occurs.
**Steps to Reproduce**:
_From [webcompat.com](https://webcompat.com/) with ❤️_ | priority | site is not usable url browser version firefox operating system windows tested another browser yes problem type site is not usable description filters on left dont work click boot liners and no filtering occurs steps to reproduce from with ❤️ | 1 |
234,468 | 19,184,265,850 | IssuesEvent | 2021-12-04 23:32:16 | spcl/dace | https://api.github.com/repos/spcl/dace | closed | Parallelize Xilinx tests/move to pytest | enhancement test fpga | - [x] Parallelize Xilinx tests (done in PR #682)
- [ ] Move to parallel pytest. | 1.0 | Parallelize Xilinx tests/move to pytest - - [x] Parallelize Xilinx tests (done in PR #682)
- [ ] Move to parallel pytest. | non_priority | parallelize xilinx tests move to pytest parallelize xilinx tests done in pr move to parallel pytest | 0 |
132,238 | 10,737,929,490 | IssuesEvent | 2019-10-29 13:59:04 | fga-eps-mds/2019.2-GloriaBot | https://api.github.com/repos/fga-eps-mds/2019.2-GloriaBot | closed | Melhor Fluxo de conversa de Como construir um plano de Proteção | 0 - MDS 2 - Aprimoramento 2 - Qualidade do Código 2 - Rasa 2 - Teste 4 - Planejado | Nessa issue será realizado:
- [x] Ajustar falas da Glória para perguntas sobre a hora do ataque
- [x] Ajustar falas da Glória para perguntas sobre depois do ataque
Critérios de aceitação:
- [x] Melhor interatividade com usuário no diálogo Hora do ataque
- [x] Melhor interatividade com usuário no diálogo Depois do ataque
| 1.0 | Melhor Fluxo de conversa de Como construir um plano de Proteção - Nessa issue será realizado:
- [x] Ajustar falas da Glória para perguntas sobre a hora do ataque
- [x] Ajustar falas da Glória para perguntas sobre depois do ataque
Critérios de aceitação:
- [x] Melhor interatividade com usuário no diálogo Hora do ataque
- [x] Melhor interatividade com usuário no diálogo Depois do ataque
| non_priority | melhor fluxo de conversa de como construir um plano de proteção nessa issue será realizado ajustar falas da glória para perguntas sobre a hora do ataque ajustar falas da glória para perguntas sobre depois do ataque critérios de aceitação melhor interatividade com usuário no diálogo hora do ataque melhor interatividade com usuário no diálogo depois do ataque | 0 |
508,904 | 14,708,183,519 | IssuesEvent | 2021-01-04 23:04:56 | bcgov/entity | https://api.github.com/repos/bcgov/entity | opened | NR 2658586 Baljit Korotana - Client asking for information about charges | ENTITY OPS Priority1 Relationships | #### ServiceNow incident:
#### Contact information
Staff Name: Kristopher Yee
Staff Email:
#### Description
Client requested a name using the new name request. Their mastercard as charged 31.50 for the name, but also a bunch of other charges were made that the client doesn't recognize.
#### Email
>Got another request for payment information.
>
>I don’t think this one has anything to do with the names team in particular as it appears that the client isn’t questioning the $31.50 charge but rather is question the charges of $21.50, $101.50, $44.89, and another $44.89 on the Mastercard they used to pay for their NR(2658586).
>I’m assuming that the $101.50 is some sort of priority fee but can see that their NR was not upgraded, so I have no clue what the upgrade would have been for.
>
>Hopefully this is enough info to look into this with.
>
>Regards,
>Kristopher Yee
#### Tasks
- [ ] When ticket has been created, Steven to post the ticket in RocketChat '#Operations Tasks' channel
- [ ] Add **entity** or **relationships** label to zenhub ticket
- [ ] Add 'Priority1' label to zenhub ticket
- [ ] Assign zenhub ticket to milestone: current, and place in pipeline: sprint backlog
- [ ] Reply All to IT Ops email and provide zenhub ticket number opened and which team it was assigned to
- [ ] Dev/BAs to complete work & close zenhub ticket
- [ ] Author of zenhub ticket to mark ServiceNow ticket as resolved or ask IT Ops to do so | 1.0 | NR 2658586 Baljit Korotana - Client asking for information about charges - #### ServiceNow incident:
#### Contact information
Staff Name: Kristopher Yee
Staff Email:
#### Description
Client requested a name using the new name request. Their mastercard as charged 31.50 for the name, but also a bunch of other charges were made that the client doesn't recognize.
#### Email
>Got another request for payment information.
>
>I don’t think this one has anything to do with the names team in particular as it appears that the client isn’t questioning the $31.50 charge but rather is question the charges of $21.50, $101.50, $44.89, and another $44.89 on the Mastercard they used to pay for their NR(2658586).
>I’m assuming that the $101.50 is some sort of priority fee but can see that their NR was not upgraded, so I have no clue what the upgrade would have been for.
>
>Hopefully this is enough info to look into this with.
>
>Regards,
>Kristopher Yee
#### Tasks
- [ ] When ticket has been created, Steven to post the ticket in RocketChat '#Operations Tasks' channel
- [ ] Add **entity** or **relationships** label to zenhub ticket
- [ ] Add 'Priority1' label to zenhub ticket
- [ ] Assign zenhub ticket to milestone: current, and place in pipeline: sprint backlog
- [ ] Reply All to IT Ops email and provide zenhub ticket number opened and which team it was assigned to
- [ ] Dev/BAs to complete work & close zenhub ticket
- [ ] Author of zenhub ticket to mark ServiceNow ticket as resolved or ask IT Ops to do so | priority | nr baljit korotana client asking for information about charges servicenow incident contact information staff name kristopher yee staff email description client requested a name using the new name request their mastercard as charged for the name but also a bunch of other charges were made that the client doesn t recognize email got another request for payment information i don’t think this one has anything to do with the names team in particular as it appears that the client isn’t questioning the charge but rather is question the charges of and another on the mastercard they used to pay for their nr i’m assuming that the is some sort of priority fee but can see that their nr was not upgraded so i have no clue what the upgrade would have been for hopefully this is enough info to look into this with regards kristopher yee tasks when ticket has been created steven to post the ticket in rocketchat operations tasks channel add entity or relationships label to zenhub ticket add label to zenhub ticket assign zenhub ticket to milestone current and place in pipeline sprint backlog reply all to it ops email and provide zenhub ticket number opened and which team it was assigned to dev bas to complete work close zenhub ticket author of zenhub ticket to mark servicenow ticket as resolved or ask it ops to do so | 1 |
98,187 | 12,301,684,702 | IssuesEvent | 2020-05-11 15:46:29 | OpenLiberty/open-liberty | https://api.github.com/repos/OpenLiberty/open-liberty | closed | Defer opening ports until server is up | design-issue | Currently Liberty opens ports prior to the apps (or app server) being ready which can cause issues. waitToAccept was added which results in connections being closed on open prior to server startup.
We are still getting requests to not even open the port, or start accepting until the server is up. | 1.0 | Defer opening ports until server is up - Currently Liberty opens ports prior to the apps (or app server) being ready which can cause issues. waitToAccept was added which results in connections being closed on open prior to server startup.
We are still getting requests to not even open the port, or start accepting until the server is up. | non_priority | defer opening ports until server is up currently liberty opens ports prior to the apps or app server being ready which can cause issues waittoaccept was added which results in connections being closed on open prior to server startup we are still getting requests to not even open the port or start accepting until the server is up | 0 |
47,452 | 12,035,255,224 | IssuesEvent | 2020-04-13 17:33:14 | GetTerminus/terminus-ui | https://api.github.com/repos/GetTerminus/terminus-ui | closed | Fully remove TSLint and Codelyzer | Focus: build Goal: Library Stabilization Target: latest Type: chore | - [x] Remove TSLint
- [x] Remove codelyzer
- [x] Remove terminus tslint config
- [x] See what ESLint rules already exist that could handle some of what we rely on TSLint for
- [x] Create list of what rules currently have no replacement
- [x] Update lint commands in `package.json`
- [x] Update lint staged commands
#### Resources
- https://github.com/typescript-eslint/typescript-eslint
- https://github.com/typescript-eslint/typescript-eslint/blob/master/packages/eslint-plugin/ROADMAP.md
- https://github.com/angular-eslint/angular-eslint
- https://github.com/angular-eslint/angular-eslint#migrating-from-codelyzer-and-tslint
- https://github.com/angular-eslint/angular-eslint/blob/master/packages/integration-tests/fixtures/angular-cli-workspace/.eslintrc.js
- https://github.com/angular-eslint/angular-eslint/blob/master/packages/integration-tests/fixtures/angular-cli-workspace/angular.json
- https://github.com/typescript-eslint/typescript-eslint/tree/master/packages/eslint-plugin | 1.0 | Fully remove TSLint and Codelyzer - - [x] Remove TSLint
- [x] Remove codelyzer
- [x] Remove terminus tslint config
- [x] See what ESLint rules already exist that could handle some of what we rely on TSLint for
- [x] Create list of what rules currently have no replacement
- [x] Update lint commands in `package.json`
- [x] Update lint staged commands
#### Resources
- https://github.com/typescript-eslint/typescript-eslint
- https://github.com/typescript-eslint/typescript-eslint/blob/master/packages/eslint-plugin/ROADMAP.md
- https://github.com/angular-eslint/angular-eslint
- https://github.com/angular-eslint/angular-eslint#migrating-from-codelyzer-and-tslint
- https://github.com/angular-eslint/angular-eslint/blob/master/packages/integration-tests/fixtures/angular-cli-workspace/.eslintrc.js
- https://github.com/angular-eslint/angular-eslint/blob/master/packages/integration-tests/fixtures/angular-cli-workspace/angular.json
- https://github.com/typescript-eslint/typescript-eslint/tree/master/packages/eslint-plugin | non_priority | fully remove tslint and codelyzer remove tslint remove codelyzer remove terminus tslint config see what eslint rules already exist that could handle some of what we rely on tslint for create list of what rules currently have no replacement update lint commands in package json update lint staged commands resources | 0 |
407,577 | 11,924,062,143 | IssuesEvent | 2020-04-01 08:55:00 | wazuh/wazuh-docker | https://api.github.com/repos/wazuh/wazuh-docker | closed | Use official nginx image without rebuilding | priority/medium status/on-hold type/enhancement | ### Description
Currently we're rebuilding the official nginx image, all we're doing is adding a couple of tools and an entrypoint which builds certificates and set things up before starting the web server.
Basically this:
```
RUN apt-get update && apt-get install -y openssl apache2-utils
COPY config/entrypoint.sh /entrypoint.sh
...
ENTRYPOINT /entrypoint.sh
```
This entrypoint will build a self signed certificate and the htpasswd file for basic auth, hence the installed packages `openssl` and `apache2-utils`.
Using the nginx image without rebuilding is possible, by mounting a ready made config directory with these files already.
#### Pros
- more freedom for users to define anything on the config
#### Cons
- build your own htpasswd/certificates
### Tasks
- [x] Create a sample config for nginx to mount
- [x] Rewrite nginx config on `docker-compose.yml` to use external config
- [x] Test execution of the nginx container
- [x] Test cluster execution | 1.0 | Use official nginx image without rebuilding - ### Description
Currently we're rebuilding the official nginx image, all we're doing is adding a couple of tools and an entrypoint which builds certificates and set things up before starting the web server.
Basically this:
```
RUN apt-get update && apt-get install -y openssl apache2-utils
COPY config/entrypoint.sh /entrypoint.sh
...
ENTRYPOINT /entrypoint.sh
```
This entrypoint will build a self signed certificate and the htpasswd file for basic auth, hence the installed packages `openssl` and `apache2-utils`.
Using the nginx image without rebuilding is possible, by mounting a ready made config directory with these files already.
#### Pros
- more freedom for users to define anything on the config
#### Cons
- build your own htpasswd/certificates
### Tasks
- [x] Create a sample config for nginx to mount
- [x] Rewrite nginx config on `docker-compose.yml` to use external config
- [x] Test execution of the nginx container
- [x] Test cluster execution | priority | use official nginx image without rebuilding description currently we re rebuilding the official nginx image all we re doing is adding a couple of tools and an entrypoint which builds certificates and set things up before starting the web server basically this run apt get update apt get install y openssl utils copy config entrypoint sh entrypoint sh entrypoint entrypoint sh this entrypoint will build a self signed certificate and the htpasswd file for basic auth hence the installed packages openssl and utils using the nginx image without rebuilding is possible by mounting a ready made config directory with these files already pros more freedom for users to define anything on the config cons build your own htpasswd certificates tasks create a sample config for nginx to mount rewrite nginx config on docker compose yml to use external config test execution of the nginx container test cluster execution | 1 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.