Unnamed: 0
int64
0
832k
id
float64
2.49B
32.1B
type
stringclasses
1 value
created_at
stringlengths
19
19
repo
stringlengths
5
112
repo_url
stringlengths
34
141
action
stringclasses
3 values
title
stringlengths
1
1k
labels
stringlengths
4
1.38k
body
stringlengths
1
262k
index
stringclasses
16 values
text_combine
stringlengths
96
262k
label
stringclasses
2 values
text
stringlengths
96
252k
binary_label
int64
0
1
183,130
6,677,462,769
IssuesEvent
2017-10-05 10:33:27
WordPress/gutenberg
https://api.github.com/repos/WordPress/gutenberg
closed
Internet Explorer 11: all the SVG icons are focusable
Accessibility Browser Issues Priority High
IE 11 suffers from a bug where all SVG icons _inside focusable elements_ default to `focusable=โ€trueโ€`. As a consequence, both the wrapper focusable element _and_ the inner SVG get focus and create a tab stop. This is new to me (not a great SVG expert here) but seems to be a well known bug. More details, for example, here: http://simplyaccessible.com/article/7-solutions-svgs/#acc-heading-4 I've reproduced this behavior testing with IE 11 on all the controls that use SVG icons, for example the ones highlighted in the screenshot below: ![screenshot 116](https://user-images.githubusercontent.com/1682452/27680568-76db96f6-5cbc-11e7-8ed4-e3bc7a74dbf1.png) This is very annoying because, when using a keyboard, users have to tab twice to navigate content every time they encounter a control with a SVG icon. I haven't been able to reproduce in Edge, where everything seems to work fine, but some more testing would be nice. Seems the recommended fix is to add `focusable="false"` to the SVGs, but maybe worth researching if there are other, less intrusive, fixes.
1.0
Internet Explorer 11: all the SVG icons are focusable - IE 11 suffers from a bug where all SVG icons _inside focusable elements_ default to `focusable=โ€trueโ€`. As a consequence, both the wrapper focusable element _and_ the inner SVG get focus and create a tab stop. This is new to me (not a great SVG expert here) but seems to be a well known bug. More details, for example, here: http://simplyaccessible.com/article/7-solutions-svgs/#acc-heading-4 I've reproduced this behavior testing with IE 11 on all the controls that use SVG icons, for example the ones highlighted in the screenshot below: ![screenshot 116](https://user-images.githubusercontent.com/1682452/27680568-76db96f6-5cbc-11e7-8ed4-e3bc7a74dbf1.png) This is very annoying because, when using a keyboard, users have to tab twice to navigate content every time they encounter a control with a SVG icon. I haven't been able to reproduce in Edge, where everything seems to work fine, but some more testing would be nice. Seems the recommended fix is to add `focusable="false"` to the SVGs, but maybe worth researching if there are other, less intrusive, fixes.
priority
internet explorer all the svg icons are focusable ie suffers from a bug where all svg icons inside focusable elements default to focusable โ€trueโ€ as a consequence both the wrapper focusable element and the inner svg get focus and create a tab stop this is new to me not a great svg expert here but seems to be a well known bug more details for example here i ve reproduced this behavior testing with ie on all the controls that use svg icons for example the ones highlighted in the screenshot below this is very annoying because when using a keyboard users have to tab twice to navigate content every time they encounter a control with a svg icon i haven t been able to reproduce in edge where everything seems to work fine but some more testing would be nice seems the recommended fix is to add focusable false to the svgs but maybe worth researching if there are other less intrusive fixes
1
210,371
16,098,094,656
IssuesEvent
2021-04-27 05:02:27
rancher/rancher
https://api.github.com/repos/rancher/rancher
opened
RKE2 Provisioning: Cluster Options - CNI - Canal
[zube]: To Test area/rke2
Canal as a CNI Option ``` apiVersion: provisioning.cattle.io/v1 kind: Cluster metadata: name: #string annotations: {} # key: string labels: {} # key: string namespace: fleet-default spec: cloudCredentialSecretName: do kubernetesVersion: v1.20.5+rke2r1 rkeConfig: # cni: string ```
1.0
RKE2 Provisioning: Cluster Options - CNI - Canal - Canal as a CNI Option ``` apiVersion: provisioning.cattle.io/v1 kind: Cluster metadata: name: #string annotations: {} # key: string labels: {} # key: string namespace: fleet-default spec: cloudCredentialSecretName: do kubernetesVersion: v1.20.5+rke2r1 rkeConfig: # cni: string ```
non_priority
provisioning cluster options cni canal canal as a cni option apiversion provisioning cattle io kind cluster metadata name string annotations key string labels key string namespace fleet default spec cloudcredentialsecretname do kubernetesversion rkeconfig cni string
0
134,692
10,927,151,824
IssuesEvent
2019-11-22 16:06:00
LiskHQ/lisk-sdk
https://api.github.com/repos/LiskHQ/lisk-sdk
closed
Add more test coverage for logic that uses delegateMinHeightActive value
type: test
### Description As a follow up to the #4473 we need to add missing unit and integration tests. ### Acceptance Criteria - Add unit test coverage to DPoS module - Add integration test coverage to DPoS module. - Add unit test coverage to BFT module. ### Additional Information
1.0
Add more test coverage for logic that uses delegateMinHeightActive value - ### Description As a follow up to the #4473 we need to add missing unit and integration tests. ### Acceptance Criteria - Add unit test coverage to DPoS module - Add integration test coverage to DPoS module. - Add unit test coverage to BFT module. ### Additional Information
non_priority
add more test coverage for logic that uses delegateminheightactive value description as a follow up to the we need to add missing unit and integration tests acceptance criteria add unit test coverage to dpos module add integration test coverage to dpos module add unit test coverage to bft module additional information
0
553,336
16,370,062,895
IssuesEvent
2021-05-15 00:22:20
Roadhog360/Et-Futurum
https://api.github.com/repos/Roadhog360/Et-Futurum
closed
Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots.
Enhancement Priority: High
Just as the Title says, Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. Because "blockCopper" is assumed by every single other Mod to be worth 9 Ingots, resulting in a super easy exploit. This is only about the OreDict registration, the 4 Ingot Recipe can stay as long as the Block is not OreDicted as "blockCopper".
1.0
Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. - Just as the Title says, Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. Because "blockCopper" is assumed by every single other Mod to be worth 9 Ingots, resulting in a super easy exploit. This is only about the OreDict registration, the 4 Ingot Recipe can stay as long as the Block is not OreDicted as "blockCopper".
priority
copper blocks should only be registered to the oredict when the config makes their recipe worth ingots just as the title says copper blocks should only be registered to the oredict when the config makes their recipe worth ingots because blockcopper is assumed by every single other mod to be worth ingots resulting in a super easy exploit this is only about the oredict registration the ingot recipe can stay as long as the block is not oredicted as blockcopper
1
318,491
23,723,847,137
IssuesEvent
2022-08-30 17:39:43
bloom-housing/bloom
https://api.github.com/repos/bloom-housing/bloom
closed
Add documentation of the translations process and string locations
Documentation
I expect this will be one of the most common sources of customization and changes, so I think we should invest in having good developer documentation for how to do it, since the actual work should be super straight-forward once you find all the files in the right places. My initial vision in just a Markdown doc in the top-level docs directory, similar to my poorly-stubbed out Styling.MD, but I'm wide open to other options. For extra credit, add useful content to Styling.MD too :)
1.0
Add documentation of the translations process and string locations - I expect this will be one of the most common sources of customization and changes, so I think we should invest in having good developer documentation for how to do it, since the actual work should be super straight-forward once you find all the files in the right places. My initial vision in just a Markdown doc in the top-level docs directory, similar to my poorly-stubbed out Styling.MD, but I'm wide open to other options. For extra credit, add useful content to Styling.MD too :)
non_priority
add documentation of the translations process and string locations i expect this will be one of the most common sources of customization and changes so i think we should invest in having good developer documentation for how to do it since the actual work should be super straight forward once you find all the files in the right places my initial vision in just a markdown doc in the top level docs directory similar to my poorly stubbed out styling md but i m wide open to other options for extra credit add useful content to styling md too
0
263,837
8,302,336,805
IssuesEvent
2018-09-21 14:15:36
ZeusWPI/MOZAIC
https://api.github.com/repos/ZeusWPI/MOZAIC
opened
Proxy server
difficulty:hard networking priority:medium
Create a proxy for MOZAIC connections. Basically, this would require creating some 'forwarding table', to which you'd add (match, destination) pairs. You could then register your locally-running match with the proxy, so that your games can traverse NATs and whatnot.
1.0
Proxy server - Create a proxy for MOZAIC connections. Basically, this would require creating some 'forwarding table', to which you'd add (match, destination) pairs. You could then register your locally-running match with the proxy, so that your games can traverse NATs and whatnot.
priority
proxy server create a proxy for mozaic connections basically this would require creating some forwarding table to which you d add match destination pairs you could then register your locally running match with the proxy so that your games can traverse nats and whatnot
1
60,590
14,562,631,941
IssuesEvent
2020-12-17 00:32:12
Dima2021/lodash
https://api.github.com/repos/Dima2021/lodash
opened
CVE-2017-16138 (High) detected in mime-1.2.11.tgz
security vulnerability
## CVE-2017-16138 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mime-1.2.11.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p> <p>Path to dependency file: lodash/package.json</p> <p>Path to vulnerable library: lodash/node_modules/form-data/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - codecov.io-0.1.6.tgz (Root Library) - request-2.42.0.tgz - form-data-0.1.4.tgz - :x: **mime-1.2.11.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/Dima2021/lodash/commits/50af7e310d557bae73ac2badb6ac6ecda0cebcb0">50af7e310d557bae73ac2badb6ac6ecda0cebcb0</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138>CVE-2017-16138</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution: 1.4.1,2.0.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mime","packageVersion":"1.2.11","isTransitiveDependency":true,"dependencyTree":"codecov.io:0.1.6;request:2.42.0;form-data:0.1.4;mime:1.2.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.1,2.0.3"}],"vulnerabilityIdentifier":"CVE-2017-16138","vulnerabilityDetails":"The mime module \u003c 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
True
CVE-2017-16138 (High) detected in mime-1.2.11.tgz - ## CVE-2017-16138 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mime-1.2.11.tgz</b></p></summary> <p>A comprehensive library for mime-type mapping</p> <p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p> <p>Path to dependency file: lodash/package.json</p> <p>Path to vulnerable library: lodash/node_modules/form-data/node_modules/mime/package.json</p> <p> Dependency Hierarchy: - codecov.io-0.1.6.tgz (Root Library) - request-2.42.0.tgz - form-data-0.1.4.tgz - :x: **mime-1.2.11.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://api.github.com/repos/Dima2021/lodash/commits/50af7e310d557bae73ac2badb6ac6ecda0cebcb0">50af7e310d557bae73ac2badb6ac6ecda0cebcb0</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input. <p>Publish Date: 2018-06-07 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138>CVE-2017-16138</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p> <p>Release Date: 2018-06-07</p> <p>Fix Resolution: 1.4.1,2.0.3</p> </p> </details> <p></p> <!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mime","packageVersion":"1.2.11","isTransitiveDependency":true,"dependencyTree":"codecov.io:0.1.6;request:2.42.0;form-data:0.1.4;mime:1.2.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.1,2.0.3"}],"vulnerabilityIdentifier":"CVE-2017-16138","vulnerabilityDetails":"The mime module \u003c 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> -->
non_priority
cve high detected in mime tgz cve high severity vulnerability vulnerable library mime tgz a comprehensive library for mime type mapping library home page a href path to dependency file lodash package json path to vulnerable library lodash node modules form data node modules mime package json dependency hierarchy codecov io tgz root library request tgz form data tgz x mime tgz vulnerable library found in head commit a href found in base branch master vulnerability details the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input vulnerabilityurl
0
721,380
24,824,269,511
IssuesEvent
2022-10-25 19:09:16
dnnsoftware/Dnn.Platform
https://api.github.com/repos/dnnsoftware/Dnn.Platform
closed
Cannot delete too many files at once in new Resource Manager
Type: Bug Area: Platform > Admin Modules Effort: Medium Priority: High Status: Ready for Development
## Description of bug When attempting to delete many files in the new Resource Manager, the UI does not allow for scrollable content. ## Steps to reproduce 1. Go to 'Site Assets' or `Global Assets`. 2. Upload a lot of files into the 'Images' folder. 3. Select a significant number of the files and click `Delete`. 4. See UI problem in screenshot below. ## Current behavior The content is too tall for the page and the buttons are no longer viewable. ## Expected behavior Content should be scrollable within the modal and limited to a percentage of the view height, allowing room for buttons. ## Screenshots ![image](https://user-images.githubusercontent.com/4568451/197083823-aa4eb5cd-afb0-4e83-a9c5-b6b1fac31681.png) ## Error information n/a ## Additional context n/a ## Affected version * [ ] 10.00.00 alpha build * [x] 09.11.00 release candidate * [ ] 09.10.02 release candidate * [ ] 09.10.01 latest supported release ## Affected browser * [x] Chrome * [x] Firefox * [x] Safari * [x] Internet Explorer 11 * [x] Microsoft Edge (Classic) * [x] Microsoft Edge Chromium
1.0
Cannot delete too many files at once in new Resource Manager - ## Description of bug When attempting to delete many files in the new Resource Manager, the UI does not allow for scrollable content. ## Steps to reproduce 1. Go to 'Site Assets' or `Global Assets`. 2. Upload a lot of files into the 'Images' folder. 3. Select a significant number of the files and click `Delete`. 4. See UI problem in screenshot below. ## Current behavior The content is too tall for the page and the buttons are no longer viewable. ## Expected behavior Content should be scrollable within the modal and limited to a percentage of the view height, allowing room for buttons. ## Screenshots ![image](https://user-images.githubusercontent.com/4568451/197083823-aa4eb5cd-afb0-4e83-a9c5-b6b1fac31681.png) ## Error information n/a ## Additional context n/a ## Affected version * [ ] 10.00.00 alpha build * [x] 09.11.00 release candidate * [ ] 09.10.02 release candidate * [ ] 09.10.01 latest supported release ## Affected browser * [x] Chrome * [x] Firefox * [x] Safari * [x] Internet Explorer 11 * [x] Microsoft Edge (Classic) * [x] Microsoft Edge Chromium
priority
cannot delete too many files at once in new resource manager description of bug when attempting to delete many files in the new resource manager the ui does not allow for scrollable content steps to reproduce go to site assets or global assets upload a lot of files into the images folder select a significant number of the files and click delete see ui problem in screenshot below current behavior the content is too tall for the page and the buttons are no longer viewable expected behavior content should be scrollable within the modal and limited to a percentage of the view height allowing room for buttons screenshots error information n a additional context n a affected version alpha build release candidate release candidate latest supported release affected browser chrome firefox safari internet explorer microsoft edge classic microsoft edge chromium
1
212,285
7,235,349,353
IssuesEvent
2018-02-13 00:14:10
SmartlyDressedGames/Unturned-4.x-Community
https://api.github.com/repos/SmartlyDressedGames/Unturned-4.x-Community
closed
Recursive attachable slot search for T attachments view
Priority: High Status: Complete Type: Feature
Allow changing all attachments on the item in this view
1.0
Recursive attachable slot search for T attachments view - Allow changing all attachments on the item in this view
priority
recursive attachable slot search for t attachments view allow changing all attachments on the item in this view
1
363,065
25,406,938,461
IssuesEvent
2022-11-22 15:56:13
Orange-OpenSource/ods-ios
https://api.github.com/repos/Orange-OpenSource/ods-ios
opened
[Doc]: Text field documentation consistency
documentation
### Documentation Location https://orange-opensource.github.io/ods-ios/components/textSelection_docs ### Current issue the side bar navigation and page title are not consistant ### Expected Correction the "Text field" wording should be used everywhere ### Additional context the file name should also be changed, but we need to update the DSM when this is pushed to production.
1.0
[Doc]: Text field documentation consistency - ### Documentation Location https://orange-opensource.github.io/ods-ios/components/textSelection_docs ### Current issue the side bar navigation and page title are not consistant ### Expected Correction the "Text field" wording should be used everywhere ### Additional context the file name should also be changed, but we need to update the DSM when this is pushed to production.
non_priority
text field documentation consistency documentation location current issue the side bar navigation and page title are not consistant expected correction the text field wording should be used everywhere additional context the file name should also be changed but we need to update the dsm when this is pushed to production
0
226,204
17,316,896,085
IssuesEvent
2021-07-27 07:31:14
Automattic/abacus
https://api.github.com/repos/Automattic/abacus
closed
Link wiki to code setup tab
[!priority] low [section] experiment overview [type] documentation
We discussed in our milestone planning meeting that we think it's a good idea to change the "code setup" tab to **simply link to the experimenter's guide** [writing code variants](https://github.com/Automattic/experimentation-platform/wiki/Experimenter's-Guide#writing-the-controlvariant-code-experiences) section. This will help clean up that tab, because we don't think many experimenters use it. We should make sure to open new tab when the tab is clicked (instead of redirecting current window).
1.0
Link wiki to code setup tab - We discussed in our milestone planning meeting that we think it's a good idea to change the "code setup" tab to **simply link to the experimenter's guide** [writing code variants](https://github.com/Automattic/experimentation-platform/wiki/Experimenter's-Guide#writing-the-controlvariant-code-experiences) section. This will help clean up that tab, because we don't think many experimenters use it. We should make sure to open new tab when the tab is clicked (instead of redirecting current window).
non_priority
link wiki to code setup tab we discussed in our milestone planning meeting that we think it s a good idea to change the code setup tab to simply link to the experimenter s guide section this will help clean up that tab because we don t think many experimenters use it we should make sure to open new tab when the tab is clicked instead of redirecting current window
0
240,416
20,028,449,989
IssuesEvent
2022-02-02 00:49:34
learnpack/learnpack
https://api.github.com/repos/learnpack/learnpack
closed
Positional argument
๐Ÿšฅ unit-test ๐Ÿ–๐Ÿฝ waiting-feedback
**Describe the bug** A clear and concise description of what the bug is. 1. Positional argument was required (i.e. def hello_world(todos = todos): instead of just def hello_world(todos):) I would say broadly otherwise, it was never explained how to check if basic flask functions like jsonify are working - how to test them in the console etc. Would be useful for determining if the error was my use of flask.jsonify() instead of flask.json.jsonify() or something along those lines. **In what exercise** If applicable, what exercise where you trying to complete? 05 - Returning JSON **Screenshot** If possible, add a screenshot of the error. You can use [awesome screenshot for free](https://www.awesomescreenshot.com/).
1.0
Positional argument - **Describe the bug** A clear and concise description of what the bug is. 1. Positional argument was required (i.e. def hello_world(todos = todos): instead of just def hello_world(todos):) I would say broadly otherwise, it was never explained how to check if basic flask functions like jsonify are working - how to test them in the console etc. Would be useful for determining if the error was my use of flask.jsonify() instead of flask.json.jsonify() or something along those lines. **In what exercise** If applicable, what exercise where you trying to complete? 05 - Returning JSON **Screenshot** If possible, add a screenshot of the error. You can use [awesome screenshot for free](https://www.awesomescreenshot.com/).
non_priority
positional argument describe the bug a clear and concise description of what the bug is positional argument was required i e def hello world todos todos instead of just def hello world todos i would say broadly otherwise it was never explained how to check if basic flask functions like jsonify are working how to test them in the console etc would be useful for determining if the error was my use of flask jsonify instead of flask json jsonify or something along those lines in what exercise if applicable what exercise where you trying to complete returning json screenshot if possible add a screenshot of the error you can use
0
775,809
27,237,947,417
IssuesEvent
2023-02-21 17:44:56
etternagame/etterna
https://api.github.com/repos/etternagame/etterna
opened
Replay playback slightly off by a tiny amount
Type: Bug Priority: Medium
2 greats in playback, pfc in local and online replay online playback is correct https://etternaonline.com/song/view/103571#154228 https://etternaonline.com/score/view/Sdcbf00b32b1f08830b5985c1c70538dae09223e250483 https://www.youtube.com/watch?v=bcoWxVylsQI
1.0
Replay playback slightly off by a tiny amount - 2 greats in playback, pfc in local and online replay online playback is correct https://etternaonline.com/song/view/103571#154228 https://etternaonline.com/score/view/Sdcbf00b32b1f08830b5985c1c70538dae09223e250483 https://www.youtube.com/watch?v=bcoWxVylsQI
priority
replay playback slightly off by a tiny amount greats in playback pfc in local and online replay online playback is correct
1
108,538
9,310,018,484
IssuesEvent
2019-03-25 17:45:57
rancher/longhorn
https://api.github.com/repos/rancher/longhorn
opened
Add test case for invalid backup volume list in the manager
area/test
It's a follow up of https://github.com/rancher/longhorn/issues/399 We should mix healthy and failed backup volumes and make sure they work well with the manager API in the end.
1.0
Add test case for invalid backup volume list in the manager - It's a follow up of https://github.com/rancher/longhorn/issues/399 We should mix healthy and failed backup volumes and make sure they work well with the manager API in the end.
non_priority
add test case for invalid backup volume list in the manager it s a follow up of we should mix healthy and failed backup volumes and make sure they work well with the manager api in the end
0
397,551
11,729,244,941
IssuesEvent
2020-03-10 19:00:33
react-figma/react-figma
https://api.github.com/repos/react-figma/react-figma
closed
horizontalPadding/verticalPadding is not compatible with Yoga
complexity: medium priority: medium topic: figma api topic: yoga type: bug
Let's consider example: ```javascript const NewComponent = createComponent(); export const App = () => { return ( <Page name="New page" isCurrent> <NewComponent.Component> <View layoutMode='HORIZONTAL' horizontalPadding={4} verticalPadding={1} style={{ backgroundColor: '#EDF1F5' }} > <Text characters='testing' /> </View> </NewComponent.Component> </Page> ); }; ``` Component will have size that equal to text (37x14): <img width="828" alt="Screenshot 2020-02-27 at 23 06 33" src="https://user-images.githubusercontent.com/1270648/75482419-df634900-59b5-11ea-8381-195006a24225.png">
1.0
horizontalPadding/verticalPadding is not compatible with Yoga - Let's consider example: ```javascript const NewComponent = createComponent(); export const App = () => { return ( <Page name="New page" isCurrent> <NewComponent.Component> <View layoutMode='HORIZONTAL' horizontalPadding={4} verticalPadding={1} style={{ backgroundColor: '#EDF1F5' }} > <Text characters='testing' /> </View> </NewComponent.Component> </Page> ); }; ``` Component will have size that equal to text (37x14): <img width="828" alt="Screenshot 2020-02-27 at 23 06 33" src="https://user-images.githubusercontent.com/1270648/75482419-df634900-59b5-11ea-8381-195006a24225.png">
priority
horizontalpadding verticalpadding is not compatible with yoga let s consider example javascript const newcomponent createcomponent export const app return view layoutmode horizontal horizontalpadding verticalpadding style backgroundcolor text characters testing component will have size that equal to text img width alt screenshot at src
1
237,834
7,767,107,230
IssuesEvent
2018-06-03 00:41:04
martchellop/Entretenibit
https://api.github.com/repos/martchellop/Entretenibit
closed
Add the user click in the card
enhancement priority: high
When the user clicks in a card, a bigger card will show up in the middle of the screen and the background will be out of focus. See #44 for more reference.
1.0
Add the user click in the card - When the user clicks in a card, a bigger card will show up in the middle of the screen and the background will be out of focus. See #44 for more reference.
priority
add the user click in the card when the user clicks in a card a bigger card will show up in the middle of the screen and the background will be out of focus see for more reference
1
36,234
5,039,670,815
IssuesEvent
2016-12-18 22:52:21
red/red
https://api.github.com/repos/red/red
closed
Console crashes when `compose` used with `url!` as an argument to `write`
status.built status.tested type.bug
``` red>> write http://abc.com compose [] *** Internal error: reserved for future use (or not yet implemented) *** Where: write ``` But ``` red>> write http://abc.com compose [ {} {} ] ``` gives (in debug mode) - ``` *** Runtime Error 1: access violation *** in file: /C/Users/ABC/Desktop/red/environment/console/datatypes/symbol.reds *** at line: 137 *** *** stack: red/symbol/resolve 3514672 *** stack: red/url/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h *** stack: red/actions/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h *** stack: red/actions/write* -1 -1 -1 -1 -1 -1 -1 -1 *** stack: red/interpreter/eval-arguments 0285B310h 0287C828h 0287C828h 00000000h 00000000h *** stack: red/interpreter/eval-code 0285B310h 0287C7F8h 0287C828h false 00000000h 00000000h 0285B310h *** stack: red/interpreter/eval-expression 0287C7F8h 0287C828h false false *** stack: red/interpreter/eval 027C3B80h true *** stack: red/natives/do* false -1 *** stack: red/interpreter/eval-arguments 0285B4D0h 0284EEB0h 0284EEB0h 00000000h 00000000h *** stack: red/interpreter/eval-code 0285B4D0h 0284EEA0h 0284EEB0h true 00000000h 00000000h 0285B4D0h *** stack: red/interpreter/eval-expression 0284EEA0h 0284EEB0h false true *** stack: red/interpreter/eval-arguments 0285AA70h 0284EE90h 0284EEB0h 0284EE70h 0284EEC4h *** stack: red/interpreter/eval-code 0285AA70h 0284EE80h 0284EEB0h true 0284EE70h 0284EEC4h 0285AA70h *** stack: red/interpreter/eval-path 0284EE70h 0284EE80h 0284EEB0h false false false false *** stack: red/interpreter/eval-expression 0284EE80h 0284EEB0h false false *** stack: red/interpreter/eval 027C3B50h true *** stack: red/natives/catch* true 1 *** stack: ctx253~try-do 0035CE0Ch *** stack: red/_function/call 0283914Ch 0035CE0Ch *** stack: red/interpreter/eval-code 0283914Ch 0284F574h 0284F5C4h true 00000000h 00000000h 0283914Ch *** stack: red/interpreter/eval-expression 0284F564h 0284F5C4h false true *** stack: red/interpreter/eval-arguments 0285AA70h 0284F554h 0284F5C4h 0284F534h 0284F5D8h *** stack: red/interpreter/eval-code 0285AA70h 0284F544h 0284F5C4h true 0284F534h 0284F5D8h 0285AA70h *** stack: red/interpreter/eval-path 0284F534h 0284F544h 0284F5C4h false false false false *** stack: red/interpreter/eval-expression 0284F544h 0284F5C4h false false *** stack: red/interpreter/eval 027C3AD0h true *** stack: red/natives/unless* false *** stack: red/interpreter/eval-arguments 0285B370h 0284F410h 0284F430h 00000000h 00000000h *** stack: red/interpreter/eval-code 0285B370h 0284F3E0h 0284F430h false 00000000h 00000000h 0285B370h *** stack: red/interpreter/eval-expression 0284F3E0h 0284F430h false false *** stack: red/interpreter/eval 027C3AB0h true *** stack: red/natives/do* true -1 *** stack: ctx253~eval-command 0035CE0Ch *** stack: ctx253~run 0035CE0Ch *** stack: ctx253~launch 0035CE0Ch ```
1.0
Console crashes when `compose` used with `url!` as an argument to `write` - ``` red>> write http://abc.com compose [] *** Internal error: reserved for future use (or not yet implemented) *** Where: write ``` But ``` red>> write http://abc.com compose [ {} {} ] ``` gives (in debug mode) - ``` *** Runtime Error 1: access violation *** in file: /C/Users/ABC/Desktop/red/environment/console/datatypes/symbol.reds *** at line: 137 *** *** stack: red/symbol/resolve 3514672 *** stack: red/url/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h *** stack: red/actions/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h *** stack: red/actions/write* -1 -1 -1 -1 -1 -1 -1 -1 *** stack: red/interpreter/eval-arguments 0285B310h 0287C828h 0287C828h 00000000h 00000000h *** stack: red/interpreter/eval-code 0285B310h 0287C7F8h 0287C828h false 00000000h 00000000h 0285B310h *** stack: red/interpreter/eval-expression 0287C7F8h 0287C828h false false *** stack: red/interpreter/eval 027C3B80h true *** stack: red/natives/do* false -1 *** stack: red/interpreter/eval-arguments 0285B4D0h 0284EEB0h 0284EEB0h 00000000h 00000000h *** stack: red/interpreter/eval-code 0285B4D0h 0284EEA0h 0284EEB0h true 00000000h 00000000h 0285B4D0h *** stack: red/interpreter/eval-expression 0284EEA0h 0284EEB0h false true *** stack: red/interpreter/eval-arguments 0285AA70h 0284EE90h 0284EEB0h 0284EE70h 0284EEC4h *** stack: red/interpreter/eval-code 0285AA70h 0284EE80h 0284EEB0h true 0284EE70h 0284EEC4h 0285AA70h *** stack: red/interpreter/eval-path 0284EE70h 0284EE80h 0284EEB0h false false false false *** stack: red/interpreter/eval-expression 0284EE80h 0284EEB0h false false *** stack: red/interpreter/eval 027C3B50h true *** stack: red/natives/catch* true 1 *** stack: ctx253~try-do 0035CE0Ch *** stack: red/_function/call 0283914Ch 0035CE0Ch *** stack: red/interpreter/eval-code 0283914Ch 0284F574h 0284F5C4h true 00000000h 00000000h 0283914Ch *** stack: red/interpreter/eval-expression 0284F564h 0284F5C4h false true *** stack: red/interpreter/eval-arguments 0285AA70h 0284F554h 0284F5C4h 0284F534h 0284F5D8h *** stack: red/interpreter/eval-code 0285AA70h 0284F544h 0284F5C4h true 0284F534h 0284F5D8h 0285AA70h *** stack: red/interpreter/eval-path 0284F534h 0284F544h 0284F5C4h false false false false *** stack: red/interpreter/eval-expression 0284F544h 0284F5C4h false false *** stack: red/interpreter/eval 027C3AD0h true *** stack: red/natives/unless* false *** stack: red/interpreter/eval-arguments 0285B370h 0284F410h 0284F430h 00000000h 00000000h *** stack: red/interpreter/eval-code 0285B370h 0284F3E0h 0284F430h false 00000000h 00000000h 0285B370h *** stack: red/interpreter/eval-expression 0284F3E0h 0284F430h false false *** stack: red/interpreter/eval 027C3AB0h true *** stack: red/natives/do* true -1 *** stack: ctx253~eval-command 0035CE0Ch *** stack: ctx253~run 0035CE0Ch *** stack: ctx253~launch 0035CE0Ch ```
non_priority
console crashes when compose used with url as an argument to write red write compose internal error reserved for future use or not yet implemented where write but red write compose gives in debug mode runtime error access violation in file c users abc desktop red environment console datatypes symbol reds at line stack red symbol resolve stack red url write false false false false stack red actions write false false false false stack red actions write stack red interpreter eval arguments stack red interpreter eval code false stack red interpreter eval expression false false stack red interpreter eval true stack red natives do false stack red interpreter eval arguments stack red interpreter eval code true stack red interpreter eval expression false true stack red interpreter eval arguments stack red interpreter eval code true stack red interpreter eval path false false false false stack red interpreter eval expression false false stack red interpreter eval true stack red natives catch true stack try do stack red function call stack red interpreter eval code true stack red interpreter eval expression false true stack red interpreter eval arguments stack red interpreter eval code true stack red interpreter eval path false false false false stack red interpreter eval expression false false stack red interpreter eval true stack red natives unless false stack red interpreter eval arguments stack red interpreter eval code false stack red interpreter eval expression false false stack red interpreter eval true stack red natives do true stack eval command stack run stack launch
0
139,132
31,241,553,876
IssuesEvent
2023-08-20 23:09:56
SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf
https://api.github.com/repos/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf
opened
Code Security Report: 90 high severity findings, 168 total findings
Mend: code security findings
# Code Security Report ### Scan Metadata **Latest Scan:** 2023-08-20 11:07pm **Total Findings:** 168 | **New Findings:** 0 | **Resolved Findings:** 0 **Tested Project Files:** 3 **Detected Programming Languages:** 1 (Java*) <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ### Most Relevant Findings > The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/92ccbcba-2f80-4d2d-a448-ff078ff4f884/details). <table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L194-L199 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L188 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1178-L1183 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1163 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L194-L199 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L188 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1178-L1183 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1163 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225-L1230 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1215 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy 2.java:721](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L721) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L716-L721 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L714 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy 2.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225-L1230 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1215 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings.java:696](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L696) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L691-L696 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L685 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy 2.java:744](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L744) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L739-L744 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L738 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:172](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L167-L172 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L166 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr></tbody></table> ### Findings Overview | Severity | Vulnerability Type | CWE | Language | Count | |-|-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Java*|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Command Injection|[CWE-78](https://cwe.mitre.org/data/definitions/78.html)|Java*|27| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|12| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Expression Language Injection|[CWE-917](https://cwe.mitre.org/data/definitions/917.html)|Java*|12| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Unsafe Format String|[CWE-134](https://cwe.mitre.org/data/definitions/134.html)|Java*|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|15| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Trust Boundary Violation|[CWE-501](https://cwe.mitre.org/data/definitions/501.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Insecure Cryptographic Algorithm|[CWE-327](https://cwe.mitre.org/data/definitions/327.html)|Java*|21| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|21| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Improper Verification of JWT Signature|[CWE-347](https://cwe.mitre.org/data/definitions/347.html)|Java*|12| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|LDAP Injection|[CWE-90](https://cwe.mitre.org/data/definitions/90.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|HTTP Header Injection|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|6|
1.0
Code Security Report: 90 high severity findings, 168 total findings - # Code Security Report ### Scan Metadata **Latest Scan:** 2023-08-20 11:07pm **Total Findings:** 168 | **New Findings:** 0 | **Resolved Findings:** 0 **Tested Project Files:** 3 **Detected Programming Languages:** 1 (Java*) <!-- SAST-MANUAL-SCAN-START --> - [ ] Check this box to manually trigger a scan <!-- SAST-MANUAL-SCAN-END --> ### Most Relevant Findings > The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/92ccbcba-2f80-4d2d-a448-ff078ff4f884/details). <table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L194-L199 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L188 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1178-L1183 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1163 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L194-L199 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L188 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1178-L1183 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1163 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225-L1230 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1215 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy 2.java:721](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L721) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L716-L721 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L714 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy 2.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225-L1230 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1215 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings.java:696](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L696) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L691-L696 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L685 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy 2.java:744](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L744) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L739-L744 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L738 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr><tr><td colspan='6'>&nbsp;</td></tr> <tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td> [CWE-78](https://cwe.mitre.org/data/definitions/78.html) </td><td> [60Findings copy.java:172](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172) </td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L167-L172 <details> <summary>1 Data Flow/s detected</summary></br> <details> <summary>View Data Flow 1</summary> https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L166 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172 https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172 </details> </details> </details> <details> <summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary> <ul><li>Training<ul><li> [Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li> </ul></li> <li>Videos<ul><li> [Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li> </ul></li> <li>Further Reading<ul><li> [OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li> <li> [OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li> </ul></li> </ul> </details> </td></tr></tbody></table> ### Findings Overview | Severity | Vulnerability Type | CWE | Language | Count | |-|-|-|-|-| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Java*|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Command Injection|[CWE-78](https://cwe.mitre.org/data/definitions/78.html)|Java*|27| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|12| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Expression Language Injection|[CWE-917](https://cwe.mitre.org/data/definitions/917.html)|Java*|12| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Unsafe Format String|[CWE-134](https://cwe.mitre.org/data/definitions/134.html)|Java*|6| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|15| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Trust Boundary Violation|[CWE-501](https://cwe.mitre.org/data/definitions/501.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Insecure Cryptographic Algorithm|[CWE-327](https://cwe.mitre.org/data/definitions/327.html)|Java*|21| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|21| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Improper Verification of JWT Signature|[CWE-347](https://cwe.mitre.org/data/definitions/347.html)|Java*|12| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|9| |<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|LDAP Injection|[CWE-90](https://cwe.mitre.org/data/definitions/90.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|HTTP Header Injection|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|Java*|3| |<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|6|
non_priority
code security report high severity findings total findings code security report scan metadata latest scan total findings new findings resolved findings tested project files detected programming languages java check this box to manually trigger a scan most relevant findings the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the severity vulnerability type cwe file data flows date high command injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high command injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java secure code warrior training material training videos further reading findings overview severity vulnerability type cwe language count high cross site scripting high command injection high path directory traversal high expression language injection high unsafe format string high sql injection high deserialization of untrusted data medium trust boundary violation medium insecure cryptographic algorithm medium hardcoded password credentials medium improper verification of jwt signature medium error messages information exposure medium ldap injection low http header injection low weak hash strength
0
107,856
16,762,433,188
IssuesEvent
2021-06-14 02:01:15
atlslscsrv-app/https-net-atlsecsrv-org.github.io-dev.azure.portal.dashboard-
https://api.github.com/repos/atlslscsrv-app/https-net-atlsecsrv-org.github.io-dev.azure.portal.dashboard-
opened
CVE-2019-13173 (High) detected in fstream-0.1.31.tgz, fstream-1.0.11.tgz
security vulnerability
## CVE-2019-13173 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>fstream-0.1.31.tgz</b>, <b>fstream-1.0.11.tgz</b></p></summary> <p> <details><summary><b>fstream-0.1.31.tgz</b></p></summary> <p>Advanced file system stream things</p> <p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz">https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/fstream/package.json</p> <p> Dependency Hierarchy: - unzip-0.1.11.tgz (Root Library) - :x: **fstream-0.1.31.tgz** (Vulnerable Library) </details> <details><summary><b>fstream-1.0.11.tgz</b></p></summary> <p>Advanced file system stream things</p> <p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz">https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/unzipper/node_modules/fstream/package.json</p> <p> Dependency Hierarchy: - unzipper-0.9.2.tgz (Root Library) - :x: **fstream-1.0.11.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable. <p>Publish Date: 2019-07-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173>CVE-2019-13173</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173</a></p> <p>Release Date: 2019-07-02</p> <p>Fix Resolution: 1.0.12</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2019-13173 (High) detected in fstream-0.1.31.tgz, fstream-1.0.11.tgz - ## CVE-2019-13173 - High Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>fstream-0.1.31.tgz</b>, <b>fstream-1.0.11.tgz</b></p></summary> <p> <details><summary><b>fstream-0.1.31.tgz</b></p></summary> <p>Advanced file system stream things</p> <p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz">https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/fstream/package.json</p> <p> Dependency Hierarchy: - unzip-0.1.11.tgz (Root Library) - :x: **fstream-0.1.31.tgz** (Vulnerable Library) </details> <details><summary><b>fstream-1.0.11.tgz</b></p></summary> <p>Advanced file system stream things</p> <p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz">https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz</a></p> <p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p> <p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/unzipper/node_modules/fstream/package.json</p> <p> Dependency Hierarchy: - unzipper-0.9.2.tgz (Root Library) - :x: **fstream-1.0.11.tgz** (Vulnerable Library) </details> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary> <p> fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable. <p>Publish Date: 2019-07-02 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173>CVE-2019-13173</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: High - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173</a></p> <p>Release Date: 2019-07-02</p> <p>Fix Resolution: 1.0.12</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve high detected in fstream tgz fstream tgz cve high severity vulnerability vulnerable libraries fstream tgz fstream tgz fstream tgz advanced file system stream things library home page a href path to dependency file tmp ws scm security alerts atlslscsrv app package json path to vulnerable library tmp ws scm security alerts atlslscsrv app node modules fstream package json dependency hierarchy unzip tgz root library x fstream tgz vulnerable library fstream tgz advanced file system stream things library home page a href path to dependency file tmp ws scm security alerts atlslscsrv app package json path to vulnerable library tmp ws scm security alerts atlslscsrv app node modules unzipper node modules fstream package json dependency hierarchy unzipper tgz root library x fstream tgz vulnerable library vulnerability details fstream before is vulnerable to arbitrary file overwrite extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system s file with the contents of the extracted file the fstream dirwriter function is vulnerable publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
261,237
27,809,519,806
IssuesEvent
2023-03-18 01:01:39
kristakunkle/juice-shop
https://api.github.com/repos/kristakunkle/juice-shop
closed
notevil-1.3.3.tgz: 1 vulnerabilities (highest severity is: 6.5) - autoclosed
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>notevil-1.3.3.tgz</b></p></summary> <p>Evalulate javascript like the built-in eval() method but safely</p> <p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/notevil/package.json</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (notevil version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-23771](https://www.mend.io/vulnerability-database/CVE-2021-23771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | notevil-1.3.3.tgz | Direct | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-23771</summary> ### Vulnerable Library - <b>notevil-1.3.3.tgz</b></p> <p>Evalulate javascript like the built-in eval() method but safely</p> <p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/notevil/package.json</p> <p> Dependency Hierarchy: - :x: **notevil-1.3.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23771>CVE-2021-23771</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details>
True
notevil-1.3.3.tgz: 1 vulnerabilities (highest severity is: 6.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>notevil-1.3.3.tgz</b></p></summary> <p>Evalulate javascript like the built-in eval() method but safely</p> <p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/notevil/package.json</p> <p> </details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (notevil version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2021-23771](https://www.mend.io/vulnerability-database/CVE-2021-23771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | notevil-1.3.3.tgz | Direct | N/A | &#10060; | ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-23771</summary> ### Vulnerable Library - <b>notevil-1.3.3.tgz</b></p> <p>Evalulate javascript like the built-in eval() method but safely</p> <p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p> <p>Path to dependency file: /package.json</p> <p>Path to vulnerable library: /node_modules/notevil/package.json</p> <p> Dependency Hierarchy: - :x: **notevil-1.3.3.tgz** (Vulnerable Library) <p>Found in base branch: <b>master</b></p> </p> <p></p> ### Vulnerability Details <p> This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878). <p>Publish Date: 2022-03-17 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23771>CVE-2021-23771</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>6.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: Low - Integrity Impact: Low - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> </details>
non_priority
notevil tgz vulnerabilities highest severity is autoclosed vulnerable library notevil tgz evalulate javascript like the built in eval method but safely library home page a href path to dependency file package json path to vulnerable library node modules notevil package json vulnerabilities cve severity cvss dependency type fixed in notevil version remediation available medium notevil tgz direct n a details cve vulnerable library notevil tgz evalulate javascript like the built in eval method but safely library home page a href path to dependency file package json path to vulnerable library node modules notevil package json dependency hierarchy x notevil tgz vulnerable library found in base branch master vulnerability details this affects all versions of package notevil all versions of package argencoders notevil it is vulnerable to sandbox escape leading to prototype pollution the package fails to restrict access to the main context allowing an attacker to add or modify an object s prototype note this vulnerability derives from an incomplete fix in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href
0
788,781
27,765,901,841
IssuesEvent
2023-03-16 11:27:15
brucestull/health-activity-tracker
https://api.github.com/repos/brucestull/health-activity-tracker
closed
Add RO-DBT 'Diary Card' model.
priority
Add basic `DiaryCard` model. Future updates will include the numerous fields of the model.
1.0
Add RO-DBT 'Diary Card' model. - Add basic `DiaryCard` model. Future updates will include the numerous fields of the model.
priority
add ro dbt diary card model add basic diarycard model future updates will include the numerous fields of the model
1
167,462
6,338,997,834
IssuesEvent
2017-07-27 07:00:58
BinPar/PRM
https://api.github.com/repos/BinPar/PRM
closed
PRM UNI PRO: ERROR CREANDO LA NUEVA PROMOCION. REFERENCIA A OBJETO...
Priority: High
![image](https://user-images.githubusercontent.com/22589031/28657765-c53cb31e-72a8-11e7-9faa-f4ee2d516541.png) Usuario: Noemรญ Promociรณn: Katch ebook @CristianBinpar @minigoBinpar @franciscorrr
1.0
PRM UNI PRO: ERROR CREANDO LA NUEVA PROMOCION. REFERENCIA A OBJETO... - ![image](https://user-images.githubusercontent.com/22589031/28657765-c53cb31e-72a8-11e7-9faa-f4ee2d516541.png) Usuario: Noemรญ Promociรณn: Katch ebook @CristianBinpar @minigoBinpar @franciscorrr
priority
prm uni pro error creando la nueva promocion referencia a objeto usuario noemรญ promociรณn katch ebook cristianbinpar minigobinpar franciscorrr
1
156,960
5,995,251,380
IssuesEvent
2017-06-03 01:35:25
universAAL/middleware
https://api.github.com/repos/universAAL/middleware
closed
Abstract types are not serialized
bug imported priority 3
_Originally Opened: @Alfiva (2012-04-12 19:00:30_) _Originally Closed: 2013-09-17 15:51:47_ I am not sure that this is actually a bug (and not a design decision) but it is as frustrating. With the introduction of the new data repr. abstract classes it took me a while realizing that abstract types of a concept are not serialized (sorry if this was explained somewhere). Example: &quot;apX&quot; is an instance of AssistedPerson. AssistedPerson is an ont subclass of User, which is an ont subclass of Profilable. Profilable is an abstract ont class. When &quot;apX&quot; is serialized its types are listed as: &quot;apX a ..User, ..AssistedPerson.&quot; But Profilable is not listed. I checked that if I make Profilable not abstract it appears. Could it be possible to include abstract types when serializing? Or is there some reason to prevent this? -- From: _this issue has been automatically imported from our old issue tracker_
1.0
Abstract types are not serialized - _Originally Opened: @Alfiva (2012-04-12 19:00:30_) _Originally Closed: 2013-09-17 15:51:47_ I am not sure that this is actually a bug (and not a design decision) but it is as frustrating. With the introduction of the new data repr. abstract classes it took me a while realizing that abstract types of a concept are not serialized (sorry if this was explained somewhere). Example: &quot;apX&quot; is an instance of AssistedPerson. AssistedPerson is an ont subclass of User, which is an ont subclass of Profilable. Profilable is an abstract ont class. When &quot;apX&quot; is serialized its types are listed as: &quot;apX a ..User, ..AssistedPerson.&quot; But Profilable is not listed. I checked that if I make Profilable not abstract it appears. Could it be possible to include abstract types when serializing? Or is there some reason to prevent this? -- From: _this issue has been automatically imported from our old issue tracker_
priority
abstract types are not serialized originally opened alfiva originally closed i am not sure that this is actually a bug and not a design decision but it is as frustrating with the introduction of the new data repr abstract classes it took me a while realizing that abstract types of a concept are not serialized sorry if this was explained somewhere example quot apx quot is an instance of assistedperson assistedperson is an ont subclass of user which is an ont subclass of profilable profilable is an abstract ont class when quot apx quot is serialized its types are listed as quot apx a user assistedperson quot but profilable is not listed i checked that if i make profilable not abstract it appears could it be possible to include abstract types when serializing or is there some reason to prevent this from this issue has been automatically imported from our old issue tracker
1
247,631
7,921,344,802
IssuesEvent
2018-07-05 07:08:32
hackoregon/data-science-pet-containers
https://api.github.com/repos/hackoregon/data-science-pet-containers
closed
refactor disturbance stops code to use less RAM
High priority bug
It's pushing past 7 GB when the rest of it works in 5 -
1.0
refactor disturbance stops code to use less RAM - It's pushing past 7 GB when the rest of it works in 5 -
priority
refactor disturbance stops code to use less ram it s pushing past gb when the rest of it works in
1
349,062
10,456,424,873
IssuesEvent
2019-09-20 01:04:17
busy-beaver-dev/busy-beaver
https://api.github.com/repos/busy-beaver-dev/busy-beaver
closed
Investigate alternative release workflow
effort high priority low spike
As a developer, I would like to have a nice release workflow Right now everything that gets merged into master gets deployed. This is good, but also not good. It would be good to cut releases. Investigate a good pattern.
1.0
Investigate alternative release workflow - As a developer, I would like to have a nice release workflow Right now everything that gets merged into master gets deployed. This is good, but also not good. It would be good to cut releases. Investigate a good pattern.
priority
investigate alternative release workflow as a developer i would like to have a nice release workflow right now everything that gets merged into master gets deployed this is good but also not good it would be good to cut releases investigate a good pattern
1
22,708
3,792,385,873
IssuesEvent
2016-03-22 09:28:58
CaliOpen/Caliopen
https://api.github.com/repos/CaliOpen/Caliopen
opened
[messages list] Show only the number of messages and not ยซ x/x ยป
design
Show only the number of messages: ![number of messages](https://cloud.githubusercontent.com/assets/6246015/13947102/cb5d4db2-f018-11e5-8c4c-926a60560bbd.png) and not ยซ x/โ€ฆ ยป ![number of messages-2](https://cloud.githubusercontent.com/assets/6246015/13947106/cf772d0a-f018-11e5-853a-d3284dd70c92.png)
1.0
[messages list] Show only the number of messages and not ยซ x/x ยป - Show only the number of messages: ![number of messages](https://cloud.githubusercontent.com/assets/6246015/13947102/cb5d4db2-f018-11e5-8c4c-926a60560bbd.png) and not ยซ x/โ€ฆ ยป ![number of messages-2](https://cloud.githubusercontent.com/assets/6246015/13947106/cf772d0a-f018-11e5-853a-d3284dd70c92.png)
non_priority
show only the number of messages and not ยซ x x ยป show only the number of messages and not ยซ x โ€ฆ ยป
0
393,043
26,969,922,822
IssuesEvent
2023-02-09 03:18:21
anansi-project/comicinfo
https://api.github.com/repos/anansi-project/comicinfo
closed
Roundup? StoryArc? What are they?
documentation question
As a user I would very much appreciate more details about the metadata and how it's supposed to be populated. What exactly _is_ the definition of `StoryArc` within the context of the rfcs? Is it the name of a chapter? A collection of chapters? Furthermore, what is `ComicPageType: Roundup` (and the other page types for that matter)? These metadata fields are confusing and I can't find any details on how to use them as the needed context is missing from the [schema documentation](https://anansi-project.github.io/docs/comicinfo/documentation). If it's all explained somewhere, I'll ask that you please excuse my obtuseness and point me toward it! Also, I'd like to request Page Type: ToC.
1.0
Roundup? StoryArc? What are they? - As a user I would very much appreciate more details about the metadata and how it's supposed to be populated. What exactly _is_ the definition of `StoryArc` within the context of the rfcs? Is it the name of a chapter? A collection of chapters? Furthermore, what is `ComicPageType: Roundup` (and the other page types for that matter)? These metadata fields are confusing and I can't find any details on how to use them as the needed context is missing from the [schema documentation](https://anansi-project.github.io/docs/comicinfo/documentation). If it's all explained somewhere, I'll ask that you please excuse my obtuseness and point me toward it! Also, I'd like to request Page Type: ToC.
non_priority
roundup storyarc what are they as a user i would very much appreciate more details about the metadata and how it s supposed to be populated what exactly is the definition of storyarc within the context of the rfcs is it the name of a chapter a collection of chapters furthermore what is comicpagetype roundup and the other page types for that matter these metadata fields are confusing and i can t find any details on how to use them as the needed context is missing from the if it s all explained somewhere i ll ask that you please excuse my obtuseness and point me toward it also i d like to request page type toc
0
111,651
14,116,610,127
IssuesEvent
2020-11-08 04:15:11
HACC2020/Trigeeks
https://api.github.com/repos/HACC2020/Trigeeks
closed
make Upcomming event View UI better
UI design
add a toggle button to hide ended events sort events make guestList UI better
1.0
make Upcomming event View UI better - add a toggle button to hide ended events sort events make guestList UI better
non_priority
make upcomming event view ui better add a toggle button to hide ended events sort events make guestlist ui better
0
706,975
24,290,039,976
IssuesEvent
2022-09-29 04:35:59
JasonBock/Rocks
https://api.github.com/repos/JasonBock/Rocks
closed
Use Hash Code to Get Consistent Value From String
enhancement Medium Priority
Using `GetHashCode()` on a `string` seems to yield a different value within every instance of an application or test run. Which is fine - `GetHashCode()` isn't meant to be an object identifier. But I'm using this in `MockProjectedDelegateBuilder`, and it makes testing code that projects these types ... well, hard, to say the least. I'd like to create a hash code for a `string` that will always give me the same answer every single time. It doesn't even have to be a 32-bit number; 64- or 128-bits are fine as well.
1.0
Use Hash Code to Get Consistent Value From String - Using `GetHashCode()` on a `string` seems to yield a different value within every instance of an application or test run. Which is fine - `GetHashCode()` isn't meant to be an object identifier. But I'm using this in `MockProjectedDelegateBuilder`, and it makes testing code that projects these types ... well, hard, to say the least. I'd like to create a hash code for a `string` that will always give me the same answer every single time. It doesn't even have to be a 32-bit number; 64- or 128-bits are fine as well.
priority
use hash code to get consistent value from string using gethashcode on a string seems to yield a different value within every instance of an application or test run which is fine gethashcode isn t meant to be an object identifier but i m using this in mockprojecteddelegatebuilder and it makes testing code that projects these types well hard to say the least i d like to create a hash code for a string that will always give me the same answer every single time it doesn t even have to be a bit number or bits are fine as well
1
407,514
27,618,745,224
IssuesEvent
2023-03-09 21:41:52
gravitational/teleport
https://api.github.com/repos/gravitational/teleport
opened
Move uninstall instructions to docs
documentation support-load
This guide is in discussions https://github.com/gravitational/teleport/discussions/9920 Customers don't think it's official and ask us to add this to docs instead.
1.0
Move uninstall instructions to docs - This guide is in discussions https://github.com/gravitational/teleport/discussions/9920 Customers don't think it's official and ask us to add this to docs instead.
non_priority
move uninstall instructions to docs this guide is in discussions customers don t think it s official and ask us to add this to docs instead
0
45,902
5,988,871,289
IssuesEvent
2017-06-02 06:45:20
geetsisbac/IQ4LK23ROQOKHZC3VKUTGRNI
https://api.github.com/repos/geetsisbac/IQ4LK23ROQOKHZC3VKUTGRNI
reopened
C9sGJ03248TDDO9xOQ9vZLyWe5wnSz96xUm5eW3WTzntq+wrMTG0zUHMYOkUUAmHqw5sZKMGFhXNaH1/ZOIJKMS41rj1FvKovp3inj6/OvWzthT+HYFyUmbDWkQGS01wKlJoW8+W7ijkMLMHxaZ+e/689nLehhr4spCDgK4sqSM=
design
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
1.0
C9sGJ03248TDDO9xOQ9vZLyWe5wnSz96xUm5eW3WTzntq+wrMTG0zUHMYOkUUAmHqw5sZKMGFhXNaH1/ZOIJKMS41rj1FvKovp3inj6/OvWzthT+HYFyUmbDWkQGS01wKlJoW8+W7ijkMLMHxaZ+e/689nLehhr4spCDgK4sqSM= - 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
non_priority
ovwztht e qckcqykvicvlnli iuawlkj vauns lbr q
0
73,303
14,021,170,015
IssuesEvent
2020-10-29 20:50:31
r-lib/usethis
https://api.github.com/repos/r-lib/usethis
closed
Extend `use_test` to support writing tests for files in `src/`
code :desktop_computer: feature
It seems like a reasonable use case to support writing testthat tests for exported functions from `src/` and not restrict things just to scripts in `R/`. This is currently being handled by the `get_active_r_file` functions which supports only files in `R/` with `r` or `R` extensions.
1.0
Extend `use_test` to support writing tests for files in `src/` - It seems like a reasonable use case to support writing testthat tests for exported functions from `src/` and not restrict things just to scripts in `R/`. This is currently being handled by the `get_active_r_file` functions which supports only files in `R/` with `r` or `R` extensions.
non_priority
extend use test to support writing tests for files in src it seems like a reasonable use case to support writing testthat tests for exported functions from src and not restrict things just to scripts in r this is currently being handled by the get active r file functions which supports only files in r with r or r extensions
0
288,395
8,839,086,629
IssuesEvent
2019-01-06 01:05:12
bosik/diacomp
https://api.github.com/repos/bosik/diacomp
closed
Login / Once logged and tapped Back, login screen is shown again
app:android priority:major type:bug
STR: * Fresh install or clear app data * Start app * Login into account, wait until data imported * Tap Back ER: * App is closed AR: * Login activity is shown
1.0
Login / Once logged and tapped Back, login screen is shown again - STR: * Fresh install or clear app data * Start app * Login into account, wait until data imported * Tap Back ER: * App is closed AR: * Login activity is shown
priority
login once logged and tapped back login screen is shown again str fresh install or clear app data start app login into account wait until data imported tap back er app is closed ar login activity is shown
1
26,782
7,869,116,592
IssuesEvent
2018-06-24 09:43:52
archlinuxcn/repo
https://api.github.com/repos/archlinuxcn/repo
closed
PHP53's obsolete dependency.
rebuild
### ้—ฎ้ข˜็ฑปๅž‹ / Type of issues Obsolete dependency. * ๆ‰“ๅŒ…้”™่ฏฏ / packaging error ### ๅ—ๅฝฑๅ“็š„่ฝฏไปถๅŒ… / Affected packages * `php53` ---- ่ฏทๅœจๆญค่กฅๅ……่ฏดๆ˜Žใ€‚ Please describe in detail here. ``` Cannot load modules/libphp53.so into server: libicui18n.so.59: ``` Existing shared object: ``` > pacman -Ql icu | grep libicui18n icu /usr/lib/libicui18n.so icu /usr/lib/libicui18n.so.61 icu /usr/lib/libicui18n.so.61.1 ```
1.0
PHP53's obsolete dependency. - ### ้—ฎ้ข˜็ฑปๅž‹ / Type of issues Obsolete dependency. * ๆ‰“ๅŒ…้”™่ฏฏ / packaging error ### ๅ—ๅฝฑๅ“็š„่ฝฏไปถๅŒ… / Affected packages * `php53` ---- ่ฏทๅœจๆญค่กฅๅ……่ฏดๆ˜Žใ€‚ Please describe in detail here. ``` Cannot load modules/libphp53.so into server: libicui18n.so.59: ``` Existing shared object: ``` > pacman -Ql icu | grep libicui18n icu /usr/lib/libicui18n.so icu /usr/lib/libicui18n.so.61 icu /usr/lib/libicui18n.so.61.1 ```
non_priority
s obsolete dependency ้—ฎ้ข˜็ฑปๅž‹ type of issues obsolete dependency ๆ‰“ๅŒ…้”™่ฏฏ packaging error ๅ—ๅฝฑๅ“็š„่ฝฏไปถๅŒ… affected packages ่ฏทๅœจๆญค่กฅๅ……่ฏดๆ˜Žใ€‚ please describe in detail here cannot load modules so into server so existing shared object pacman ql icu grep icu usr lib so icu usr lib so icu usr lib so
0
343,741
24,781,004,836
IssuesEvent
2022-10-24 04:57:27
Susmita-Dey/Sukoon
https://api.github.com/repos/Susmita-Dey/Sukoon
closed
Incorrect Links in CONTRIBUTING.md and CODE_OF_CONDUCT.md
documentation good first issue assigned hacktoberfest
2 of the Quick Links in [CONTRIUBTING.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CONTRIBUTING.md#quicklinks) aren't working and Mozilla code of conduct enforcement ladder link in [CODE_OF_CONDUCT.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CODE_OF_CONDUCT.md#attribution) is pointing towards just mozilla inclusion repo instead of actual enforcement ladder documentation.
1.0
Incorrect Links in CONTRIBUTING.md and CODE_OF_CONDUCT.md - 2 of the Quick Links in [CONTRIUBTING.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CONTRIBUTING.md#quicklinks) aren't working and Mozilla code of conduct enforcement ladder link in [CODE_OF_CONDUCT.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CODE_OF_CONDUCT.md#attribution) is pointing towards just mozilla inclusion repo instead of actual enforcement ladder documentation.
non_priority
incorrect links in contributing md and code of conduct md of the quick links in aren t working and mozilla code of conduct enforcement ladder link in is pointing towards just mozilla inclusion repo instead of actual enforcement ladder documentation
0
566,803
16,830,821,076
IssuesEvent
2021-06-18 04:20:11
openmsupply/msupply-dashboard
https://api.github.com/repos/openmsupply/msupply-dashboard
closed
User permissions
Priority: High
I've been meaning to write this out awhile ago, better late then never, this is one idea of how we can handle finer grained user permissions (looks like it can be done for Grafana Enterprise (paid version), but not for the free version. ### Exposing Grafana User to SQL Can hard code a variable `$grafanaUser` ![Screen Shot 2020-02-17 at 3 24 41 PM](https://user-images.githubusercontent.com/26194949/74619250-b82ca080-5199-11ea-8be2-9eb9ae85ef34.png) With this small change, we can access $grafanaUser as a template variable (will give the name of currently logged in user) ### Permission Restriction Instead of restricting each sql query, we can restrict what facilities and items appear in filters, using user, `user_store` table and some master list -> user association ### Restricting Store Can use `user_store` table to figure out which stores user 'can login to'. A helper `view` can be quite useful, would envision a filter like this: `select name from store where name like '% AMS' and ID in (select ID from userStores($grafanaUser))` ### Restricting Items Need to create a join table between user and master list, similar to store it will allow the following filter restriction. `select item_name from item where ID (select ID from userItems($grafanaUser))`
1.0
User permissions - I've been meaning to write this out awhile ago, better late then never, this is one idea of how we can handle finer grained user permissions (looks like it can be done for Grafana Enterprise (paid version), but not for the free version. ### Exposing Grafana User to SQL Can hard code a variable `$grafanaUser` ![Screen Shot 2020-02-17 at 3 24 41 PM](https://user-images.githubusercontent.com/26194949/74619250-b82ca080-5199-11ea-8be2-9eb9ae85ef34.png) With this small change, we can access $grafanaUser as a template variable (will give the name of currently logged in user) ### Permission Restriction Instead of restricting each sql query, we can restrict what facilities and items appear in filters, using user, `user_store` table and some master list -> user association ### Restricting Store Can use `user_store` table to figure out which stores user 'can login to'. A helper `view` can be quite useful, would envision a filter like this: `select name from store where name like '% AMS' and ID in (select ID from userStores($grafanaUser))` ### Restricting Items Need to create a join table between user and master list, similar to store it will allow the following filter restriction. `select item_name from item where ID (select ID from userItems($grafanaUser))`
priority
user permissions i ve been meaning to write this out awhile ago better late then never this is one idea of how we can handle finer grained user permissions looks like it can be done for grafana enterprise paid version but not for the free version exposing grafana user to sql can hard code a variable grafanauser with this small change we can access grafanauser as a template variable will give the name of currently logged in user permission restriction instead of restricting each sql query we can restrict what facilities and items appear in filters using user user store table and some master list user association restricting store can use user store table to figure out which stores user can login to a helper view can be quite useful would envision a filter like this select name from store where name like ams and id in select id from userstores grafanauser restricting items need to create a join table between user and master list similar to store it will allow the following filter restriction select item name from item where id select id from useritems grafanauser
1
203,681
23,169,848,031
IssuesEvent
2022-07-30 14:37:59
jvm-bloggers/jvm-bloggers
https://api.github.com/repos/jvm-bloggers/jvm-bloggers
closed
Spring Boot update to 2.6.10
Security Enhancement
As for now, we can safely bump up Spring Boot to version `2.6.10` - upgrading to `2.7` line is causing some bigger issues, mainly related to the `h2` v2 (that has been started used by default in this line) and `liquibase` operating on it, but it should be fixed in a different issue's scope.
True
Spring Boot update to 2.6.10 - As for now, we can safely bump up Spring Boot to version `2.6.10` - upgrading to `2.7` line is causing some bigger issues, mainly related to the `h2` v2 (that has been started used by default in this line) and `liquibase` operating on it, but it should be fixed in a different issue's scope.
non_priority
spring boot update to as for now we can safely bump up spring boot to version upgrading to line is causing some bigger issues mainly related to the that has been started used by default in this line and liquibase operating on it but it should be fixed in a different issue s scope
0
288,872
8,852,541,138
IssuesEvent
2019-01-08 18:39:10
visit-dav/issues-test
https://api.github.com/repos/visit-dav/issues-test
closed
BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS
bug crash likelihood medium priority reviewed severity high wrong results
-----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 294 Status: Resolved Project: VisIt Tracker: Bug Priority: Urgent Subject: BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS Assigned to: Mark Miller Category: - Target version: 2.0.2 Author: Mark Miller Start: 07/28/2010 Due date: % Done: 90% Estimated time: 0.10 hour Created: 07/28/2010 10:19 am Updated: 08/03/2010 07:04 pm Likelihood: 3 - Occasional Severity: 4 - Crash / Wrong Results Found in version: 2.0.0 Impact: Expected Use: OS: All Support Group: Any Description: Comments: There was an indexing loop variable error. Hank and I eye-balled together. Fixed in r12045
1.0
BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS - -----------------------REDMINE MIGRATION----------------------- This ticket was migrated from Redmine. As such, not all information was able to be captured in the transition. Below is a complete record of the original redmine ticket. Ticket number: 294 Status: Resolved Project: VisIt Tracker: Bug Priority: Urgent Subject: BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS Assigned to: Mark Miller Category: - Target version: 2.0.2 Author: Mark Miller Start: 07/28/2010 Due date: % Done: 90% Estimated time: 0.10 hour Created: 07/28/2010 10:19 am Updated: 08/03/2010 07:04 pm Likelihood: 3 - Occasional Severity: 4 - Crash / Wrong Results Found in version: 2.0.0 Impact: Expected Use: OS: All Support Group: Any Description: Comments: There was an indexing loop variable error. Hank and I eye-balled together. Fixed in r12045
priority
bov reader coring in avtnekdomainboundaries for certain settings for data bricklets redmine migration this ticket was migrated from redmine as such not all information was able to be captured in the transition below is a complete record of the original redmine ticket ticket number status resolved project visit tracker bug priority urgent subject bov reader coring in avtnekdomainboundaries for certain settings for data bricklets assigned to mark miller category target version author mark miller start due date done estimated time hour created am updated pm likelihood occasional severity crash wrong results found in version impact expected use os all support group any description comments there was an indexing loop variable error hank and i eye balled together fixed in
1
471,011
13,551,743,520
IssuesEvent
2020-09-17 11:35:01
gnosis/conditional-tokens-explorer
https://api.github.com/repos/gnosis/conditional-tokens-explorer
reopened
Do not clear out fields on the 'Split Positions' page when Reject transaction in Metamask
Low priority enhancement
**Steps:** 1. Open Split Position page 2. Fill on all the required fields 3. Click on the Split 4. Click on the Reject button in metamask **Actual Result:** all the filled in fields are cleared out when the warning message appears ![download.jfif](https://images.zenhubusercontent.com/5f55ec970a2e890ec10f7778/d5a55859-d349-422d-b435-2a8de33d3829) **Expected Result:** the fields remain to be filled in
1.0
Do not clear out fields on the 'Split Positions' page when Reject transaction in Metamask - **Steps:** 1. Open Split Position page 2. Fill on all the required fields 3. Click on the Split 4. Click on the Reject button in metamask **Actual Result:** all the filled in fields are cleared out when the warning message appears ![download.jfif](https://images.zenhubusercontent.com/5f55ec970a2e890ec10f7778/d5a55859-d349-422d-b435-2a8de33d3829) **Expected Result:** the fields remain to be filled in
priority
do not clear out fields on the split positions page when reject transaction in metamask steps open split position page fill on all the required fields click on the split click on the reject button in metamask actual result all the filled in fields are cleared out when the warning message appears expected result the fields remain to be filled in
1
184,742
14,289,810,139
IssuesEvent
2020-11-23 19:51:48
github-vet/rangeclosure-findings
https://api.github.com/repos/github-vet/rangeclosure-findings
closed
DE-labtory/it-chain: common/mock/network_manager_test.go; 21 LoC
fresh small test
Found a possible issue in [DE-labtory/it-chain](https://www.github.com/DE-labtory/it-chain) at [common/mock/network_manager_test.go](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73) The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements which capture loop variables. [Click here to see the code in its original context.](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73) <details> <summary>Click here to show the 21 line(s) of Go which triggered the analyzer.</summary> ```go for testName, test := range tests { networkManager := mock.NewNetworkManager() t.Logf("running test case %s", testName) deliverGrpc := &command.DeliverGrpc{ RecipientList: test.input.RecipientList, Protocol: test.input.Protocol, } networkManager.GrpcCall("1", "message.deliver", *deliverGrpc, func() {}) t.Logf("end of test calling") for _, processId := range test.input.RecipientList { t.Logf("processId:%s is receiving", processId) go func(processId string) { a := <-networkManager.ChannelMap[processId]["message.receive"] assert.Equal(t, a.Protocol, test.input.Protocol) }(processId) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7
1.0
DE-labtory/it-chain: common/mock/network_manager_test.go; 21 LoC - Found a possible issue in [DE-labtory/it-chain](https://www.github.com/DE-labtory/it-chain) at [common/mock/network_manager_test.go](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73) The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements which capture loop variables. [Click here to see the code in its original context.](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73) <details> <summary>Click here to show the 21 line(s) of Go which triggered the analyzer.</summary> ```go for testName, test := range tests { networkManager := mock.NewNetworkManager() t.Logf("running test case %s", testName) deliverGrpc := &command.DeliverGrpc{ RecipientList: test.input.RecipientList, Protocol: test.input.Protocol, } networkManager.GrpcCall("1", "message.deliver", *deliverGrpc, func() {}) t.Logf("end of test calling") for _, processId := range test.input.RecipientList { t.Logf("processId:%s is receiving", processId) go func(processId string) { a := <-networkManager.ChannelMap[processId]["message.receive"] assert.Equal(t, a.Protocol, test.input.Protocol) }(processId) } } ``` </details> Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket: See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information. commit ID: ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7
non_priority
de labtory it chain common mock network manager test go loc found a possible issue in at the below snippet of go code triggered static analysis which searches for goroutines and or defer statements which capture loop variables click here to show the line s of go which triggered the analyzer go for testname test range tests networkmanager mock newnetworkmanager t logf running test case s testname delivergrpc command delivergrpc recipientlist test input recipientlist protocol test input protocol networkmanager grpccall message deliver delivergrpc func t logf end of test calling for processid range test input recipientlist t logf processid s is receiving processid go func processid string a networkmanager channelmap assert equal t a protocol test input protocol processid leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id
0
4,408
2,551,443,552
IssuesEvent
2015-02-02 09:42:54
rweichler/cylinder
https://api.github.com/repos/rweichler/cylinder
closed
For some people, when opening folders the background disappears when the animation is going, and then it reappears when the animation finishes
bug PRIORITY
Stems from the solution to #17. For the life of me I can't figure out what tweak is causing this. I have a hunch this is a 64-bit issue, because the only people who are reporting this have 5Ses... And if that's the case then I can't fix it :/
1.0
For some people, when opening folders the background disappears when the animation is going, and then it reappears when the animation finishes - Stems from the solution to #17. For the life of me I can't figure out what tweak is causing this. I have a hunch this is a 64-bit issue, because the only people who are reporting this have 5Ses... And if that's the case then I can't fix it :/
priority
for some people when opening folders the background disappears when the animation is going and then it reappears when the animation finishes stems from the solution to for the life of me i can t figure out what tweak is causing this i have a hunch this is a bit issue because the only people who are reporting this have and if that s the case then i can t fix it
1
801,613
28,495,393,576
IssuesEvent
2023-04-18 13:54:04
quarkus-qe/quarkus-test-suite
https://api.github.com/repos/quarkus-qe/quarkus-test-suite
closed
Review and remove usage of @QuarkusTest
bug priority/urgent
There are still some tests that use `@QuarkusTest` rather than `@QuarkusScenario`. Review these tests and reimplement them with new framework.
1.0
Review and remove usage of @QuarkusTest - There are still some tests that use `@QuarkusTest` rather than `@QuarkusScenario`. Review these tests and reimplement them with new framework.
priority
review and remove usage of quarkustest there are still some tests that use quarkustest rather than quarkusscenario review these tests and reimplement them with new framework
1
709,502
24,380,698,607
IssuesEvent
2022-10-04 07:33:37
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.gap.com - design is broken
browser-firefox priority-normal engine-gecko
<!-- @browser: Firefox 105.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 --> <!-- @reported_with: unknown --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/111688 --> **URL**: https://www.gap.com/ **Browser / Version**: Firefox 105.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes Chrome **Problem type**: Design is broken **Description**: Items not fully visible **Steps to Reproduce**: missing sidebar "feedback" button <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2022/10/7f2aabcb-7c2e-45ce-9f15-06bfab211842.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
1.0
www.gap.com - design is broken - <!-- @browser: Firefox 105.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 --> <!-- @reported_with: unknown --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/111688 --> **URL**: https://www.gap.com/ **Browser / Version**: Firefox 105.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes Chrome **Problem type**: Design is broken **Description**: Items not fully visible **Steps to Reproduce**: missing sidebar "feedback" button <details> <summary>View the screenshot</summary> <img alt="Screenshot" src="https://webcompat.com/uploads/2022/10/7f2aabcb-7c2e-45ce-9f15-06bfab211842.jpeg"> </details> <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
priority
design is broken url browser version firefox operating system windows tested another browser yes chrome problem type design is broken description items not fully visible steps to reproduce missing sidebar feedback button view the screenshot img alt screenshot src browser configuration none from with โค๏ธ
1
594,381
18,044,436,473
IssuesEvent
2021-09-18 16:39:32
Imanity-Software/ImanitySpigot3-git
https://api.github.com/repos/Imanity-Software/ImanitySpigot3-git
closed
็„กๆณ•ไฝฟ็”จ/knockback
bug priority=high
### Expected behavior ้ ๆœŸ็‹€ๆณ knockbackๆŒ‡ไปค้‹ไฝœๆญฃๅธธ ### Observed/Actual behavior ๅฏฆ้š›็‹€ๆณ ็•ถๆˆ‘ไฝฟ็”จ/kbๆˆ–ๆ˜ฏ/knockbackๆŒ‡ไปคๆ™‚ๅพŒ่‡บๆœƒๅ ฑ้Œฏ ### Steps/models to reproduce ้‡็พ็š„ๆ–นๅผ [23:11:49 INFO]: [Server thread] Nw_Tohka_TW issued server command: /kb [23:11:49 ERROR]: [Server thread] null org.bukkit.command.CommandException: Unhandled exception executing 'kb' in org.imanity.imanityspigot.knockback.command.c(knockback) at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:150) ~[spigot.jar:git-iSpigot-PaperEdition] at org.bukkit.craftbukkit.v1_8_R3.CraftServer.dispatchCommand(SourceFile:714) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PlayerConnection.handleCommand(SourceFile:1316) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PlayerConnection.a(SourceFile:1128) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:47) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:13) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PlayerConnectionUtils$1.run(SourceFile:21) ~[spigot.jar:git-iSpigot-PaperEdition] at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) ~[?:1.8.0_302] at java.util.concurrent.FutureTask.run(FutureTask.java:266) ~[?:1.8.0_302] at net.minecraft.server.v1_8_R3.SystemUtils.a(SourceFile:18) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.MinecraftServer.B(SourceFile:939) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.DedicatedServer.B(SourceFile:471) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.MinecraftServer.A(SourceFile:869) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.MinecraftServer.run(SourceFile:770) ~[spigot.jar:git-iSpigot-PaperEdition] at java.lang.Thread.run(Thread.java:748) [?:1.8.0_302] Caused by: java.lang.IllegalArgumentException: Duplicate handler name: Nw_Tohka_TW at io.netty.channel.DefaultChannelPipeline.checkDuplicateName(DefaultChannelPipeline.java:1055) ~[netty-4.1.60.Final.jar:4.1.60.Final] at io.netty.channel.DefaultChannelPipeline.filterName(DefaultChannelPipeline.java:284) ~[netty-4.1.60.Final.jar:4.1.60.Final] at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:247) ~[netty-4.1.60.Final.jar:4.1.60.Final] at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:237) ~[netty-4.1.60.Final.jar:4.1.60.Final] at com.comphenix.protocol.injector.netty.PipelineProxy.addBefore(PipelineProxy.java:61) ~[?:?] at com.comphenix.protocol.injector.netty.ChannelInjector$3$1.addBefore(ChannelInjector.java:314) ~[?:?] at org.imanity.imanityspigot.db.c(SourceFile:68) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition] at java.util.concurrent.ConcurrentHashMap.computeIfAbsent(ConcurrentHashMap.java:1660) ~[?:1.8.0_302] at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.cG.b(SourceFile:79) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.cD.a(SourceFile:83) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.ch.a(SourceFile:34) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.knockback.command.c.execute(SourceFile:60) ~[spigot.jar:git-iSpigot-PaperEdition] at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:143) ~[spigot.jar:git-iSpigot-PaperEdition] ... 14 more [23:12:06 WARN]: [er Thread - 2] Exception in thread "Craft Scheduler Thread - 2" org.apache.commons.lang.UnhandledException: Plugin PlaceholderAPI v2.10.9 generated an exception while executing task 8467 [23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:57) [23:12:06 WARN]: [er Thread - 2] at org.github.paperspigot.ServerSchedulerReportingWrapper.run(SourceFile:22) [23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [23:12:06 WARN]: [er Thread - 2] at java.lang.Thread.run(Thread.java:748) [23:12:06 WARN]: [er Thread - 2] Caused by: java.lang.NullPointerException [23:12:06 WARN]: [er Thread - 2] at me.scruffyboy13.Economy.utils.EconomyUtils.getBalance(EconomyUtils.java:168) [23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.VaultEcoHook.getBalance(VaultEcoHook.java:220) [23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.BalTopTask.run(BalTopTask.java:48) [23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftTask.run(SourceFile:59) [23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:53) [23:12:06 WARN]: [er Thread - 2] ... 4 more ![2021-09-18_23 11 51](https://user-images.githubusercontent.com/80190796/133893643-0caaddd8-e91e-46c9-ab09-a33883855dad.png) [latest.log](https://github.com/Imanity-Software/ImanitySpigot3-git/files/7190165/latest.log) ### Plugin list ๆ’ไปถๅˆ—่กจ . ### ImanitySpigot3 ็š„็‰ˆๆœฌ 2021.09.2 BUILD 1 ### Agreements ๅŒๆ„ไบ‹้ … - [X] ๆˆ‘็›ฎๅ‰้‹่กŒ็š„ ImanitySpigot3 ็‰ˆๆœฌๅœจ #client-info ้ ป้“ไธญๆœ‰้กฏ็คบๅœจ ๆญฃๅœจๆ”ฏๆด ็š„็‰ˆๆœฌๅˆ—่กจ่ฃก. - [X] ๆˆ‘ๆœ‰ๅœจ้€™ๅ€‹ Issue Tracker ไธญๆœๅฐ‹้Žไธฆๆฒ’ๆœ‰็™ผ็พ้กžไผผ็š„ๅ•้กŒๅ›žๅ ฑ. - [X] ๆˆ‘ๅทฒ็ถ“ๆŠŠๅŽŸ็‰ˆ็š„ TacoSpigot 1.8.8 ๅ’Œ ImanitySpigot3 ไบ’็›ธๆฏ”่ผƒ้Žไธฆไธ”็ขบๅฎšๅชๆœ‰ ImanitySpigot3 ๆœƒ็™ผ็”Ÿ้€™ๅ€‹ๅ•้กŒ. ### Others ้กๅค–่ณ‡่จŠ none
1.0
็„กๆณ•ไฝฟ็”จ/knockback - ### Expected behavior ้ ๆœŸ็‹€ๆณ knockbackๆŒ‡ไปค้‹ไฝœๆญฃๅธธ ### Observed/Actual behavior ๅฏฆ้š›็‹€ๆณ ็•ถๆˆ‘ไฝฟ็”จ/kbๆˆ–ๆ˜ฏ/knockbackๆŒ‡ไปคๆ™‚ๅพŒ่‡บๆœƒๅ ฑ้Œฏ ### Steps/models to reproduce ้‡็พ็š„ๆ–นๅผ [23:11:49 INFO]: [Server thread] Nw_Tohka_TW issued server command: /kb [23:11:49 ERROR]: [Server thread] null org.bukkit.command.CommandException: Unhandled exception executing 'kb' in org.imanity.imanityspigot.knockback.command.c(knockback) at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:150) ~[spigot.jar:git-iSpigot-PaperEdition] at org.bukkit.craftbukkit.v1_8_R3.CraftServer.dispatchCommand(SourceFile:714) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PlayerConnection.handleCommand(SourceFile:1316) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PlayerConnection.a(SourceFile:1128) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:47) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:13) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.PlayerConnectionUtils$1.run(SourceFile:21) ~[spigot.jar:git-iSpigot-PaperEdition] at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) ~[?:1.8.0_302] at java.util.concurrent.FutureTask.run(FutureTask.java:266) ~[?:1.8.0_302] at net.minecraft.server.v1_8_R3.SystemUtils.a(SourceFile:18) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.MinecraftServer.B(SourceFile:939) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.DedicatedServer.B(SourceFile:471) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.MinecraftServer.A(SourceFile:869) ~[spigot.jar:git-iSpigot-PaperEdition] at net.minecraft.server.v1_8_R3.MinecraftServer.run(SourceFile:770) ~[spigot.jar:git-iSpigot-PaperEdition] at java.lang.Thread.run(Thread.java:748) [?:1.8.0_302] Caused by: java.lang.IllegalArgumentException: Duplicate handler name: Nw_Tohka_TW at io.netty.channel.DefaultChannelPipeline.checkDuplicateName(DefaultChannelPipeline.java:1055) ~[netty-4.1.60.Final.jar:4.1.60.Final] at io.netty.channel.DefaultChannelPipeline.filterName(DefaultChannelPipeline.java:284) ~[netty-4.1.60.Final.jar:4.1.60.Final] at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:247) ~[netty-4.1.60.Final.jar:4.1.60.Final] at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:237) ~[netty-4.1.60.Final.jar:4.1.60.Final] at com.comphenix.protocol.injector.netty.PipelineProxy.addBefore(PipelineProxy.java:61) ~[?:?] at com.comphenix.protocol.injector.netty.ChannelInjector$3$1.addBefore(ChannelInjector.java:314) ~[?:?] at org.imanity.imanityspigot.db.c(SourceFile:68) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition] at java.util.concurrent.ConcurrentHashMap.computeIfAbsent(ConcurrentHashMap.java:1660) ~[?:1.8.0_302] at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.cG.b(SourceFile:79) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.cD.a(SourceFile:83) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.ch.a(SourceFile:34) ~[spigot.jar:git-iSpigot-PaperEdition] at org.imanity.imanityspigot.knockback.command.c.execute(SourceFile:60) ~[spigot.jar:git-iSpigot-PaperEdition] at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:143) ~[spigot.jar:git-iSpigot-PaperEdition] ... 14 more [23:12:06 WARN]: [er Thread - 2] Exception in thread "Craft Scheduler Thread - 2" org.apache.commons.lang.UnhandledException: Plugin PlaceholderAPI v2.10.9 generated an exception while executing task 8467 [23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:57) [23:12:06 WARN]: [er Thread - 2] at org.github.paperspigot.ServerSchedulerReportingWrapper.run(SourceFile:22) [23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149) [23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624) [23:12:06 WARN]: [er Thread - 2] at java.lang.Thread.run(Thread.java:748) [23:12:06 WARN]: [er Thread - 2] Caused by: java.lang.NullPointerException [23:12:06 WARN]: [er Thread - 2] at me.scruffyboy13.Economy.utils.EconomyUtils.getBalance(EconomyUtils.java:168) [23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.VaultEcoHook.getBalance(VaultEcoHook.java:220) [23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.BalTopTask.run(BalTopTask.java:48) [23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftTask.run(SourceFile:59) [23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:53) [23:12:06 WARN]: [er Thread - 2] ... 4 more ![2021-09-18_23 11 51](https://user-images.githubusercontent.com/80190796/133893643-0caaddd8-e91e-46c9-ab09-a33883855dad.png) [latest.log](https://github.com/Imanity-Software/ImanitySpigot3-git/files/7190165/latest.log) ### Plugin list ๆ’ไปถๅˆ—่กจ . ### ImanitySpigot3 ็š„็‰ˆๆœฌ 2021.09.2 BUILD 1 ### Agreements ๅŒๆ„ไบ‹้ … - [X] ๆˆ‘็›ฎๅ‰้‹่กŒ็š„ ImanitySpigot3 ็‰ˆๆœฌๅœจ #client-info ้ ป้“ไธญๆœ‰้กฏ็คบๅœจ ๆญฃๅœจๆ”ฏๆด ็š„็‰ˆๆœฌๅˆ—่กจ่ฃก. - [X] ๆˆ‘ๆœ‰ๅœจ้€™ๅ€‹ Issue Tracker ไธญๆœๅฐ‹้Žไธฆๆฒ’ๆœ‰็™ผ็พ้กžไผผ็š„ๅ•้กŒๅ›žๅ ฑ. - [X] ๆˆ‘ๅทฒ็ถ“ๆŠŠๅŽŸ็‰ˆ็š„ TacoSpigot 1.8.8 ๅ’Œ ImanitySpigot3 ไบ’็›ธๆฏ”่ผƒ้Žไธฆไธ”็ขบๅฎšๅชๆœ‰ ImanitySpigot3 ๆœƒ็™ผ็”Ÿ้€™ๅ€‹ๅ•้กŒ. ### Others ้กๅค–่ณ‡่จŠ none
priority
็„กๆณ•ไฝฟ็”จ knockback expected behavior ้ ๆœŸ็‹€ๆณ knockbackๆŒ‡ไปค้‹ไฝœๆญฃๅธธ observed actual behavior ๅฏฆ้š›็‹€ๆณ ็•ถๆˆ‘ไฝฟ็”จ kbๆˆ–ๆ˜ฏ knockbackๆŒ‡ไปคๆ™‚ๅพŒ่‡บๆœƒๅ ฑ้Œฏ steps models to reproduce ้‡็พ็š„ๆ–นๅผ nw tohka tw issued server command kb null org bukkit command commandexception unhandled exception executing kb in org imanity imanityspigot knockback command c knockback at org bukkit command simplecommandmap dispatch simplecommandmap java at org bukkit craftbukkit craftserver dispatchcommand sourcefile at net minecraft server playerconnection handlecommand sourcefile at net minecraft server playerconnection a sourcefile at net minecraft server packetplayinchat a sourcefile at net minecraft server packetplayinchat a sourcefile at net minecraft server playerconnectionutils run sourcefile at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at net minecraft server systemutils a sourcefile at net minecraft server minecraftserver b sourcefile at net minecraft server dedicatedserver b sourcefile at net minecraft server minecraftserver a sourcefile at net minecraft server minecraftserver run sourcefile at java lang thread run thread java caused by java lang illegalargumentexception duplicate handler name nw tohka tw at io netty channel defaultchannelpipeline checkduplicatename defaultchannelpipeline java at io netty channel defaultchannelpipeline filtername defaultchannelpipeline java at io netty channel defaultchannelpipeline addbefore defaultchannelpipeline java at io netty channel defaultchannelpipeline addbefore defaultchannelpipeline java at com comphenix protocol injector netty pipelineproxy addbefore pipelineproxy java at com comphenix protocol injector netty channelinjector addbefore channelinjector java at org imanity imanityspigot db c sourcefile at org imanity imanityspigot db a sourcefile at java util concurrent concurrenthashmap computeifabsent concurrenthashmap java at org imanity imanityspigot db a sourcefile at org imanity imanityspigot cg b sourcefile at org imanity imanityspigot cd a sourcefile at org imanity imanityspigot ch a sourcefile at org imanity imanityspigot knockback command c execute sourcefile at org bukkit command simplecommandmap dispatch simplecommandmap java more exception in thread craft scheduler thread org apache commons lang unhandledexception plugin placeholderapi generated an exception while executing task at org bukkit craftbukkit scheduler craftasynctask run sourcefile at org github paperspigot serverschedulerreportingwrapper run sourcefile at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java caused by java lang nullpointerexception at me economy utils economyutils getbalance economyutils java at com extendedclip papi expansion vault vaultecohook getbalance vaultecohook java at com extendedclip papi expansion vault baltoptask run baltoptask java at org bukkit craftbukkit scheduler crafttask run sourcefile at org bukkit craftbukkit scheduler craftasynctask run sourcefile more plugin list ๆ’ไปถๅˆ—่กจ ็š„็‰ˆๆœฌ build agreements ๅŒๆ„ไบ‹้ … ๆˆ‘็›ฎๅ‰้‹่กŒ็š„ ็‰ˆๆœฌๅœจ client info ้ ป้“ไธญๆœ‰้กฏ็คบๅœจ ๆญฃๅœจๆ”ฏๆด ็š„็‰ˆๆœฌๅˆ—่กจ่ฃก ๆˆ‘ๆœ‰ๅœจ้€™ๅ€‹ issue tracker ไธญๆœๅฐ‹้Žไธฆๆฒ’ๆœ‰็™ผ็พ้กžไผผ็š„ๅ•้กŒๅ›žๅ ฑ ๆˆ‘ๅทฒ็ถ“ๆŠŠๅŽŸ็‰ˆ็š„ tacospigot ๅ’Œ ไบ’็›ธๆฏ”่ผƒ้Žไธฆไธ”็ขบๅฎšๅชๆœ‰ ๆœƒ็™ผ็”Ÿ้€™ๅ€‹ๅ•้กŒ others ้กๅค–่ณ‡่จŠ none
1
323,017
27,661,509,586
IssuesEvent
2023-03-12 15:23:05
digirati-co-uk/iiif-manifest-editor
https://api.github.com/repos/digirati-co-uk/iiif-manifest-editor
closed
Adding a new Canvas inserts into the sequence after the current selection
:computer: Usability Testing
Building on top of #136, adding a new Canvas will add it immediately after the current Canvas context, rather than always at the end. If this insertion point is currently out of view, scroll it into view. Google slides will bring it into view but moving it as little as possible - it won't centre it, just adjust the viewport enough to bring it into view either at the top or bottom.
1.0
Adding a new Canvas inserts into the sequence after the current selection - Building on top of #136, adding a new Canvas will add it immediately after the current Canvas context, rather than always at the end. If this insertion point is currently out of view, scroll it into view. Google slides will bring it into view but moving it as little as possible - it won't centre it, just adjust the viewport enough to bring it into view either at the top or bottom.
non_priority
adding a new canvas inserts into the sequence after the current selection building on top of adding a new canvas will add it immediately after the current canvas context rather than always at the end if this insertion point is currently out of view scroll it into view google slides will bring it into view but moving it as little as possible it won t centre it just adjust the viewport enough to bring it into view either at the top or bottom
0
540,712
15,816,200,031
IssuesEvent
2021-04-05 12:42:55
worldanvil/worldanvil-bug-tracker
https://api.github.com/repos/worldanvil/worldanvil-bug-tracker
closed
User name and title is outside of span element on article comments
Feature: World Presentation Priority: Optional Severity: Trivial Status: Done Type: Bug
**World Anvil Username**: Ademal **World / Campaign / RPG Character / Manuscript Title**: Ethnis **Feature**: **Related URLS** (To public & visible pages add screenshots otherwise): ![image](https://user-images.githubusercontent.com/16270856/113526481-0f90fa00-956f-11eb-970c-e4faf32393b4.png) **Describe the Issue** In comments, user titles appear outside of their span so cannot be manipulated cleanly with CSS **To Reproduce** Inspect any comment and check the user title. **Expected behavior** The WA title of the person should appear inside of the title class span.
1.0
User name and title is outside of span element on article comments - **World Anvil Username**: Ademal **World / Campaign / RPG Character / Manuscript Title**: Ethnis **Feature**: **Related URLS** (To public & visible pages add screenshots otherwise): ![image](https://user-images.githubusercontent.com/16270856/113526481-0f90fa00-956f-11eb-970c-e4faf32393b4.png) **Describe the Issue** In comments, user titles appear outside of their span so cannot be manipulated cleanly with CSS **To Reproduce** Inspect any comment and check the user title. **Expected behavior** The WA title of the person should appear inside of the title class span.
priority
user name and title is outside of span element on article comments world anvil username ademal world campaign rpg character manuscript title ethnis feature related urls to public visible pages add screenshots otherwise describe the issue in comments user titles appear outside of their span so cannot be manipulated cleanly with css to reproduce inspect any comment and check the user title expected behavior the wa title of the person should appear inside of the title class span
1
738,615
25,569,059,567
IssuesEvent
2022-11-30 16:16:55
oncokb/oncokb
https://api.github.com/repos/oncokb/oncokb
closed
Prepare for data v3.18 release
high priority
- [x] Generate database - [x] Run mvn test to make sure all tests pass, update tests accordingly - [x] Generate v3.18 database dumps by running https://github.com/knowledgesystems/oncokb-deployment/blob/master/oncokb-data-release/release.sh - [x] Update News - [x] Update release note - [x] Update oncokb-annotator tests - [x] Update oncokb_summary image and update the index.html in oncokb-public for the tags <meta name="twitter:image"> and <meta property="og:image"> - [x] Update public site - [ ] Update database - [ ] Update website using latest image - [x] Update EU public site - [ ] Update database - [ ] Update website using latest image - [x] Update demo site - [ ] Update database - [ ] Update website using latest image - [x] Update trimmed public site - [ ] Update database - [ ] Update website using latest image
1.0
Prepare for data v3.18 release - - [x] Generate database - [x] Run mvn test to make sure all tests pass, update tests accordingly - [x] Generate v3.18 database dumps by running https://github.com/knowledgesystems/oncokb-deployment/blob/master/oncokb-data-release/release.sh - [x] Update News - [x] Update release note - [x] Update oncokb-annotator tests - [x] Update oncokb_summary image and update the index.html in oncokb-public for the tags <meta name="twitter:image"> and <meta property="og:image"> - [x] Update public site - [ ] Update database - [ ] Update website using latest image - [x] Update EU public site - [ ] Update database - [ ] Update website using latest image - [x] Update demo site - [ ] Update database - [ ] Update website using latest image - [x] Update trimmed public site - [ ] Update database - [ ] Update website using latest image
priority
prepare for data release generate database run mvn test to make sure all tests pass update tests accordingly generate database dumps by running update news update release note update oncokb annotator tests update oncokb summary image and update the index html in oncokb public for the tags and update public site update database update website using latest image update eu public site update database update website using latest image update demo site update database update website using latest image update trimmed public site update database update website using latest image
1
275,658
30,279,985,414
IssuesEvent
2023-07-08 01:29:57
opensearch-project/opentelemetry-demo
https://api.github.com/repos/opensearch-project/opentelemetry-demo
opened
proto-loader-0.7.6.tgz: 1 vulnerabilities (highest severity is: 5.5)
Mend: dependency security vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>proto-loader-0.7.6.tgz</b></p></summary> <p></p> <p>Path to dependency file: /src/paymentservice/package.json</p> <p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (proto-loader version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2023-36665](https://www.mend.io/vulnerability-database/CVE-2023-36665) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | protobufjs-7.1.2.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-36665</summary> ### Vulnerable Library - <b>protobufjs-7.1.2.tgz</b></p> <p>Protocol Buffers for JavaScript (& TypeScript).</p> <p>Library home page: <a href="https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz">https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz</a></p> <p>Path to dependency file: /src/paymentservice/package.json</p> <p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p> <p> Dependency Hierarchy: - proto-loader-0.7.6.tgz (Root Library) - :x: **protobufjs-7.1.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype.<new-property> = ...;" whereas CVE-2022-25878 was about "Object.__proto__.<new-property> = ...;" instead. <p>Publish Date: 2023-07-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-36665>CVE-2023-36665</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665">https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665</a></p> <p>Release Date: 2023-07-05</p> <p>Fix Resolution: protobufjs - 7.2.4</p> </p> <p></p> </details>
True
proto-loader-0.7.6.tgz: 1 vulnerabilities (highest severity is: 5.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>proto-loader-0.7.6.tgz</b></p></summary> <p></p> <p>Path to dependency file: /src/paymentservice/package.json</p> <p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p> <p> <p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p></details> ## Vulnerabilities | CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (proto-loader version) | Remediation Available | | ------------- | ------------- | ----- | ----- | ----- | ------------- | --- | | [CVE-2023-36665](https://www.mend.io/vulnerability-database/CVE-2023-36665) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | protobufjs-7.1.2.tgz | Transitive | N/A* | &#10060; | <p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p> ## Details <details> <summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-36665</summary> ### Vulnerable Library - <b>protobufjs-7.1.2.tgz</b></p> <p>Protocol Buffers for JavaScript (& TypeScript).</p> <p>Library home page: <a href="https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz">https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz</a></p> <p>Path to dependency file: /src/paymentservice/package.json</p> <p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p> <p> Dependency Hierarchy: - proto-loader-0.7.6.tgz (Root Library) - :x: **protobufjs-7.1.2.tgz** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p> <p>Found in base branch: <b>main</b></p> </p> <p></p> ### Vulnerability Details <p> protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype.<new-property> = ...;" whereas CVE-2022-25878 was about "Object.__proto__.<new-property> = ...;" instead. <p>Publish Date: 2023-07-05 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-36665>CVE-2023-36665</a></p> </p> <p></p> ### CVSS 3 Score Details (<b>5.5</b>) <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> <p></p> ### Suggested Fix <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665">https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665</a></p> <p>Release Date: 2023-07-05</p> <p>Fix Resolution: protobufjs - 7.2.4</p> </p> <p></p> </details>
non_priority
proto loader tgz vulnerabilities highest severity is vulnerable library proto loader tgz path to dependency file src paymentservice package json path to vulnerable library src paymentservice node modules protobufjs package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in proto loader version remediation available medium protobufjs tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the details section below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library protobufjs tgz protocol buffers for javascript typescript library home page a href path to dependency file src paymentservice package json path to vulnerable library src paymentservice node modules protobufjs package json dependency hierarchy proto loader tgz root library x protobufjs tgz vulnerable library found in head commit a href found in base branch main vulnerability details protobuf js aka protobufjs through x before allows prototype pollution a different vulnerability than cve a user controlled protobuf message can be used by an attacker to pollute the prototype of object prototype by adding and overwriting its data and functions exploitation can involve using the function parse to parse protobuf messages on the fly loading proto files by using load loadsync functions or providing untrusted input to the functions reflectionobject setparsedoption and util setproperty note this cve record is about object constructor prototype whereas cve was about object proto instead publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution protobufjs
0
269,403
23,441,259,948
IssuesEvent
2022-08-15 15:06:14
elastic/kibana
https://api.github.com/repos/elastic/kibana
closed
Failing test: Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts - discover/classic "after all" hook: afterTestSuite.trigger in "discover/classic"
failed-test Team:DataDiscovery
A test failed on a tracked branch ``` NoSuchSessionError: invalid session id at Object.throwDecodedError (node_modules/selenium-webdriver/lib/error.js:522:15) at parseHttpResponse (node_modules/selenium-webdriver/lib/http.js:589:13) at Executor.execute (node_modules/selenium-webdriver/lib/http.js:514:28) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Task.exec (test/functional/services/remote/prevent_parallel_calls.ts:28:20) { remoteStacktrace: '#0 0x5642cde32403 <unknown>\n' + '#1 0x5642cdc3864b <unknown>\n' + '#2 0x5642cdc62a0b <unknown>\n' + '#3 0x5642cdc8d97c <unknown>\n' + '#4 0x5642cdc8b620 <unknown>\n' + '#5 0x5642cdc8ae47 <unknown>\n' + '#6 0x5642cdc10584 <unknown>\n' + '#7 0x5642cdc113e3 <unknown>\n' + '#8 0x5642cde79e3d <unknown>\n' + '#9 0x5642cde7cdb6 <unknown>\n' + '#10 0x5642cde6313e <unknown>\n' + '#11 0x5642cde7d9b5 <unknown>\n' + '#12 0x5642cde57970 <unknown>\n' + '#13 0x5642cdc100a5 <unknown>\n' + '#14 0x7f91e86bd083 <unknown>\n' } ``` First failure: [CI Build - 8.4](https://buildkite.com/elastic/kibana-on-merge/builds/19776#01828db3-5304-4342-9bb9-9a7540ae041e) <!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts","test.name":"discover/classic \"after all\" hook: afterTestSuite.trigger in \"discover/classic\"","test.failCount":6}} -->
1.0
Failing test: Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts - discover/classic "after all" hook: afterTestSuite.trigger in "discover/classic" - A test failed on a tracked branch ``` NoSuchSessionError: invalid session id at Object.throwDecodedError (node_modules/selenium-webdriver/lib/error.js:522:15) at parseHttpResponse (node_modules/selenium-webdriver/lib/http.js:589:13) at Executor.execute (node_modules/selenium-webdriver/lib/http.js:514:28) at runMicrotasks (<anonymous>) at processTicksAndRejections (node:internal/process/task_queues:96:5) at Task.exec (test/functional/services/remote/prevent_parallel_calls.ts:28:20) { remoteStacktrace: '#0 0x5642cde32403 <unknown>\n' + '#1 0x5642cdc3864b <unknown>\n' + '#2 0x5642cdc62a0b <unknown>\n' + '#3 0x5642cdc8d97c <unknown>\n' + '#4 0x5642cdc8b620 <unknown>\n' + '#5 0x5642cdc8ae47 <unknown>\n' + '#6 0x5642cdc10584 <unknown>\n' + '#7 0x5642cdc113e3 <unknown>\n' + '#8 0x5642cde79e3d <unknown>\n' + '#9 0x5642cde7cdb6 <unknown>\n' + '#10 0x5642cde6313e <unknown>\n' + '#11 0x5642cde7d9b5 <unknown>\n' + '#12 0x5642cde57970 <unknown>\n' + '#13 0x5642cdc100a5 <unknown>\n' + '#14 0x7f91e86bd083 <unknown>\n' } ``` First failure: [CI Build - 8.4](https://buildkite.com/elastic/kibana-on-merge/builds/19776#01828db3-5304-4342-9bb9-9a7540ae041e) <!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts","test.name":"discover/classic \"after all\" hook: afterTestSuite.trigger in \"discover/classic\"","test.failCount":6}} -->
non_priority
failing test chrome ui functional tests test functional apps discover classic indexยทts discover classic after all hook aftertestsuite trigger in discover classic a test failed on a tracked branch nosuchsessionerror invalid session id at object throwdecodederror node modules selenium webdriver lib error js at parsehttpresponse node modules selenium webdriver lib http js at executor execute node modules selenium webdriver lib http js at runmicrotasks at processticksandrejections node internal process task queues at task exec test functional services remote prevent parallel calls ts remotestacktrace n n n n n n n n n n n n n n n first failure
0
297,170
9,161,370,731
IssuesEvent
2019-03-01 10:16:49
rubykube/barong
https://api.github.com/repos/rubykube/barong
closed
Ability to specify multiple cors in 1.8
Priority: high
We need ability for few cors domain origins in `1-8-stable`.
1.0
Ability to specify multiple cors in 1.8 - We need ability for few cors domain origins in `1-8-stable`.
priority
ability to specify multiple cors in we need ability for few cors domain origins in stable
1
687,710
23,536,131,008
IssuesEvent
2022-08-19 21:01:42
googleapis/nodejs-dlp
https://api.github.com/repos/googleapis/nodejs-dlp
closed
test: should list jobs failed
type: bug priority: p1 api: dlp flakybot: issue
This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: ab636eb83dffe1d3c2122b6abfd52c6c324da62b buildURL: [Build Status](https://source.cloud.google.com/results/invocations/c426605a-6579-4071-b4f2-34039bf71e30), [Sponge](http://sponge2/c426605a-6579-4071-b4f2-34039bf71e30) status: failed <details><summary>Test output</summary><br><pre>expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/ AssertionError: expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/ at Context.<anonymous> (system-test/jobs.test.js:114:12)</pre></details>
1.0
test: should list jobs failed - This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: ab636eb83dffe1d3c2122b6abfd52c6c324da62b buildURL: [Build Status](https://source.cloud.google.com/results/invocations/c426605a-6579-4071-b4f2-34039bf71e30), [Sponge](http://sponge2/c426605a-6579-4071-b4f2-34039bf71e30) status: failed <details><summary>Test output</summary><br><pre>expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/ AssertionError: expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/ at Context.<anonymous> (system-test/jobs.test.js:114:12)</pre></details>
priority
test should list jobs failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output expected to match job projects w locations global dlpjobs w d status done assertionerror expected to match job projects w locations global dlpjobs w d status done at context system test jobs test js
1
321,174
9,794,475,932
IssuesEvent
2019-06-10 23:07:04
ilevkivskyi/com2ann
https://api.github.com/repos/ilevkivskyi/com2ann
closed
Crash when first statement in a function body is a decorator (class or function)
bug priority-high
For example this crashes: ```python def outer(): # type: () -> None @wrapper def inner(): # type: () -> None pass ```
1.0
Crash when first statement in a function body is a decorator (class or function) - For example this crashes: ```python def outer(): # type: () -> None @wrapper def inner(): # type: () -> None pass ```
priority
crash when first statement in a function body is a decorator class or function for example this crashes python def outer type none wrapper def inner type none pass
1
40,957
10,597,056,456
IssuesEvent
2019-10-09 23:06:02
orbeon/orbeon-forms
https://api.github.com/repos/orbeon/orbeon-forms
opened
Native landscape mode support
Module: Form Builder Module: Form Runner Type: RFE
- [ ] "Wide Form" or "Landscape Form" option in Form Builder - possibly there could also be a "PDF Only" option - [ ] show wider editing area when in landscape - [ ] test mode should also be wider - [ ] runtime should be wider - [ ] PDF should print in landscape mode when configured (see also #1733) [+1 from customer](https://3.basecamp.com/3600924/buckets/7873395/messages/2104739509)
1.0
Native landscape mode support - - [ ] "Wide Form" or "Landscape Form" option in Form Builder - possibly there could also be a "PDF Only" option - [ ] show wider editing area when in landscape - [ ] test mode should also be wider - [ ] runtime should be wider - [ ] PDF should print in landscape mode when configured (see also #1733) [+1 from customer](https://3.basecamp.com/3600924/buckets/7873395/messages/2104739509)
non_priority
native landscape mode support wide form or landscape form option in form builder possibly there could also be a pdf only option show wider editing area when in landscape test mode should also be wider runtime should be wider pdf should print in landscape mode when configured see also
0
308,090
9,430,089,585
IssuesEvent
2019-04-12 08:09:09
TNG/ngqp
https://api.github.com/repos/TNG/ngqp
closed
Type and export improvements
Comp: Core Priority: Low Status: Accepted Type: Improvement
In our ControlValueAccessors, 1. Do not export the provider itself 2. Change the type from `any` to `Provider`
1.0
Type and export improvements - In our ControlValueAccessors, 1. Do not export the provider itself 2. Change the type from `any` to `Provider`
priority
type and export improvements in our controlvalueaccessors do not export the provider itself change the type from any to provider
1
728,149
25,068,064,579
IssuesEvent
2022-11-07 09:55:41
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.walmart.com - site is not usable
browser-firefox priority-important engine-gecko
<!-- @browser: Firefox 106.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; rv:106.0) Gecko/20100101 Firefox/106.0 --> <!-- @reported_with: unknown --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/113549 --> **URL**: https://www.walmart.com **Browser / Version**: Firefox 106.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes Other **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: ok after going to walmart.com I go to departements and search for lets say tires get a site error "uh-oh we are having technical problems try again" I try again and the page loads for about a second and then goes back to error page , I used brave browser with no problems why is this hapening? I use a vpn but even after disableing it it still does it <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
1.0
www.walmart.com - site is not usable - <!-- @browser: Firefox 106.0 --> <!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; rv:106.0) Gecko/20100101 Firefox/106.0 --> <!-- @reported_with: unknown --> <!-- @public_url: https://github.com/webcompat/web-bugs/issues/113549 --> **URL**: https://www.walmart.com **Browser / Version**: Firefox 106.0 **Operating System**: Windows 10 **Tested Another Browser**: Yes Other **Problem type**: Site is not usable **Description**: Page not loading correctly **Steps to Reproduce**: ok after going to walmart.com I go to departements and search for lets say tires get a site error "uh-oh we are having technical problems try again" I try again and the page loads for about a second and then goes back to error page , I used brave browser with no problems why is this hapening? I use a vpn but even after disableing it it still does it <details> <summary>Browser Configuration</summary> <ul> <li>None</li> </ul> </details> _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
priority
site is not usable url browser version firefox operating system windows tested another browser yes other problem type site is not usable description page not loading correctly steps to reproduce ok after going to walmart com i go to departements and search for lets say tires get a site error uh oh we are having technical problems try again i try again and the page loads for about a second and then goes back to error page i used brave browser with no problems why is this hapening i use a vpn but even after disableing it it still does it browser configuration none from with โค๏ธ
1
97,772
28,497,885,507
IssuesEvent
2023-04-18 15:17:48
deephaven/deephaven-core
https://api.github.com/repos/deephaven/deephaven-core
opened
Add build information to native application
feature request build
For benchmarking and other provenance use cases, it would be useful to have more build information at the application layer. This is related to #3704, but focused on the officially packaged server application(s). This could likely be served via our non-published jars MANIFEST: * `deephaven-server-jetty-app.jar` for the native application * `deephaven-py-embedded-server-java-runtime.jar` for the python embedded server There's an argument we could make that it should be a simple file to make it more accessible to non java tooling (for example, to create `etc/deephaven-build.txt`). That said, it's pretty easy to extract using common tooling: ``` unzip -q -c lib/deephaven-server-jetty-app-0.23.0.jar META-INF/MANIFEST.MF ```
1.0
Add build information to native application - For benchmarking and other provenance use cases, it would be useful to have more build information at the application layer. This is related to #3704, but focused on the officially packaged server application(s). This could likely be served via our non-published jars MANIFEST: * `deephaven-server-jetty-app.jar` for the native application * `deephaven-py-embedded-server-java-runtime.jar` for the python embedded server There's an argument we could make that it should be a simple file to make it more accessible to non java tooling (for example, to create `etc/deephaven-build.txt`). That said, it's pretty easy to extract using common tooling: ``` unzip -q -c lib/deephaven-server-jetty-app-0.23.0.jar META-INF/MANIFEST.MF ```
non_priority
add build information to native application for benchmarking and other provenance use cases it would be useful to have more build information at the application layer this is related to but focused on the officially packaged server application s this could likely be served via our non published jars manifest deephaven server jetty app jar for the native application deephaven py embedded server java runtime jar for the python embedded server there s an argument we could make that it should be a simple file to make it more accessible to non java tooling for example to create etc deephaven build txt that said it s pretty easy to extract using common tooling unzip q c lib deephaven server jetty app jar meta inf manifest mf
0
126,917
12,302,161,037
IssuesEvent
2020-05-11 16:30:40
microsoft/MixedRealityToolkit-Unity
https://api.github.com/repos/microsoft/MixedRealityToolkit-Unity
closed
MRTK 2.4 Release Notes Missing ObjectManipulator and BoundsControl
Documentation Release Blocker
## Describe the issue Our 2.4 release notes are missing the awesome new ObjectManipulator graduation from @thalbern and @MenelvagorMilsom. We should mention these as they are much cleaner than ManipulationHandler and BoundingBox.
1.0
MRTK 2.4 Release Notes Missing ObjectManipulator and BoundsControl - ## Describe the issue Our 2.4 release notes are missing the awesome new ObjectManipulator graduation from @thalbern and @MenelvagorMilsom. We should mention these as they are much cleaner than ManipulationHandler and BoundingBox.
non_priority
mrtk release notes missing objectmanipulator and boundscontrol describe the issue our release notes are missing the awesome new objectmanipulator graduation from thalbern and menelvagormilsom we should mention these as they are much cleaner than manipulationhandler and boundingbox
0
658,490
21,894,695,896
IssuesEvent
2022-05-20 07:26:18
bounswe/bounswe2022group3
https://api.github.com/repos/bounswe/bounswe2022group3
closed
[Practice App]: Containerization of the application
priority: moderate effort: moderate practice-app
We will deploy our app in docker containers. We need dockerfiles and docker-compose files to have a consistent and pre-configured deployment environment. ## Server - [x] Create Dockerfile - [x] Create Docker-compose file - [x] Configure env variables and credentials ## Client - [x] Create Dockerfile - [x] Create Docker-compose file - [x] Configure env variables and credentials Deadline: 20.05.2022
1.0
[Practice App]: Containerization of the application - We will deploy our app in docker containers. We need dockerfiles and docker-compose files to have a consistent and pre-configured deployment environment. ## Server - [x] Create Dockerfile - [x] Create Docker-compose file - [x] Configure env variables and credentials ## Client - [x] Create Dockerfile - [x] Create Docker-compose file - [x] Configure env variables and credentials Deadline: 20.05.2022
priority
containerization of the application we will deploy our app in docker containers we need dockerfiles and docker compose files to have a consistent and pre configured deployment environment server create dockerfile create docker compose file configure env variables and credentials client create dockerfile create docker compose file configure env variables and credentials deadline
1
159,132
6,041,033,061
IssuesEvent
2017-06-10 20:02:29
tatools/sunshine
https://api.github.com/repos/tatools/sunshine
closed
Public classes have to be final
Priority 1
Declare all public classes as final to prevent 'bad' coding in future.
1.0
Public classes have to be final - Declare all public classes as final to prevent 'bad' coding in future.
priority
public classes have to be final declare all public classes as final to prevent bad coding in future
1
361,221
10,705,888,564
IssuesEvent
2019-10-24 14:28:35
pravega/pravega
https://api.github.com/repos/pravega/pravega
closed
Sporadic build failure: HDFSIntegrationTest> testEndToEndWithFencing
area/tier2 kind/bug priority/P1 version/0.6.0 version/0.7.0
**Problem description** This test failed on travis: ``` io.pravega.segmentstore.server.host.HDFSIntegrationTest > testEndToEndWithFencing FAILED java.util.concurrent.CompletionException: java.util.concurrent.CancellationException: OperationProcessor is shutting down. Caused by:java.util.concurrent.CancellationException: OperationProcessor is shutting down. ``` **Problem location** HDFSIntegrationTest **Suggestions for an improvement** The test should pass consistently
1.0
Sporadic build failure: HDFSIntegrationTest> testEndToEndWithFencing - **Problem description** This test failed on travis: ``` io.pravega.segmentstore.server.host.HDFSIntegrationTest > testEndToEndWithFencing FAILED java.util.concurrent.CompletionException: java.util.concurrent.CancellationException: OperationProcessor is shutting down. Caused by:java.util.concurrent.CancellationException: OperationProcessor is shutting down. ``` **Problem location** HDFSIntegrationTest **Suggestions for an improvement** The test should pass consistently
priority
sporadic build failure hdfsintegrationtest testendtoendwithfencing problem description this test failed on travis io pravega segmentstore server host hdfsintegrationtest testendtoendwithfencing failed java util concurrent completionexception java util concurrent cancellationexception operationprocessor is shutting down caused by java util concurrent cancellationexception operationprocessor is shutting down problem location hdfsintegrationtest suggestions for an improvement the test should pass consistently
1
249,334
18,858,184,796
IssuesEvent
2021-11-12 09:28:47
YEOWEIHNGWHYELAB/pe
https://api.github.com/repos/YEOWEIHNGWHYELAB/pe
opened
DG's flow of content can be organized better.
severity.Low type.DocumentationBug
The product scope should be the first thing to be stated in the document so that developers know better about how this app will be deigned to suit the target audience. Glossary can be placed at the very end. <!--session: 1636704749765-5400e6d5-3fc4-4aa2-81f0-3dd47a07d11c--> <!--Version: Web v3.4.1-->
1.0
DG's flow of content can be organized better. - The product scope should be the first thing to be stated in the document so that developers know better about how this app will be deigned to suit the target audience. Glossary can be placed at the very end. <!--session: 1636704749765-5400e6d5-3fc4-4aa2-81f0-3dd47a07d11c--> <!--Version: Web v3.4.1-->
non_priority
dg s flow of content can be organized better the product scope should be the first thing to be stated in the document so that developers know better about how this app will be deigned to suit the target audience glossary can be placed at the very end
0
244,244
7,872,541,801
IssuesEvent
2018-06-25 11:36:55
VulcanForge/pvp-mode
https://api.github.com/repos/VulcanForge/pvp-mode
opened
Players with PvP Mode ON determine use of proximity info
improvement medium priority new feature
Provide a command '/pvp radar' for players with PvP Mode ON to toggle showing (ON) / not showing (OFF) the proximity info of themselves and other players with PvP Mode ON. If a player toggles it ON, his proximity is shown to all players with PvP Mode ON, and (s)he gets the proximity info of all other players with PvP Mode ON when using /pvplist. This empowers players who prefer PvP, but wish to be hard to find at times, to decide for themselves if they can actively hunt and get actively hunted with assistance of player proximity info.
1.0
Players with PvP Mode ON determine use of proximity info - Provide a command '/pvp radar' for players with PvP Mode ON to toggle showing (ON) / not showing (OFF) the proximity info of themselves and other players with PvP Mode ON. If a player toggles it ON, his proximity is shown to all players with PvP Mode ON, and (s)he gets the proximity info of all other players with PvP Mode ON when using /pvplist. This empowers players who prefer PvP, but wish to be hard to find at times, to decide for themselves if they can actively hunt and get actively hunted with assistance of player proximity info.
priority
players with pvp mode on determine use of proximity info provide a command pvp radar for players with pvp mode on to toggle showing on not showing off the proximity info of themselves and other players with pvp mode on if a player toggles it on his proximity is shown to all players with pvp mode on and s he gets the proximity info of all other players with pvp mode on when using pvplist this empowers players who prefer pvp but wish to be hard to find at times to decide for themselves if they can actively hunt and get actively hunted with assistance of player proximity info
1
230,280
25,460,677,657
IssuesEvent
2022-11-24 18:33:11
billmcchesney1/singleton
https://api.github.com/repos/billmcchesney1/singleton
opened
CVE-2022-41946 (Medium) detected in postgresql-42.2.16.jar
security vulnerability
## CVE-2022-41946 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresql-42.2.16.jar</b></p></summary> <p>PostgreSQL JDBC Driver Postgresql</p> <p>Library home page: <a href="https://jdbc.postgresql.org">https://jdbc.postgresql.org</a></p> <p>Path to dependency file: /g11n-ws/modules/md-data-initdb/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.16/a9ee12f737bd5dc7d046e4c065e391d38d6a3cfc/postgresql-42.2.16.jar</p> <p> Dependency Hierarchy: - md-data-api-pgimpl-1.0 (Root Library) - :x: **postgresql-42.2.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/singleton/commit/2bb883ae0b199f3e432621e91d0f801cfc406a89">2bb883ae0b199f3e432621e91d0f801cfc406a89</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability. <p>Publish Date: 2022-11-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41946>CVE-2022-41946</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h">https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h</a></p> <p>Release Date: 2022-11-23</p> <p>Fix Resolution: org.postgresql:postgresql:42.2.27,42.3.8,42.4.3,42.5.1</p> </p> </details> <p></p>
True
CVE-2022-41946 (Medium) detected in postgresql-42.2.16.jar - ## CVE-2022-41946 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresql-42.2.16.jar</b></p></summary> <p>PostgreSQL JDBC Driver Postgresql</p> <p>Library home page: <a href="https://jdbc.postgresql.org">https://jdbc.postgresql.org</a></p> <p>Path to dependency file: /g11n-ws/modules/md-data-initdb/build.gradle</p> <p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.16/a9ee12f737bd5dc7d046e4c065e391d38d6a3cfc/postgresql-42.2.16.jar</p> <p> Dependency Hierarchy: - md-data-api-pgimpl-1.0 (Root Library) - :x: **postgresql-42.2.16.jar** (Vulnerable Library) <p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/singleton/commit/2bb883ae0b199f3e432621e91d0f801cfc406a89">2bb883ae0b199f3e432621e91d0f801cfc406a89</a></p> <p>Found in base branch: <b>master</b></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability. <p>Publish Date: 2022-11-23 <p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41946>CVE-2022-41946</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h">https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h</a></p> <p>Release Date: 2022-11-23</p> <p>Fix Resolution: org.postgresql:postgresql:42.2.27,42.3.8,42.4.3,42.5.1</p> </p> </details> <p></p>
non_priority
cve medium detected in postgresql jar cve medium severity vulnerability vulnerable library postgresql jar postgresql jdbc driver postgresql library home page a href path to dependency file ws modules md data initdb build gradle path to vulnerable library home wss scanner gradle caches modules files org postgresql postgresql postgresql jar dependency hierarchy md data api pgimpl root library x postgresql jar vulnerable library found in head commit a href found in base branch master vulnerability details pgjdbc is an open source postgresql jdbc driver in affected versions a prepared statement using either preparedstatement settext int inputstream or preparedstatemet setbytea int inputstream will create a temporary file if the inputstream is larger than this will create a temporary file which is readable by other users on unix like systems but not macos on unix like systems the system s temporary directory is shared between all users on that system because of this when files and directories are written into this directory they are by default readable by other users on that same system this vulnerability does not allow other users to overwrite the contents of these directories or files this is purely an information disclosure vulnerability because certain jdk file system apis were only added in jdk this this fix is dependent upon the version of the jdk you are using java and higher users this vulnerability is fixed in java and lower users no patch is available if you are unable to patch or are stuck running on java specifying the java io tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org postgresql postgresql
0
9,876
8,736,582,338
IssuesEvent
2018-12-11 19:56:19
HumanCellAtlas/dcp
https://api.github.com/repos/HumanCellAtlas/dcp
closed
M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported
Epic Secondary Analysis Service
Relates to: M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported. [See DCP-General Availability Document](https://docs.google.com/document/d/14gVAMscd0d8KgWqOO11Y1kSp4ztVavZXA7zrtrhyiW0/edit#)
1.0
M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported - Relates to: M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported. [See DCP-General Availability Document](https://docs.google.com/document/d/14gVAMscd0d8KgWqOO11Y1kSp4ztVavZXA7zrtrhyiW0/edit#)
non_priority
ensure analysis pipelines output logs in enough detail to diagnose errors when reported relates to ensure analysis pipelines output logs in enough detail to diagnose errors when reported
0
644,965
20,991,938,253
IssuesEvent
2022-03-29 10:04:24
GoogleCloudPlatform/python-docs-samples
https://api.github.com/repos/GoogleCloudPlatform/python-docs-samples
opened
appengine.flexible.twilio.main_test: test_receive_sms failed
priority: p1 type: bug flakybot: issue
This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 3b6d797140afa6ca900a1e38a554795bfe800368 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/7e7321f5-302f-441b-b01b-0047fd05b625), [Sponge](http://sponge2/7e7321f5-302f-441b-b01b-0047fd05b625) status: failed <details><summary>Test output</summary><br><pre>Traceback (most recent call last): File "/workspace/appengine/flexible/twilio/main_test.py", line 75, in test_receive_sms 'From': '5558675309', 'Body': 'Jenny, I got your number.'}) File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1139, in post return self.open(*args, **kw) File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/flask/testing.py", line 220, in open follow_redirects=follow_redirects, File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1081, in open builder = EnvironBuilder(*args, **kwargs) TypeError: __init__() got an unexpected keyword argument 'as_tuple'</pre></details>
1.0
appengine.flexible.twilio.main_test: test_receive_sms failed - This test failed! To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot). If I'm commenting on this issue too often, add the `flakybot: quiet` label and I will stop commenting. --- commit: 3b6d797140afa6ca900a1e38a554795bfe800368 buildURL: [Build Status](https://source.cloud.google.com/results/invocations/7e7321f5-302f-441b-b01b-0047fd05b625), [Sponge](http://sponge2/7e7321f5-302f-441b-b01b-0047fd05b625) status: failed <details><summary>Test output</summary><br><pre>Traceback (most recent call last): File "/workspace/appengine/flexible/twilio/main_test.py", line 75, in test_receive_sms 'From': '5558675309', 'Body': 'Jenny, I got your number.'}) File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1139, in post return self.open(*args, **kw) File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/flask/testing.py", line 220, in open follow_redirects=follow_redirects, File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1081, in open builder = EnvironBuilder(*args, **kwargs) TypeError: __init__() got an unexpected keyword argument 'as_tuple'</pre></details>
priority
appengine flexible twilio main test test receive sms failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output traceback most recent call last file workspace appengine flexible twilio main test py line in test receive sms from body jenny i got your number file workspace appengine flexible twilio nox py lib site packages werkzeug test py line in post return self open args kw file workspace appengine flexible twilio nox py lib site packages flask testing py line in open follow redirects follow redirects file workspace appengine flexible twilio nox py lib site packages werkzeug test py line in open builder environbuilder args kwargs typeerror init got an unexpected keyword argument as tuple
1
792,551
27,965,253,380
IssuesEvent
2023-03-24 18:54:41
sunpy/sunpy
https://api.github.com/repos/sunpy/sunpy
closed
Provide easier access to valid TimeSeries source keywords
Feature Request Package Novice Priority Low Effort Medium timeseries Hacktoberfest Good First Issue
<!-- We know asking good questions takes effort, and we appreciate your time. Thank you. Please be aware that everyone has to follow our code of conduct: https://github.com/sunpy/sunpy/blob/master/CODE_OF_CONDUCT.rst Also that these comments are hidden when you submit this github issue. Please have a search on our GitHub repository to see if a similar issue has already been posted. If a similar issue is closed, have a quick look to see if you are satisfied by the resolution. If not please go ahead and open an issue! --> ### Description <!-- Provide a general description of the feature you would like. If you prefer, you can also suggest a draft design or API. This way we have a deeper discussion on the feature. --> I suggest that it should be shown at the top when a user inputs the command ```python help(TimeSeries) ``` ### Additional context <!-- Add any other context or screenshots This part is optional. Delete this section heading if you do not use it. -->
1.0
Provide easier access to valid TimeSeries source keywords - <!-- We know asking good questions takes effort, and we appreciate your time. Thank you. Please be aware that everyone has to follow our code of conduct: https://github.com/sunpy/sunpy/blob/master/CODE_OF_CONDUCT.rst Also that these comments are hidden when you submit this github issue. Please have a search on our GitHub repository to see if a similar issue has already been posted. If a similar issue is closed, have a quick look to see if you are satisfied by the resolution. If not please go ahead and open an issue! --> ### Description <!-- Provide a general description of the feature you would like. If you prefer, you can also suggest a draft design or API. This way we have a deeper discussion on the feature. --> I suggest that it should be shown at the top when a user inputs the command ```python help(TimeSeries) ``` ### Additional context <!-- Add any other context or screenshots This part is optional. Delete this section heading if you do not use it. -->
priority
provide easier access to valid timeseries source keywords we know asking good questions takes effort and we appreciate your time thank you please be aware that everyone has to follow our code of conduct also that these comments are hidden when you submit this github issue please have a search on our github repository to see if a similar issue has already been posted if a similar issue is closed have a quick look to see if you are satisfied by the resolution if not please go ahead and open an issue description provide a general description of the feature you would like if you prefer you can also suggest a draft design or api this way we have a deeper discussion on the feature i suggest that it should be shown at the top when a user inputs the command python help timeseries additional context add any other context or screenshots this part is optional delete this section heading if you do not use it
1
18,627
10,166,975,014
IssuesEvent
2019-08-07 17:04:26
PrometheusClientNet/Prometheus.Client
https://api.github.com/repos/PrometheusClientNet/Prometheus.Client
opened
Consider cache encoded strings in MetricsWriter
enhancement performance
As it shown by benchmarks it takes lots of time to encode strings while scrape processing. Consider to implement some caching layer to hold encoded values to improve the performance.
True
Consider cache encoded strings in MetricsWriter - As it shown by benchmarks it takes lots of time to encode strings while scrape processing. Consider to implement some caching layer to hold encoded values to improve the performance.
non_priority
consider cache encoded strings in metricswriter as it shown by benchmarks it takes lots of time to encode strings while scrape processing consider to implement some caching layer to hold encoded values to improve the performance
0
435,629
30,510,702,220
IssuesEvent
2023-07-18 20:35:18
cd-moj/cd-moj.docs
https://api.github.com/repos/cd-moj/cd-moj.docs
closed
[Doc]: Criaรงรฃo de guia de contribuiรงรฃo
documentation good first issue
**Descriรงรฃo** Criar um guia de contribuiรงรฃo para padronizar a criaรงรฃo de issues e commits realizados, alรฉm de mostrar como contribuir. **Tarefas :** - [x] Criar o arquivo do guia de contribuiรงรฃo na documentaรงรฃo; - [x] Realizar o deploy;
1.0
[Doc]: Criaรงรฃo de guia de contribuiรงรฃo - **Descriรงรฃo** Criar um guia de contribuiรงรฃo para padronizar a criaรงรฃo de issues e commits realizados, alรฉm de mostrar como contribuir. **Tarefas :** - [x] Criar o arquivo do guia de contribuiรงรฃo na documentaรงรฃo; - [x] Realizar o deploy;
non_priority
criaรงรฃo de guia de contribuiรงรฃo descriรงรฃo criar um guia de contribuiรงรฃo para padronizar a criaรงรฃo de issues e commits realizados alรฉm de mostrar como contribuir tarefas criar o arquivo do guia de contribuiรงรฃo na documentaรงรฃo realizar o deploy
0
140,114
5,397,252,041
IssuesEvent
2017-02-27 14:12:56
g8os/fs
https://api.github.com/repos/g8os/fs
closed
New Flist implementation
priority_major state_verification type_feature
fs should support the new flist format. This new flist format is based on capnp and distributed in the form of a rocksdb DB files. Jumpscale is still used to generate the flist. You can find reference implementation at https://github.com/Jumpscale/jumpscale_core8/tree/8.2.0_dev_flist/lib/JumpScale/tools/flist
1.0
New Flist implementation - fs should support the new flist format. This new flist format is based on capnp and distributed in the form of a rocksdb DB files. Jumpscale is still used to generate the flist. You can find reference implementation at https://github.com/Jumpscale/jumpscale_core8/tree/8.2.0_dev_flist/lib/JumpScale/tools/flist
priority
new flist implementation fs should support the new flist format this new flist format is based on capnp and distributed in the form of a rocksdb db files jumpscale is still used to generate the flist you can find reference implementation at
1
377,141
11,165,079,879
IssuesEvent
2019-12-27 07:59:01
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
m.mobile.de - site is not usable
browser-firefox-mobile engine-gecko ml-needsdiagnosis-false ml-probability-high priority-important
<!-- @browser: Firefox Mobile 68.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://m.mobile.de/lkw-inserat/mercedes-benz-lf-409-so-kfz-l%C3%B6schfahrzeug-mit-feuerl%C3%B6schpumpe-n%C3%BCrnberg/279478145.html?ref=srp **Browser / Version**: Firefox Mobile 68.0 **Operating System**: Android **Tested Another Browser**: Yes **Problem type**: Site is not usable **Description**: links to detailed view falls mostly **Steps to Reproduce**: When one wants to see The Details oft a car of interest and click onto it the NEW Page ist empty mostly in Very rare cases it works [![Screenshot Description](https://webcompat.com/uploads/2019/12/b3ed1c82-f0c6-48c4-98d3-751339c17b0d-thumb.jpeg)](https://webcompat.com/uploads/2019/12/b3ed1c82-f0c6-48c4-98d3-751339c17b0d.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191222171214</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2019/12/b3e50aba-2ee8-45ac-953a-76d5bd2be42c) _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
1.0
m.mobile.de - site is not usable - <!-- @browser: Firefox Mobile 68.0 --> <!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://m.mobile.de/lkw-inserat/mercedes-benz-lf-409-so-kfz-l%C3%B6schfahrzeug-mit-feuerl%C3%B6schpumpe-n%C3%BCrnberg/279478145.html?ref=srp **Browser / Version**: Firefox Mobile 68.0 **Operating System**: Android **Tested Another Browser**: Yes **Problem type**: Site is not usable **Description**: links to detailed view falls mostly **Steps to Reproduce**: When one wants to see The Details oft a car of interest and click onto it the NEW Page ist empty mostly in Very rare cases it works [![Screenshot Description](https://webcompat.com/uploads/2019/12/b3ed1c82-f0c6-48c4-98d3-751339c17b0d-thumb.jpeg)](https://webcompat.com/uploads/2019/12/b3ed1c82-f0c6-48c4-98d3-751339c17b0d.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191222171214</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> </details> [View console log messages](https://webcompat.com/console_logs/2019/12/b3e50aba-2ee8-45ac-953a-76d5bd2be42c) _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
priority
m mobile de site is not usable url browser version firefox mobile operating system android tested another browser yes problem type site is not usable description links to detailed view falls mostly steps to reproduce when one wants to see the details oft a car of interest and click onto it the new page ist empty mostly in very rare cases it works browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with โค๏ธ
1
176,385
6,558,869,421
IssuesEvent
2017-09-06 23:48:20
washingtonstateuniversity/WSUWP-Plugin-iDonate
https://api.github.com/repos/washingtonstateuniversity/WSUWP-Plugin-iDonate
opened
Update iDonate Data Tags
priority: 1 severity: 2 - High
We are currently using extra data tags that we don't need for single designations, which may be causing some additional issues. See below for a response from iDonate For single designations, should we only use data-designation and set the data-cash-default to pass in the amount? Currently, we also set data-designations. Yes only setting data-designation for single designation donations. Data-gift-arrays โ€“ What is this tag doing and when should we use it? Is the second number in the array a gift amount? This is for the different options that are presented to the user. data-gift_arrays=โ€˜[[โ€œTitleโ€,Amount],[โ€œTitleโ€,Amount]]โ€™ data-cash_default=โ€œ150โ€ //this should be set to one of the available amounts, it will preselect, note the underscore and not a hyphen We'll still want to set data-cash_default, but we should remove the data-designations and data-gift-arrays tags.
1.0
Update iDonate Data Tags - We are currently using extra data tags that we don't need for single designations, which may be causing some additional issues. See below for a response from iDonate For single designations, should we only use data-designation and set the data-cash-default to pass in the amount? Currently, we also set data-designations. Yes only setting data-designation for single designation donations. Data-gift-arrays โ€“ What is this tag doing and when should we use it? Is the second number in the array a gift amount? This is for the different options that are presented to the user. data-gift_arrays=โ€˜[[โ€œTitleโ€,Amount],[โ€œTitleโ€,Amount]]โ€™ data-cash_default=โ€œ150โ€ //this should be set to one of the available amounts, it will preselect, note the underscore and not a hyphen We'll still want to set data-cash_default, but we should remove the data-designations and data-gift-arrays tags.
priority
update idonate data tags we are currently using extra data tags that we don t need for single designations which may be causing some additional issues see below for a response from idonate for single designations should we only use data designation and set the data cash default to pass in the amount currently we also set data designations yes only setting data designation for single designation donations data gift arrays โ€“ what is this tag doing and when should we use it is the second number in the array a gift amount this is for the different options that are presented to the user data gift arrays โ€˜ โ€™ data cash default โ€œ โ€ this should be set to one of the available amounts it will preselect note the underscore and not a hyphen we ll still want to set data cash default but we should remove the data designations and data gift arrays tags
1
445,895
12,837,778,498
IssuesEvent
2020-07-07 16:19:07
hydroshare/hydroshare
https://api.github.com/repos/hydroshare/hydroshare
closed
bag it creation fails for resource with hidden chararacter in title
High Priority bug
@Castronova discover that for this resource https://www.hydroshare.org/resource/1fedd80cd20245409a0ea02cc2a1ecf0/ downloading as a bagit file fails . Downloading a simple zip works. I did some resource and the title does contain hidden characters: Achieving Reproducible Computational Hydrologic Models by Integrating Scientific Cyberinfrastructures Testing on beta by removing the characters does indeed solve the problem and the BagIt file creates correctly. we should consider to 1. add additional checks to sanitize the title and other textfields 2. develop a management script to remove illegal characters
1.0
bag it creation fails for resource with hidden chararacter in title - @Castronova discover that for this resource https://www.hydroshare.org/resource/1fedd80cd20245409a0ea02cc2a1ecf0/ downloading as a bagit file fails . Downloading a simple zip works. I did some resource and the title does contain hidden characters: Achieving Reproducible Computational Hydrologic Models by Integrating Scientific Cyberinfrastructures Testing on beta by removing the characters does indeed solve the problem and the BagIt file creates correctly. we should consider to 1. add additional checks to sanitize the title and other textfields 2. develop a management script to remove illegal characters
priority
bag it creation fails for resource with hidden chararacter in title castronova discover that for this resource downloading as a bagit file fails downloading a simple zip works i did some resource and the title does contain hidden characters achieving reproducible computational hydrologic models by integrating scientific cyberinfrastructures testing on beta by removing the characters does indeed solve the problem and the bagit file creates correctly we should consider to add additional checks to sanitize the title and other textfields develop a management script to remove illegal characters
1
396,762
11,713,672,144
IssuesEvent
2020-03-09 10:46:20
mozilla/addons
https://api.github.com/repos/mozilla/addons
closed
API does not permit uploading additional source archive (required for review)
component: api neverstale priority: p3
If a webextension's source is obfuscated, the reviewing rules say that authors must upload a source archive for reviewers. Webpack and other ES6 transpilers count as obfuscation, so this will affect many addons. ### Describe the problem and steps to reproduce it: I want to upload a source code archive as well as the bundled source via the API so that I can automatically deploy my addon to AMO. ### What happened? The API has no such function.
1.0
API does not permit uploading additional source archive (required for review) - If a webextension's source is obfuscated, the reviewing rules say that authors must upload a source archive for reviewers. Webpack and other ES6 transpilers count as obfuscation, so this will affect many addons. ### Describe the problem and steps to reproduce it: I want to upload a source code archive as well as the bundled source via the API so that I can automatically deploy my addon to AMO. ### What happened? The API has no such function.
priority
api does not permit uploading additional source archive required for review if a webextension s source is obfuscated the reviewing rules say that authors must upload a source archive for reviewers webpack and other transpilers count as obfuscation so this will affect many addons describe the problem and steps to reproduce it i want to upload a source code archive as well as the bundled source via the api so that i can automatically deploy my addon to amo what happened the api has no such function
1
311,783
9,539,182,938
IssuesEvent
2019-04-30 16:18:34
zeit/ncc
https://api.github.com/repos/zeit/ncc
closed
Failed to build fluent-ffmpeg with Error: Can't resolve './lib-cov/fluent-ffmpeg'
committed package issue priority
## Steps to reproduce ``` git clone https://github.com/styfle/ncc-bug-fluent-ffmpeg cd ncc-bug-fluent-ffmpeg yarn ncc build index.js ``` ## Output ``` ncc: Version 0.18.1 ncc: Compiling file index.js Error: Hash: 010bf5d256da3ab07bed Version: webpack 5.0.0-alpha.9 Time: 93ms Built at: 04/24/2019 5:21:04 PM Asset Size Chunks Chunk Names index.js 301 KiB {404} main Entrypoint main = index.js [64] external "util" 42 bytes {404} [123] ./node_modules/fluent-ffmpeg/lib/fluent-ffmpeg.js 6.31 KiB {404} [170] ./node_modules/fluent-ffmpeg/lib/options/misc.js 933 bytes {404} [172] ./node_modules/fluent-ffmpeg/lib/options/output.js 3.84 KiB {404} [200] ./node_modules/fluent-ffmpeg/lib/options/videosize.js 7.58 KiB {404} [300] ./node_modules/fluent-ffmpeg/lib/options/audio.js 3.86 KiB {404} [318] ./index.js 631 bytes {404} [417] ./node_modules/fluent-ffmpeg/lib/options/custom.js 6.54 KiB {404} [421] external "http" 42 bytes {404} [476] ./node_modules/fluent-ffmpeg/lib/options/video.js 4.02 KiB {404} [477] ./node_modules/fluent-ffmpeg/lib/options/inputs.js 3.89 KiB {404} [485] external "events" 42 bytes {404} [573] ./node_modules/fluent-ffmpeg/lib/utils.js 12.9 KiB {404} [589] external "path" 42 bytes {404} [805] ./node_modules/fluent-ffmpeg/index.js 117 bytes {404} + 14 hidden modules ERROR in ./node_modules/fluent-ffmpeg/index.js 1:48-82 Module not found: Error: Can't resolve './lib-cov/fluent-ffmpeg' in '/Users/styfle/Code/foo/ncc-bug-fluent-ffmpeg/node_modules/fluent-ffmpeg' @ ./index.js 1:15-39 at compiler.close.n (evalmachine.<anonymous>:3:1350162) at _promise0.then._result0 (eval at create (evalmachine.<anonymous>:1:349386), <anonymous>:13:1) at process._tickCallback (internal/process/next_tick.js:68:7) ```
1.0
Failed to build fluent-ffmpeg with Error: Can't resolve './lib-cov/fluent-ffmpeg' - ## Steps to reproduce ``` git clone https://github.com/styfle/ncc-bug-fluent-ffmpeg cd ncc-bug-fluent-ffmpeg yarn ncc build index.js ``` ## Output ``` ncc: Version 0.18.1 ncc: Compiling file index.js Error: Hash: 010bf5d256da3ab07bed Version: webpack 5.0.0-alpha.9 Time: 93ms Built at: 04/24/2019 5:21:04 PM Asset Size Chunks Chunk Names index.js 301 KiB {404} main Entrypoint main = index.js [64] external "util" 42 bytes {404} [123] ./node_modules/fluent-ffmpeg/lib/fluent-ffmpeg.js 6.31 KiB {404} [170] ./node_modules/fluent-ffmpeg/lib/options/misc.js 933 bytes {404} [172] ./node_modules/fluent-ffmpeg/lib/options/output.js 3.84 KiB {404} [200] ./node_modules/fluent-ffmpeg/lib/options/videosize.js 7.58 KiB {404} [300] ./node_modules/fluent-ffmpeg/lib/options/audio.js 3.86 KiB {404} [318] ./index.js 631 bytes {404} [417] ./node_modules/fluent-ffmpeg/lib/options/custom.js 6.54 KiB {404} [421] external "http" 42 bytes {404} [476] ./node_modules/fluent-ffmpeg/lib/options/video.js 4.02 KiB {404} [477] ./node_modules/fluent-ffmpeg/lib/options/inputs.js 3.89 KiB {404} [485] external "events" 42 bytes {404} [573] ./node_modules/fluent-ffmpeg/lib/utils.js 12.9 KiB {404} [589] external "path" 42 bytes {404} [805] ./node_modules/fluent-ffmpeg/index.js 117 bytes {404} + 14 hidden modules ERROR in ./node_modules/fluent-ffmpeg/index.js 1:48-82 Module not found: Error: Can't resolve './lib-cov/fluent-ffmpeg' in '/Users/styfle/Code/foo/ncc-bug-fluent-ffmpeg/node_modules/fluent-ffmpeg' @ ./index.js 1:15-39 at compiler.close.n (evalmachine.<anonymous>:3:1350162) at _promise0.then._result0 (eval at create (evalmachine.<anonymous>:1:349386), <anonymous>:13:1) at process._tickCallback (internal/process/next_tick.js:68:7) ```
priority
failed to build fluent ffmpeg with error can t resolve lib cov fluent ffmpeg steps to reproduce git clone cd ncc bug fluent ffmpeg yarn ncc build index js output ncc version ncc compiling file index js error hash version webpack alpha time built at pm asset size chunks chunk names index js kib main entrypoint main index js external util bytes node modules fluent ffmpeg lib fluent ffmpeg js kib node modules fluent ffmpeg lib options misc js bytes node modules fluent ffmpeg lib options output js kib node modules fluent ffmpeg lib options videosize js kib node modules fluent ffmpeg lib options audio js kib index js bytes node modules fluent ffmpeg lib options custom js kib external http bytes node modules fluent ffmpeg lib options video js kib node modules fluent ffmpeg lib options inputs js kib external events bytes node modules fluent ffmpeg lib utils js kib external path bytes node modules fluent ffmpeg index js bytes hidden modules error in node modules fluent ffmpeg index js module not found error can t resolve lib cov fluent ffmpeg in users styfle code foo ncc bug fluent ffmpeg node modules fluent ffmpeg index js at compiler close n evalmachine at then eval at create evalmachine at process tickcallback internal process next tick js
1
291,690
25,167,017,989
IssuesEvent
2022-11-10 21:53:28
devfile/api
https://api.github.com/repos/devfile/api
closed
Add schema validation to devfile community registry
area/test-automation
**Which area this feature is related to?** /area test-automation ## Which functionality do you think we should add? **Why is this needed? Is your feature request related to a problem?** The existing devfile community registry test relies on functional tests, e.g. odo and others, to indirectly validate the devfiles in the registry to make sure that the devfiles in the registry conform to the devfile schema. However, when those tests fail, it is not immediately clear on the failure is caused by the invalid devfile or something else, e.g. failure to run by the tools. Note: This item is based on the discussion on the devfile community call on 09/22: https://docs.google.com/document/d/1Zn6D1gNu1gDidtillni0hNAeU5pscfqwhx4mv3MmmwY/edit?pli=1#heading=h.ddgqx32cqyb8 **Detailed description:** ## Describe the solution you'd like Explicitly run schema validation on the devfile entries in the devfile registry as part of the PR test to ensure all the devfiles in the public community registries are valid. ## Describe alternatives you've considered Leave it as-is to indirect test as part of the tools test but it cannot correctly indicates the failure is caused by schema validation. ## Additional context N/A
1.0
Add schema validation to devfile community registry - **Which area this feature is related to?** /area test-automation ## Which functionality do you think we should add? **Why is this needed? Is your feature request related to a problem?** The existing devfile community registry test relies on functional tests, e.g. odo and others, to indirectly validate the devfiles in the registry to make sure that the devfiles in the registry conform to the devfile schema. However, when those tests fail, it is not immediately clear on the failure is caused by the invalid devfile or something else, e.g. failure to run by the tools. Note: This item is based on the discussion on the devfile community call on 09/22: https://docs.google.com/document/d/1Zn6D1gNu1gDidtillni0hNAeU5pscfqwhx4mv3MmmwY/edit?pli=1#heading=h.ddgqx32cqyb8 **Detailed description:** ## Describe the solution you'd like Explicitly run schema validation on the devfile entries in the devfile registry as part of the PR test to ensure all the devfiles in the public community registries are valid. ## Describe alternatives you've considered Leave it as-is to indirect test as part of the tools test but it cannot correctly indicates the failure is caused by schema validation. ## Additional context N/A
non_priority
add schema validation to devfile community registry which area this feature is related to area test automation which functionality do you think we should add why is this needed is your feature request related to a problem the existing devfile community registry test relies on functional tests e g odo and others to indirectly validate the devfiles in the registry to make sure that the devfiles in the registry conform to the devfile schema however when those tests fail it is not immediately clear on the failure is caused by the invalid devfile or something else e g failure to run by the tools note this item is based on the discussion on the devfile community call on detailed description describe the solution you d like explicitly run schema validation on the devfile entries in the devfile registry as part of the pr test to ensure all the devfiles in the public community registries are valid describe alternatives you ve considered leave it as is to indirect test as part of the tools test but it cannot correctly indicates the failure is caused by schema validation additional context n a
0
736,660
25,482,085,854
IssuesEvent
2022-11-25 23:28:05
Jexactyl/Jexactyl
https://api.github.com/repos/Jexactyl/Jexactyl
closed
Create server doesn't work after update
type: bug report priority: high
### Current Behavior When i try to create new server, i get error Unable to create this server. Please contact an administrator. also, sometime if you write less ram etc, it sais Memory must be greater than or equal to 256 on all (256 instead of 4,096 RAM example) ### Expected Behavior When you press create server it should create server ### Steps to Reproduce For creation, go to store set it up and click create, error appears and server is not created For the text bug, go to store set RAM, Disk to for example 4MB, you will see text Memory must be greater than or equal to 256 (this 256 is the bug) ### Panel Version 3.6.0 ### Wings Version 1.7.2 ### Games and/or Eggs Affected Minecraft (all, bungee, paper etc) ### Docker Image _No response_ ### Error Logs ```bash http://bin.ptdl.co/kr8n4 ``` ### Is there an existing issue for this? - [X] I have searched the existing issues before opening this issue. - [X] I have provided all relevant details, including the specific game and Docker images I am using if this issue is related to running a server. - [X] I have checked in the Discord server and believe this is a bug with the software, and not a configuration issue with my specific system.
1.0
Create server doesn't work after update - ### Current Behavior When i try to create new server, i get error Unable to create this server. Please contact an administrator. also, sometime if you write less ram etc, it sais Memory must be greater than or equal to 256 on all (256 instead of 4,096 RAM example) ### Expected Behavior When you press create server it should create server ### Steps to Reproduce For creation, go to store set it up and click create, error appears and server is not created For the text bug, go to store set RAM, Disk to for example 4MB, you will see text Memory must be greater than or equal to 256 (this 256 is the bug) ### Panel Version 3.6.0 ### Wings Version 1.7.2 ### Games and/or Eggs Affected Minecraft (all, bungee, paper etc) ### Docker Image _No response_ ### Error Logs ```bash http://bin.ptdl.co/kr8n4 ``` ### Is there an existing issue for this? - [X] I have searched the existing issues before opening this issue. - [X] I have provided all relevant details, including the specific game and Docker images I am using if this issue is related to running a server. - [X] I have checked in the Discord server and believe this is a bug with the software, and not a configuration issue with my specific system.
priority
create server doesn t work after update current behavior when i try to create new server i get error unable to create this server please contact an administrator also sometime if you write less ram etc it sais memory must be greater than or equal to on all instead of ram example expected behavior when you press create server it should create server steps to reproduce for creation go to store set it up and click create error appears and server is not created for the text bug go to store set ram disk to for example you will see text memory must be greater than or equal to this is the bug panel version wings version games and or eggs affected minecraft all bungee paper etc docker image no response error logs bash is there an existing issue for this i have searched the existing issues before opening this issue i have provided all relevant details including the specific game and docker images i am using if this issue is related to running a server i have checked in the discord server and believe this is a bug with the software and not a configuration issue with my specific system
1
90,065
11,341,110,922
IssuesEvent
2020-01-23 08:34:43
microsoft/vscode
https://api.github.com/repos/microsoft/vscode
closed
comment codes within JSON
*as-designed json
Issue Type: <b>Bug</b> In the below JSON, everything following the `/*` is interpreted as a multi-line comment. { 'user-agent': 'python-requests/2.18.4', 'accept-encoding': 'gzip, deflate', 'accept': '\*/*', 'content-type': 'application/json' } VS Code version: Code 1.41.1 (26076a4de974ead31f97692a0d32f90d735645c0, 2019-12-18T14:57:51.166Z) OS version: Darwin x64 19.2.0 <!-- generated by issue reporter -->
1.0
comment codes within JSON - Issue Type: <b>Bug</b> In the below JSON, everything following the `/*` is interpreted as a multi-line comment. { 'user-agent': 'python-requests/2.18.4', 'accept-encoding': 'gzip, deflate', 'accept': '\*/*', 'content-type': 'application/json' } VS Code version: Code 1.41.1 (26076a4de974ead31f97692a0d32f90d735645c0, 2019-12-18T14:57:51.166Z) OS version: Darwin x64 19.2.0 <!-- generated by issue reporter -->
non_priority
comment codes within json issue type bug in the below json everything following the is interpreted as a multi line comment user agent python requests accept encoding gzip deflate accept content type application json vs code version code os version darwin
0
656,155
21,722,039,730
IssuesEvent
2022-05-11 01:55:34
grpc/grpc
https://api.github.com/repos/grpc/grpc
opened
shared library and global states
kind/question priority/P3
Hello, The problem is that grpc crashes in fallowing situation: 1. executable contains grpc server - static linking to grpc 2. library (dll) contains grpc services - static linking to grpc Executable load dll via `QPluginLoader` that provides services. In this use case grpc is initialized twice, once in main executable and second time in dll. To work around this problem I had to pass `grpc::g_core_codegen_interface` from main executable to dll and in that situation all works fine (server resides in executable, invokes services that are located in dll). Unfortunately this will not work if I want to initiate new `channel` from that dll service rpc method implementation, i.e.: ``` grpc::Status example( grpc::ServerContext *context, const proto::example::ExampleRequestDecimate *request, grpc::ServerWriter<proto::example::ExampleResponseDecimated> *writer) override; ``` To make it work (instantiating new channel inside above rpc message) I have to store dll `grpc::g_core_codegen_interface` and switch between them. What I mean by this: exe grpc server -> dll service -> grpc::Status example - using `grpc::g_core_codegen_interface` from executable to write messages dll service -> grpc::Status example -> new proto::example2::NewStub - using `grpc::g_core_codegen_interface` from dll to invoke rpc command. The main problem here is shared linkage and in above scenario issue with switching those `grpc::g_core_codegen_interface` with will most likely cause crash at some point. My question is: - is this use case valid ? - any hints, excluding static linkage for service implementation instead of dll (via QPluginLoader), more then welcome
1.0
shared library and global states - Hello, The problem is that grpc crashes in fallowing situation: 1. executable contains grpc server - static linking to grpc 2. library (dll) contains grpc services - static linking to grpc Executable load dll via `QPluginLoader` that provides services. In this use case grpc is initialized twice, once in main executable and second time in dll. To work around this problem I had to pass `grpc::g_core_codegen_interface` from main executable to dll and in that situation all works fine (server resides in executable, invokes services that are located in dll). Unfortunately this will not work if I want to initiate new `channel` from that dll service rpc method implementation, i.e.: ``` grpc::Status example( grpc::ServerContext *context, const proto::example::ExampleRequestDecimate *request, grpc::ServerWriter<proto::example::ExampleResponseDecimated> *writer) override; ``` To make it work (instantiating new channel inside above rpc message) I have to store dll `grpc::g_core_codegen_interface` and switch between them. What I mean by this: exe grpc server -> dll service -> grpc::Status example - using `grpc::g_core_codegen_interface` from executable to write messages dll service -> grpc::Status example -> new proto::example2::NewStub - using `grpc::g_core_codegen_interface` from dll to invoke rpc command. The main problem here is shared linkage and in above scenario issue with switching those `grpc::g_core_codegen_interface` with will most likely cause crash at some point. My question is: - is this use case valid ? - any hints, excluding static linkage for service implementation instead of dll (via QPluginLoader), more then welcome
priority
shared library and global states hello the problem is that grpc crashes in fallowing situation executable contains grpc server static linking to grpc library dll contains grpc services static linking to grpc executable load dll via qpluginloader that provides services in this use case grpc is initialized twice once in main executable and second time in dll to work around this problem i had to pass grpc g core codegen interface from main executable to dll and in that situation all works fine server resides in executable invokes services that are located in dll unfortunately this will not work if i want to initiate new channel from that dll service rpc method implementation i e grpc status example grpc servercontext context const proto example examplerequestdecimate request grpc serverwriter writer override to make it work instantiating new channel inside above rpc message i have to store dll grpc g core codegen interface and switch between them what i mean by this exe grpc server dll service grpc status example using grpc g core codegen interface from executable to write messages dll service grpc status example new proto newstub using grpc g core codegen interface from dll to invoke rpc command the main problem here is shared linkage and in above scenario issue with switching those grpc g core codegen interface with will most likely cause crash at some point my question is is this use case valid any hints excluding static linkage for service implementation instead of dll via qpluginloader more then welcome
1
540,270
15,803,538,098
IssuesEvent
2021-04-03 14:43:58
zeoflow/flow-kit
https://api.github.com/repos/zeoflow/flow-kit
opened
Inside the *.app package the classes should implement lifecycle handlers
@bug @priority-very-low
**Description:** Inside the *.app package the classes should implement lifecycle handlers ###### To help us triage faster, please check to make sure you are using the [latest version](https://github.com/zeoflow/flow-kit/releases) of the library. ###### We also happily accept [pull requests](https://github.com/zeoflow/flow-kit/pulls).
1.0
Inside the *.app package the classes should implement lifecycle handlers - **Description:** Inside the *.app package the classes should implement lifecycle handlers ###### To help us triage faster, please check to make sure you are using the [latest version](https://github.com/zeoflow/flow-kit/releases) of the library. ###### We also happily accept [pull requests](https://github.com/zeoflow/flow-kit/pulls).
priority
inside the app package the classes should implement lifecycle handlers description inside the app package the classes should implement lifecycle handlers to help us triage faster please check to make sure you are using the of the library we also happily accept
1
587,882
17,633,965,023
IssuesEvent
2021-08-19 11:34:03
pingcap/tidb
https://api.github.com/repos/pingcap/tidb
closed
lightning endless loop and huge logs when there is UK duplicated items in tables with list partition.
type/bug priority/release-blocker severity/critical sig/migrate component/lightning
## Bug Report Please answer these questions before submitting your issue. Thanks! ### 1. Minimal reproduce step (Required) - Use lightning to import tables with list partition, and there are duplicate items. ./tidb-lightning -config /minio/tools_test_data/list_partition_sample/lightning.toml <!-- a step by step guide for reproducing the bug. --> ### 2. What did you expect to see? (Required) - When there is duplicated items, lightning should fail quickly. ### 3. What did you see instead (Required) - lightning endless loop, and generate lots of logs [root@centos76_vm list_partition_sample]# grep "duplicated key found" *.log | more tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] [root@centos76_vm list_partition_sample]# du -shl *.log 513M tidb-lightning-2021-08-19T14-15-28.118.log 513M tidb-lightning-2021-08-19T14-16-34.172.log 513M tidb-lightning-2021-08-19T14-17-38.725.log 513M tidb-lightning-2021-08-19T14-18-43.035.log 513M tidb-lightning-2021-08-19T14-19-47.731.log 513M tidb-lightning-2021-08-19T14-20-52.501.log 513M tidb-lightning-2021-08-19T14-21-59.969.log 513M tidb-lightning-2021-08-19T14-23-04.200.log 513M tidb-lightning-2021-08-19T14-33-10.506.log 513M tidb-lightning-2021-08-19T14-34-19.252.log 513M tidb-lightning-2021-08-19T14-35-24.795.log 513M tidb-lightning-2021-08-19T14-36-30.362.log 513M tidb-lightning-2021-08-19T14-37-37.767.log 513M tidb-lightning-2021-08-19T14-38-42.938.log ### 4. What is your TiDB version? (Required) 5.0 master
1.0
lightning endless loop and huge logs when there is UK duplicated items in tables with list partition. - ## Bug Report Please answer these questions before submitting your issue. Thanks! ### 1. Minimal reproduce step (Required) - Use lightning to import tables with list partition, and there are duplicate items. ./tidb-lightning -config /minio/tools_test_data/list_partition_sample/lightning.toml <!-- a step by step guide for reproducing the bug. --> ### 2. What did you expect to see? (Required) - When there is duplicated items, lightning should fail quickly. ### 3. What did you see instead (Required) - lightning endless loop, and generate lots of logs [root@centos76_vm list_partition_sample]# grep "duplicated key found" *.log | more tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="] [root@centos76_vm list_partition_sample]# du -shl *.log 513M tidb-lightning-2021-08-19T14-15-28.118.log 513M tidb-lightning-2021-08-19T14-16-34.172.log 513M tidb-lightning-2021-08-19T14-17-38.725.log 513M tidb-lightning-2021-08-19T14-18-43.035.log 513M tidb-lightning-2021-08-19T14-19-47.731.log 513M tidb-lightning-2021-08-19T14-20-52.501.log 513M tidb-lightning-2021-08-19T14-21-59.969.log 513M tidb-lightning-2021-08-19T14-23-04.200.log 513M tidb-lightning-2021-08-19T14-33-10.506.log 513M tidb-lightning-2021-08-19T14-34-19.252.log 513M tidb-lightning-2021-08-19T14-35-24.795.log 513M tidb-lightning-2021-08-19T14-36-30.362.log 513M tidb-lightning-2021-08-19T14-37-37.767.log 513M tidb-lightning-2021-08-19T14-38-42.938.log ### 4. What is your TiDB version? (Required) 5.0 master
priority
lightning endless loop and huge logs when there is uk duplicated items in tables with list partition bug report please answer these questions before submitting your issue thanks minimal reproduce step required use lightning to import tables with list partition and there are duplicate items tidb lightning config minio tools test data list partition sample lightning toml what did you expect to see required when there is duplicated items lightning should fail quickly what did you see instead required lightning endless loop and generate lots of logs grep duplicated key found log more tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log du shl log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log what is your tidb version required master
1
11,012
4,128,397,164
IssuesEvent
2016-06-10 06:03:33
joomla/joomla-cms
https://api.github.com/repos/joomla/joomla-cms
closed
Joomla Backend login creates directory .pki in root of webserver
No Code Attached Yet
#### Steps to reproduce the issue Login to Joomla v3.5.1 Backend creates directory .pki in the root of the webserver. After deleting directory .pki, directory is created again during Joomla backend login. #### Expected result Not creating any directories during Joomla backend login. #### Actual result Creating of directory .pki in the fileserver root. #### System information (as much as possible) PHP Built On Linux webserver01.sylconia.nl 3.10.0-327.13.1.el7.x86_64 #1 SMP Thu Mar 31 16:04:38 UTC 2016 x86_64 Database Version 5.1.69-log Database Collation latin1_swedish_ci Database Connection Collation utf8_general_ci PHP Version 5.6.22 Web Server Apache/2.4.6 (CentOS) WebServer to PHP Interface fpm-fcgi Joomla! Version Joomla! 3.5.1 Stable [ Unicorn ] 05-April-2016 22:45 GMT Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT User Agent Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko #### Additional comments
1.0
Joomla Backend login creates directory .pki in root of webserver - #### Steps to reproduce the issue Login to Joomla v3.5.1 Backend creates directory .pki in the root of the webserver. After deleting directory .pki, directory is created again during Joomla backend login. #### Expected result Not creating any directories during Joomla backend login. #### Actual result Creating of directory .pki in the fileserver root. #### System information (as much as possible) PHP Built On Linux webserver01.sylconia.nl 3.10.0-327.13.1.el7.x86_64 #1 SMP Thu Mar 31 16:04:38 UTC 2016 x86_64 Database Version 5.1.69-log Database Collation latin1_swedish_ci Database Connection Collation utf8_general_ci PHP Version 5.6.22 Web Server Apache/2.4.6 (CentOS) WebServer to PHP Interface fpm-fcgi Joomla! Version Joomla! 3.5.1 Stable [ Unicorn ] 05-April-2016 22:45 GMT Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT User Agent Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko #### Additional comments
non_priority
joomla backend login creates directory pki in root of webserver steps to reproduce the issue login to joomla backend creates directory pki in the root of the webserver after deleting directory pki directory is created again during joomla backend login expected result not creating any directories during joomla backend login actual result creating of directory pki in the fileserver root system information as much as possible php built on linux sylconia nl smp thu mar utc database version log database collation swedish ci database connection collation general ci php version web server apache centos webserver to php interface fpm fcgi joomla version joomla stable april gmt joomla platform version joomla platform stable apr gmt user agent mozilla windows nt trident rv like gecko additional comments
0
424,597
12,313,450,694
IssuesEvent
2020-05-12 15:19:27
CDH-Studio/UpSkill
https://api.github.com/repos/CDH-Studio/UpSkill
closed
Implement CI\CD
Low Priority enhancement
Look into adding CI/CD probably with GitHub Actions verifying the application build and if the tests pass.
1.0
Implement CI\CD - Look into adding CI/CD probably with GitHub Actions verifying the application build and if the tests pass.
priority
implement ci cd look into adding ci cd probably with github actions verifying the application build and if the tests pass
1
8,205
26,453,349,575
IssuesEvent
2023-01-16 12:52:02
rancher/elemental
https://api.github.com/repos/rancher/elemental
closed
Research - Use autoscaling for self-hosted runners in public cloud
area/automation kind/QA
Right now, we have self hosted runners in the public cloud, the machines is started and stopped on demand. It is a good first step but when we will add more tests, we will need something better. We can think about autoscaling the runners, it is possible with the Github API and there are some resources on how to achieve it. For instance: https://www.dev-eth0.de/2021/03/09/autoscaling-gitlab-runner-instances-on-google-cloud-platform/ https://medium.com/philips-technology-blog/scaling-github-action-runners-a4a45f7c67a6 https://github.blog/changelog/2021-09-20-github-actions-ephemeral-self-hosted-runners-new-webhooks-for-auto-scaling/ But it's low priority at the moment.
1.0
Research - Use autoscaling for self-hosted runners in public cloud - Right now, we have self hosted runners in the public cloud, the machines is started and stopped on demand. It is a good first step but when we will add more tests, we will need something better. We can think about autoscaling the runners, it is possible with the Github API and there are some resources on how to achieve it. For instance: https://www.dev-eth0.de/2021/03/09/autoscaling-gitlab-runner-instances-on-google-cloud-platform/ https://medium.com/philips-technology-blog/scaling-github-action-runners-a4a45f7c67a6 https://github.blog/changelog/2021-09-20-github-actions-ephemeral-self-hosted-runners-new-webhooks-for-auto-scaling/ But it's low priority at the moment.
non_priority
research use autoscaling for self hosted runners in public cloud right now we have self hosted runners in the public cloud the machines is started and stopped on demand it is a good first step but when we will add more tests we will need something better we can think about autoscaling the runners it is possible with the github api and there are some resources on how to achieve it for instance but it s low priority at the moment
0
360,453
25,290,255,958
IssuesEvent
2022-11-16 23:17:36
primefaces/primeng
https://api.github.com/repos/primefaces/primeng
closed
Component: InputTextarea (Documentation)
Component: Documentation
### Describe the bug The documentation for InputTextarea has autoResize as a string in the example, it should be a boolean. ### Environment N/A ### Reproducer _No response_ ### Angular version 14.2.7 ### PrimeNG version 14.2.2 ### Build / Runtime Angular CLI App ### Language ALL ### Node version (for AoT issues node --version) 16.14.2 ### Browser(s) _No response_ ### Steps to reproduce the behavior _No response_ ### Expected behavior _No response_
1.0
Component: InputTextarea (Documentation) - ### Describe the bug The documentation for InputTextarea has autoResize as a string in the example, it should be a boolean. ### Environment N/A ### Reproducer _No response_ ### Angular version 14.2.7 ### PrimeNG version 14.2.2 ### Build / Runtime Angular CLI App ### Language ALL ### Node version (for AoT issues node --version) 16.14.2 ### Browser(s) _No response_ ### Steps to reproduce the behavior _No response_ ### Expected behavior _No response_
non_priority
component inputtextarea documentation describe the bug the documentation for inputtextarea has autoresize as a string in the example it should be a boolean environment n a reproducer no response angular version primeng version build runtime angular cli app language all node version for aot issues node version browser s no response steps to reproduce the behavior no response expected behavior no response
0
372,024
11,008,034,006
IssuesEvent
2019-12-04 09:44:38
webcompat/web-bugs
https://api.github.com/repos/webcompat/web-bugs
closed
www.pcgamer.com - see bug description
browser-firefox-mobile engine-gecko priority-important
<!-- @browser: Firefox Mobile 68.0 --> <!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb **Browser / Version**: Firefox Mobile 68.0 **Operating System**: Android **Tested Another Browser**: Unknown **Problem type**: Something else **Description**: Autoplay isn't blocked despite my settings **Steps to Reproduce**: [![Screenshot Description](https://webcompat.com/uploads/2019/12/dc2caecf-6804-4448-8edf-43f56168fdc0-thumb.jpeg)](https://webcompat.com/uploads/2019/12/dc2caecf-6804-4448-8edf-43f56168fdc0.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191202144737</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> <p>Console Messages:</p> <pre> ['[JavaScript Error: "downloadable font: font load failed (font-family: "t" style:normal weight:400 stretch:100 src index:0): status=2147500037 source: data:application/font-woff2,"]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.onesignal.com/sdks/OneSignalSDK.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 198}]', '[console.log(DOMContentLoaded at, 564) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:94]', '[console.log(No archive filter present) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:54:33009]', '[console.debug(Event Tracking driver "ga" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(All Event Tracking drivers initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57435]', '[console.debug(IndexedDB database (fibet, version 4) opened successfully) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58435]', '[console.debug(Event Tracking driver "indexedDB" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(Purging events before 1570268456 (Sat Oct 05 2019 10:40:56 GMT+0100 (British Summer Time))) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:59728]', '[console.debug(Purge complete: 0 records deleted) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:60130]', '[console.debug(Purged old indexedDB entries) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58650]', '[console.log(BordeauxDone at, 893) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:38:425]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X590208%22,%22domains%22:[%22pcgamer.com%22,%22steamcommunity.com%22,%22facebook.com%22,%22twitter.com%22,%22youtube.com%22,%22twitch.tv%22,%22futureplc.com%22,%22send%22,%22reddit.com%22,%22%22,%22steampowered.com%22,%22halowaypoint.com%22,%22futureus.com%22],%22page%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://tags.bkrtx.com/js/bk-coretag.js?referer=." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://js-sec.indexww.com/ht/p/184056-14682440011580.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://c.amazon-adsystem.com/aax2/apstag.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.adsafeprotected.com/iasPET.1.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://securepubads.g.doubleclick.net/tag/js/gpt.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(PageLoad at, 2469) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:516]', '[JavaScript Error: "TypeError: You provided an invalid object where a stream was expected. You can provide an Observable, Promise, Array, or Iterable." {file: "https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js" line: 10}]\nt.subscribeTo@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:84771\nt.subscribeToResult@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:22707\nu</t.prototype._innerSub@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57949\nu</t.prototype._tryNext@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57798\nu</t.prototype._next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57621\np</t.prototype.next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:17378\nt.subscribeToArray/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:83678\ns</e.prototype._trySubscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20957\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20738\nl</e.prototype.call@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57267\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20605\nf/</<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4109\nf/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4121\n', '[JavaScript Error: "ReferenceError: lh0x3b2" {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 9}]', '[console.error(Error loading Bluekai API script -, [object Event], \n, <anonymous> @ 42:342507 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Index Exchange API script: -, [object Event], \n, <anonymous> @ 42:343628 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Amazon A9 API script -, [object Event], \n, <anonymous> @ 42:344720 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading IAS API script -, [object Event], \n, <anonymous> @ 42:345896 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading GPT API script -, [object Event], \n, <anonymous> @ 42:346018 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://googleads.g.doubleclick.net/pagead/id. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.doubleclick.net/instream/ad_status.js." {file: "https://www.youtube.com/embed/04gz8N9i9XI" line: 1}]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(cheerios) https://vanilla.futurecdn.net/pcgamer/147822/media/js/app.js:56:82795]', '[console.log(-RAMP VIDEO- video.setup) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=DBG&r=7086&ad=/10518929/PCGamer_Preroll_Carousel&crid=tag_url." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://ssl.p.jwpcdn.com/player/plugins/googima/v/8.7.6/googima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.adsafeprotected.com/vans-adapter-google-ima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.warn(JW Player Warning 305002. For more information see https://developer.jwplayer.com/jw-player/docs/developer-guide/api/errors-reference#305002) https://content.jwplatform.com/libraries/xRndq6xb.js:11:90821]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(-RAMP VIDEO- Video Viewed, [object Object]) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[console.log(-RAMP VIDEO- -RAMP VIDEO- Refresh) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=VV&r=3528&id=&pdid=&puids=&bid=&cp=&pl=&z=540x304&bdrid=3003&ad=&e=&l=https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://ads.servebom.com/tmntag.js?v=1.0vr&r=1690&o={%22f%22:1,%22p%22:%22%22,%22l%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22,%22tt%22:%22Halo%3A%20Reach%20brings%20the%20series%20back%20to%20PC%20with%20a%20mostly%20fantastic%20port%20%7C%20PC%20Gamer%22,%22fs%22:1,%22a%22:[{%22s%22:%22/10518929/PCGamer_Preroll_Carousel%22,%22z%22:[540,304],%22d%22:%22video_content_718%22,%22g%22:{%22apv%22:1}}],%22t%22:%222019-12-04%2009:41:02%22,%22tz%22:0,%22r%22:%22360x755%22,%22pam%22:%22managed%22}&uuid=d3ab5330976c494ba24a3066b7454025&at=v. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.taboola.com/libtrc/futureplc-pcgamer/loader.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(-RAMP VIDEO- Video error: TypeError: t.pubads is not a function) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]'] </pre> </details> _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
1.0
www.pcgamer.com - see bug description - <!-- @browser: Firefox Mobile 68.0 --> <!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 --> <!-- @reported_with: mobile-reporter --> **URL**: https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb **Browser / Version**: Firefox Mobile 68.0 **Operating System**: Android **Tested Another Browser**: Unknown **Problem type**: Something else **Description**: Autoplay isn't blocked despite my settings **Steps to Reproduce**: [![Screenshot Description](https://webcompat.com/uploads/2019/12/dc2caecf-6804-4448-8edf-43f56168fdc0-thumb.jpeg)](https://webcompat.com/uploads/2019/12/dc2caecf-6804-4448-8edf-43f56168fdc0.jpeg) <details> <summary>Browser Configuration</summary> <ul> <li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191202144737</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li> </ul> <p>Console Messages:</p> <pre> ['[JavaScript Error: "downloadable font: font load failed (font-family: "t" style:normal weight:400 stretch:100 src index:0): status=2147500037 source: data:application/font-woff2,"]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.onesignal.com/sdks/OneSignalSDK.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 198}]', '[console.log(DOMContentLoaded at, 564) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:94]', '[console.log(No archive filter present) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:54:33009]', '[console.debug(Event Tracking driver "ga" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(All Event Tracking drivers initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57435]', '[console.debug(IndexedDB database (fibet, version 4) opened successfully) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58435]', '[console.debug(Event Tracking driver "indexedDB" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(Purging events before 1570268456 (Sat Oct 05 2019 10:40:56 GMT+0100 (British Summer Time))) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:59728]', '[console.debug(Purge complete: 0 records deleted) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:60130]', '[console.debug(Purged old indexedDB entries) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58650]', '[console.log(BordeauxDone at, 893) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:38:425]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X590208%22,%22domains%22:[%22pcgamer.com%22,%22steamcommunity.com%22,%22facebook.com%22,%22twitter.com%22,%22youtube.com%22,%22twitch.tv%22,%22futureplc.com%22,%22send%22,%22reddit.com%22,%22%22,%22steampowered.com%22,%22halowaypoint.com%22,%22futureus.com%22],%22page%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://tags.bkrtx.com/js/bk-coretag.js?referer=." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://js-sec.indexww.com/ht/p/184056-14682440011580.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://c.amazon-adsystem.com/aax2/apstag.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.adsafeprotected.com/iasPET.1.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://securepubads.g.doubleclick.net/tag/js/gpt.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(PageLoad at, 2469) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:516]', '[JavaScript Error: "TypeError: You provided an invalid object where a stream was expected. You can provide an Observable, Promise, Array, or Iterable." {file: "https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js" line: 10}]\nt.subscribeTo@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:84771\nt.subscribeToResult@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:22707\nu</t.prototype._innerSub@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57949\nu</t.prototype._tryNext@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57798\nu</t.prototype._next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57621\np</t.prototype.next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:17378\nt.subscribeToArray/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:83678\ns</e.prototype._trySubscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20957\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20738\nl</e.prototype.call@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57267\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20605\nf/</<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4109\nf/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4121\n', '[JavaScript Error: "ReferenceError: lh0x3b2" {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 9}]', '[console.error(Error loading Bluekai API script -, [object Event], \n, <anonymous> @ 42:342507 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Index Exchange API script: -, [object Event], \n, <anonymous> @ 42:343628 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Amazon A9 API script -, [object Event], \n, <anonymous> @ 42:344720 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading IAS API script -, [object Event], \n, <anonymous> @ 42:345896 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading GPT API script -, [object Event], \n, <anonymous> @ 42:346018 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://googleads.g.doubleclick.net/pagead/id. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.doubleclick.net/instream/ad_status.js." {file: "https://www.youtube.com/embed/04gz8N9i9XI" line: 1}]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(cheerios) https://vanilla.futurecdn.net/pcgamer/147822/media/js/app.js:56:82795]', '[console.log(-RAMP VIDEO- video.setup) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=DBG&r=7086&ad=/10518929/PCGamer_Preroll_Carousel&crid=tag_url." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://ssl.p.jwpcdn.com/player/plugins/googima/v/8.7.6/googima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.adsafeprotected.com/vans-adapter-google-ima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.warn(JW Player Warning 305002. For more information see https://developer.jwplayer.com/jw-player/docs/developer-guide/api/errors-reference#305002) https://content.jwplatform.com/libraries/xRndq6xb.js:11:90821]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(-RAMP VIDEO- Video Viewed, [object Object]) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[console.log(-RAMP VIDEO- -RAMP VIDEO- Refresh) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=VV&r=3528&id=&pdid=&puids=&bid=&cp=&pl=&z=540x304&bdrid=3003&ad=&e=&l=https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://ads.servebom.com/tmntag.js?v=1.0vr&r=1690&o={%22f%22:1,%22p%22:%22%22,%22l%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22,%22tt%22:%22Halo%3A%20Reach%20brings%20the%20series%20back%20to%20PC%20with%20a%20mostly%20fantastic%20port%20%7C%20PC%20Gamer%22,%22fs%22:1,%22a%22:[{%22s%22:%22/10518929/PCGamer_Preroll_Carousel%22,%22z%22:[540,304],%22d%22:%22video_content_718%22,%22g%22:{%22apv%22:1}}],%22t%22:%222019-12-04%2009:41:02%22,%22tz%22:0,%22r%22:%22360x755%22,%22pam%22:%22managed%22}&uuid=d3ab5330976c494ba24a3066b7454025&at=v. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.taboola.com/libtrc/futureplc-pcgamer/loader.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(-RAMP VIDEO- Video error: TypeError: t.pubads is not a function) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]'] </pre> </details> _From [webcompat.com](https://webcompat.com/) with โค๏ธ_
priority
see bug description url browser version firefox mobile operating system android tested another browser unknown problem type something else description autoplay isn t blocked despite my settings steps to reproduce browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false console messages reason cors request did not succeed nt subscribeto n in file n in file n in file n in file n in file content uuid at v reason cors request did not succeed from with โค๏ธ
1
183,907
31,788,945,468
IssuesEvent
2023-09-13 00:36:32
bcgov/cas-registration
https://api.github.com/repos/bcgov/cas-registration
opened
Incorporate Opt-in workflows into the design
Backlog Refinement Moose ๐ŸฆŒ UX Research UX Design
#### Describe the task Context (to be refined) below: > **Hanna:** Hi Scrum Team, it seems like there's been a decision in the business area that industrial operations will be allowed to opt in starting in the first year, i.e. at the same time as the other OBPS registrants. We will need to account for this in the Registration App. The implications I can think of off the top of my head are: -we'll probably need some checkbox to indicate an opt-in (not sure at what stage, i.e. user access approval, operator, operation?) -we may need to collect additional data from an opt-in, e.g. the BA seems to indicate that they will need to demonstrate that they are ready to participate - we should find out how that demonstration should happen and whether we need to support that in the app. E.g. an additional form they need to fill out, or attach a document, or sign something, etc. These are initial thoughts ... we should add this to things to discuss with business area. > **Patricia:** I was able to confirm that Adria made this decision official, so yes, Opt-ins (smaller industry under 10KT) can apply to participate in OBPS. The process will include first applying to the Director (Adria), who will confirm whether or not they can join. Once approved by the Director, they should be allowed to register in (mostly?) the same manner as Regulated Operations and will also received a carbon tax exemption the same way. Apparently Opt-ins will have until Feb 2024 to apply. More info to come on this as we learn more!! > **Dylan:** Something to consider is an allow-list for operators. Not totally sure if it would work for our use case, but if some operators need to be approved by adria, we'll probably have to record that approval somehow (either online or offline). #### Acceptance Criteria - [ ] Review relevant slide in the [Sep 21 Registration Engagement deck](https://bcgov.sharepoint.com/:p:/r/teams/06817/_layouts/15/Doc.aspx?sourcedoc=%7B5E09142A-804F-4603-A130-7F6CD00F9552%7D&file=Sept%2021%20-%20Reg%20engagement%20deck.pptx&wdLOR=c91DBA20A-8069-B74B-AF54-24337EBD6CD2&action=edit&mobileredirect=true) - [ ] Create wireframes for the features/workflows Opt-ins in Figma - [ ] Get input from the business area - [ ] Refine design based on the input gathered #### Additional context
1.0
Incorporate Opt-in workflows into the design - #### Describe the task Context (to be refined) below: > **Hanna:** Hi Scrum Team, it seems like there's been a decision in the business area that industrial operations will be allowed to opt in starting in the first year, i.e. at the same time as the other OBPS registrants. We will need to account for this in the Registration App. The implications I can think of off the top of my head are: -we'll probably need some checkbox to indicate an opt-in (not sure at what stage, i.e. user access approval, operator, operation?) -we may need to collect additional data from an opt-in, e.g. the BA seems to indicate that they will need to demonstrate that they are ready to participate - we should find out how that demonstration should happen and whether we need to support that in the app. E.g. an additional form they need to fill out, or attach a document, or sign something, etc. These are initial thoughts ... we should add this to things to discuss with business area. > **Patricia:** I was able to confirm that Adria made this decision official, so yes, Opt-ins (smaller industry under 10KT) can apply to participate in OBPS. The process will include first applying to the Director (Adria), who will confirm whether or not they can join. Once approved by the Director, they should be allowed to register in (mostly?) the same manner as Regulated Operations and will also received a carbon tax exemption the same way. Apparently Opt-ins will have until Feb 2024 to apply. More info to come on this as we learn more!! > **Dylan:** Something to consider is an allow-list for operators. Not totally sure if it would work for our use case, but if some operators need to be approved by adria, we'll probably have to record that approval somehow (either online or offline). #### Acceptance Criteria - [ ] Review relevant slide in the [Sep 21 Registration Engagement deck](https://bcgov.sharepoint.com/:p:/r/teams/06817/_layouts/15/Doc.aspx?sourcedoc=%7B5E09142A-804F-4603-A130-7F6CD00F9552%7D&file=Sept%2021%20-%20Reg%20engagement%20deck.pptx&wdLOR=c91DBA20A-8069-B74B-AF54-24337EBD6CD2&action=edit&mobileredirect=true) - [ ] Create wireframes for the features/workflows Opt-ins in Figma - [ ] Get input from the business area - [ ] Refine design based on the input gathered #### Additional context
non_priority
incorporate opt in workflows into the design describe the task context to be refined below hanna hi scrum team it seems like there s been a decision in the business area that industrial operations will be allowed to opt in starting in the first year i e at the same time as the other obps registrants we will need to account for this in the registration app the implications i can think of off the top of my head are we ll probably need some checkbox to indicate an opt in not sure at what stage i e user access approval operator operation we may need to collect additional data from an opt in e g the ba seems to indicate that they will need to demonstrate that they are ready to participate we should find out how that demonstration should happen and whether we need to support that in the app e g an additional form they need to fill out or attach a document or sign something etc these are initial thoughts we should add this to things to discuss with business area patricia i was able to confirm that adria made this decision official so yes opt ins smaller industry under can apply to participate in obps the process will include first applying to the director adria who will confirm whether or not they can join once approved by the director they should be allowed to register in mostly the same manner as regulated operations and will also received a carbon tax exemption the same way apparently opt ins will have until feb to apply more info to come on this as we learn more dylan something to consider is an allow list for operators not totally sure if it would work for our use case but if some operators need to be approved by adria we ll probably have to record that approval somehow either online or offline acceptance criteria review relevant slide in the create wireframes for the features workflows opt ins in figma get input from the business area refine design based on the input gathered additional context
0
265,393
8,353,762,047
IssuesEvent
2018-10-02 11:09:54
handsontable/handsontable
https://api.github.com/repos/handsontable/handsontable
closed
[Column sorting] New, inserted row breaks the table data
Plugin: column sorting Priority: high Regression Status: Released
### Description After creating new rows, Handsontable breaks the dataset. ### Steps to reproduce <!--- Provide steps to reproduce this issue --> 1. Insert new row when the `columnSorting` plugin is enabled. 2. You can see broken dataset (first row with improper data). ![bug2](https://user-images.githubusercontent.com/141330/46284649-f3183f00-c578-11e8-98aa-06824c8b1cf4.gif) ### Your environment * Handsontable version: 6.0.0
1.0
[Column sorting] New, inserted row breaks the table data - ### Description After creating new rows, Handsontable breaks the dataset. ### Steps to reproduce <!--- Provide steps to reproduce this issue --> 1. Insert new row when the `columnSorting` plugin is enabled. 2. You can see broken dataset (first row with improper data). ![bug2](https://user-images.githubusercontent.com/141330/46284649-f3183f00-c578-11e8-98aa-06824c8b1cf4.gif) ### Your environment * Handsontable version: 6.0.0
priority
new inserted row breaks the table data description after creating new rows handsontable breaks the dataset steps to reproduce insert new row when the columnsorting plugin is enabled you can see broken dataset first row with improper data your environment handsontable version
1
132,560
18,268,766,958
IssuesEvent
2021-10-04 11:36:36
artsking/linux-3.0.35
https://api.github.com/repos/artsking/linux-3.0.35
opened
CVE-2021-20261 (Medium) detected in linux-stable-rtv3.8.6
security vulnerability
## CVE-2021-20261 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-3.0.35/commit/5992fa81c6ac1b4e9db13f5408d914525c5b7875">5992fa81c6ac1b4e9db13f5408d914525c5b7875</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw. <p>Publish Date: 2021-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20261>CVE-2021-20261</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-20261">https://www.linuxkernelcves.com/cves/CVE-2021-20261</a></p> <p>Release Date: 2021-03-11</p> <p>Fix Resolution: v4.4.262</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
True
CVE-2021-20261 (Medium) detected in linux-stable-rtv3.8.6 - ## CVE-2021-20261 - Medium Severity Vulnerability <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary> <p> <p>Julia Cartwright's fork of linux-stable-rt.git</p> <p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p> <p>Found in HEAD commit: <a href="https://github.com/artsking/linux-3.0.35/commit/5992fa81c6ac1b4e9db13f5408d914525c5b7875">5992fa81c6ac1b4e9db13f5408d914525c5b7875</a></p> <p>Found in base branch: <b>master</b></p></p> </details> </p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary> <p></p> <p> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b> <img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b> </p> </details> <p></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary> <p> A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw. <p>Publish Date: 2021-03-11 <p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20261>CVE-2021-20261</a></p> </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.4</b>)</summary> <p> Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: High - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High </p> For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>. </p> </details> <p></p> <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary> <p> <p>Type: Upgrade version</p> <p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-20261">https://www.linuxkernelcves.com/cves/CVE-2021-20261</a></p> <p>Release Date: 2021-03-11</p> <p>Fix Resolution: v4.4.262</p> </p> </details> <p></p> *** Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github)
non_priority
cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files drivers block floppy c drivers block floppy c drivers block floppy c vulnerability details a race condition was found in the linux kernels implementation of the floppy disk drive controller driver software the impact of this issue is lessened by the fact that the default permissions on the floppy device dev are restricted to root if the permissions on the device have changed the impact changes greatly in the default configuration root or equivalent permissions are required to attack this flaw publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource
0
40,558
10,549,748,713
IssuesEvent
2019-10-03 09:26:38
godotengine/godot
https://api.github.com/repos/godotengine/godot
closed
Many compilation warnings
bug topic:buildsystem
**Godot version:** Latest master #7b64a24 **OS version:** MacOSX Mojave Scons v3.0.1 **Issue description:** there are many compilation warnings: ``` thirdparty/bullet/LinearMath/btVector3.h:335:7: warning: argument value 10880 is outside the valid range [0, 255] [-Wargument-outside-range] y = bt_splat_ps(y, 0x80); ^~~~~~~~~~~~~~~~~~~~ thirdparty/bullet/LinearMath/btVector3.h:43:29: note: expanded from macro 'bt_splat_ps' #define bt_splat_ps(_a, _i) bt_pshufd_ps((_a), BT_SHUFFLE(_i, _i, _i, _i)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ thirdparty/bullet/LinearMath/btVector3.h:41:33: note: expanded from macro 'bt_pshufd_ps' #define bt_pshufd_ps(_a, _mask) _mm_shuffle_ps((_a), (_a), (_mask)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ``` **Steps to reproduce:** Try compile source
1.0
Many compilation warnings - **Godot version:** Latest master #7b64a24 **OS version:** MacOSX Mojave Scons v3.0.1 **Issue description:** there are many compilation warnings: ``` thirdparty/bullet/LinearMath/btVector3.h:335:7: warning: argument value 10880 is outside the valid range [0, 255] [-Wargument-outside-range] y = bt_splat_ps(y, 0x80); ^~~~~~~~~~~~~~~~~~~~ thirdparty/bullet/LinearMath/btVector3.h:43:29: note: expanded from macro 'bt_splat_ps' #define bt_splat_ps(_a, _i) bt_pshufd_ps((_a), BT_SHUFFLE(_i, _i, _i, _i)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ thirdparty/bullet/LinearMath/btVector3.h:41:33: note: expanded from macro 'bt_pshufd_ps' #define bt_pshufd_ps(_a, _mask) _mm_shuffle_ps((_a), (_a), (_mask)) ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ``` **Steps to reproduce:** Try compile source
non_priority
many compilation warnings godot version latest master os version macosx mojave scons issue description there are many compilation warnings thirdparty bullet linearmath h warning argument value is outside the valid range y bt splat ps y thirdparty bullet linearmath h note expanded from macro bt splat ps define bt splat ps a i bt pshufd ps a bt shuffle i i i i thirdparty bullet linearmath h note expanded from macro bt pshufd ps define bt pshufd ps a mask mm shuffle ps a a mask steps to reproduce try compile source
0
458,160
13,170,060,380
IssuesEvent
2020-08-11 14:38:06
magento/magento2
https://api.github.com/repos/magento/magento2
closed
M 2.4.0 upgrading issue - Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary
Fixed in 2.4.x Issue: Format is not valid Priority: P1 Progress: done Reproduced on 2.4.x Severity: S0
### Preconditions Install Magento 2.3.5 CE using composer ### Steps to reproduce 1. Run SQL command ```sql INSERT INTO review*entity*summary (`entity*pk_value`, `entity_type`, `reviews_count`, `rating_summary`, `store*id`) VALUES (1, 1, 1, 1, 1),(1, 1, 1, 2, 1); {code} 1. Follow a general upgrade flow <https://devdocs.magento.com/guides/v2.4/comp-mgr/cli/cli-upgrade.html] and upgrade to 2.4.0 (<ins>) Upgrade completed successfully (-) {code:bash} Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento*Review. Original exception message: Warning: preg*match(): Compilation failed: invalid range in character class at offset 40 in /Users/max/srv/composer/m2ee.composer/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779 {code} **Overview**: When upgrading from 2.3.5 to 2.4.0 and running **php bin/magento setup:upgrade**, the following error appears: *Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento_Review. Original exception message: Warning: preg_match(): Compilation failed: invalid range in character class at offset 40 in /home/babygear/www/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779* Thisย issue is caused by a regular expression used in Magento code, which is not compatible with PHP 7.3 and PHP 7.4ย  {code:bash} #SQLSTATE\[23000\]: [<sup>:]</ins>: 1062[</sup>\']<ins>\'([\d-\.]</ins>)\'# ``` ย  Please find more details here [https://github.com/magento/magento2/issues/29352> ย 
1.0
M 2.4.0 upgrading issue - Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary - ### Preconditions Install Magento 2.3.5 CE using composer ### Steps to reproduce 1. Run SQL command ```sql INSERT INTO review*entity*summary (`entity*pk_value`, `entity_type`, `reviews_count`, `rating_summary`, `store*id`) VALUES (1, 1, 1, 1, 1),(1, 1, 1, 2, 1); {code} 1. Follow a general upgrade flow <https://devdocs.magento.com/guides/v2.4/comp-mgr/cli/cli-upgrade.html] and upgrade to 2.4.0 (<ins>) Upgrade completed successfully (-) {code:bash} Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento*Review. Original exception message: Warning: preg*match(): Compilation failed: invalid range in character class at offset 40 in /Users/max/srv/composer/m2ee.composer/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779 {code} **Overview**: When upgrading from 2.3.5 to 2.4.0 and running **php bin/magento setup:upgrade**, the following error appears: *Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento_Review. Original exception message: Warning: preg_match(): Compilation failed: invalid range in character class at offset 40 in /home/babygear/www/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779* Thisย issue is caused by a regular expression used in Magento code, which is not compatible with PHP 7.3 and PHP 7.4ย  {code:bash} #SQLSTATE\[23000\]: [<sup>:]</ins>: 1062[</sup>\']<ins>\'([\d-\.]</ins>)\'# ``` ย  Please find more details here [https://github.com/magento/magento2/issues/29352> ย 
priority
m upgrading issue unable to apply patch magento review setup patch schema adduniqueconstrainttoreviewentitysummary preconditions install magento ce using composer steps to reproduce run sql command sql insert into review entity summary entity pk value entity type reviews count rating summary store id values code follow a general upgrade flow and upgrade to upgrade completed successfully code bash unable to apply patch magento review setup patch schema adduniqueconstrainttoreviewentitysummary for module magento review original exception message warning preg match compilation failed invalid range in character class at offset in users max srv composer composer vendor magento framework db adapter pdo mysql php on line code overview when upgrading from to and running php bin magento setup upgrade the following error appears unable to apply patch magento review setup patch schema adduniqueconstrainttoreviewentitysummary for module magento review original exception message warning preg match compilation failed invalid range in character class at offset in home babygear www vendor magento framework db adapter pdo mysql php on line thisย issue is caused by a regular expression used in magento code which is not compatible with php and php ย  code bash sqlstate ย  please find more details here ย 
1
33,931
4,866,112,677
IssuesEvent
2016-11-14 22:41:36
part-up/part-up
https://api.github.com/repos/part-up/part-up
closed
disable /start
Acceptance test finding enhancement
#688 removed the start a part-up link in the global header. We should also disable the direct url to prevent mistakes by users.
1.0
disable /start - #688 removed the start a part-up link in the global header. We should also disable the direct url to prevent mistakes by users.
non_priority
disable start removed the start a part up link in the global header we should also disable the direct url to prevent mistakes by users
0
118,189
4,732,918,810
IssuesEvent
2016-10-19 09:27:36
bespokeinteractive/mchapp
https://api.github.com/repos/bespokeinteractive/mchapp
closed
ANC clinic> Add Tetanus immunization: the system gives this error โ€œSaving Failed! Internal Server Errorโ€
bug High Priority
ANC clinic> Add Tetanus immunization: the system gives this error โ€œSaving Failed! Internal Server Errorโ€ Suggestion --------------- Allow updating of tetanus vaccine administered to the ANC patient. Display a pop-up message "tetanus vaccine updated successfully" on successfully updating the vaccine details.
1.0
ANC clinic> Add Tetanus immunization: the system gives this error โ€œSaving Failed! Internal Server Errorโ€ - ANC clinic> Add Tetanus immunization: the system gives this error โ€œSaving Failed! Internal Server Errorโ€ Suggestion --------------- Allow updating of tetanus vaccine administered to the ANC patient. Display a pop-up message "tetanus vaccine updated successfully" on successfully updating the vaccine details.
priority
anc clinic add tetanus immunization the system gives this error โ€œsaving failed internal server errorโ€ anc clinic add tetanus immunization the system gives this error โ€œsaving failed internal server errorโ€ suggestion allow updating of tetanus vaccine administered to the anc patient display a pop up message tetanus vaccine updated successfully on successfully updating the vaccine details
1
539,351
15,787,235,798
IssuesEvent
2021-04-01 18:55:07
metabase/metabase
https://api.github.com/repos/metabase/metabase
closed
Time is showing 24:00 instead of 00:00
Customization/Formatting Priority:P2 Type:Bug Visualization/
### Bugs timedate shows 24:xx instead of 00:xx. - Firefox 66.0b14 (64-bit) - Debian 9 - Postgres - Metabase v0.31.2 - hosted in Debian 9 - H2 database #### Repeatable steps to reproduce the issue* Set the date in a table to display in yyyy-m-d h:m:s 24 hour format. Look at a datetime with the time in 00:xx range. See 24:xx instead of 00:xx ![SS](https://user-images.githubusercontent.com/4516175/54145907-1da1da00-43ec-11e9-9a58-3e583072945f.png) :arrow_down: Please click the :+1: reaction instead of leaving a `+1` or `update?` comment
1.0
Time is showing 24:00 instead of 00:00 - ### Bugs timedate shows 24:xx instead of 00:xx. - Firefox 66.0b14 (64-bit) - Debian 9 - Postgres - Metabase v0.31.2 - hosted in Debian 9 - H2 database #### Repeatable steps to reproduce the issue* Set the date in a table to display in yyyy-m-d h:m:s 24 hour format. Look at a datetime with the time in 00:xx range. See 24:xx instead of 00:xx ![SS](https://user-images.githubusercontent.com/4516175/54145907-1da1da00-43ec-11e9-9a58-3e583072945f.png) :arrow_down: Please click the :+1: reaction instead of leaving a `+1` or `update?` comment
priority
time is showing instead of bugs timedate shows xx instead of xx firefox bit debian postgres metabase hosted in debian database repeatable steps to reproduce the issue set the date in a table to display in yyyy m d h m s hour format look at a datetime with the time in xx range see xx instead of xx arrow down please click the reaction instead of leaving a or update comment
1
579,413
17,191,053,739
IssuesEvent
2021-07-16 11:00:55
thoth-station/kebechet
https://api.github.com/repos/thoth-station/kebechet
reopened
Improve formatting of changelog computed
#hacktoberfest good first issue hacktoberfest kind/feature priority/important-soon
**Is your feature request related to a problem? Please describe.** The current formatting is not very pretty - especially when smart changelog entries are computed. It would be nice to revisit formatting and make it prettier for users.
1.0
Improve formatting of changelog computed - **Is your feature request related to a problem? Please describe.** The current formatting is not very pretty - especially when smart changelog entries are computed. It would be nice to revisit formatting and make it prettier for users.
priority
improve formatting of changelog computed is your feature request related to a problem please describe the current formatting is not very pretty especially when smart changelog entries are computed it would be nice to revisit formatting and make it prettier for users
1
343,798
10,336,590,178
IssuesEvent
2019-09-03 13:17:17
wherebyus/general-tasks
https://api.github.com/repos/wherebyus/general-tasks
closed
We need to add Call To Action to the Event model, then add that choice for inline events in promos
Priority: High Product: Events UX: Not Validated
## Feature or problem - [ ] Update the event model with a `callToAction` property - [ ] Add call to action to the inline event editor in promos - [ ] Update the AggregateEvent component to handle a `callToAction` property ## UX Validation Not Validated ### Suggested priority High ### Stakeholders *Submitted:* michael ### Definition of done How will we know when this feature is complete? ### Subtasks A detailed list of changes that need to be made or subtasks. One checkbox per. - [ ] Brew the coffee ## Developer estimate To help the team accurately estimate the complexity of this task, take a moment to walk through this list and estimate each item. At the end, you can total the estimates and round to the nearest prime number. If any of these are at a `5` or higher, or if the total is above a `5`, consider breaking this issue into multiple smaller issues. - [ ] Changes to the database () - [ ] Changes to the API () - [ ] Testing Changes to the API () - [ ] Changes to Application Code () - [ ] Adding or updating unit tests () - [ ] Local developer testing () ### Total developer estimate: 0 ## Additional estimate - [ ] Code review () - [ ] QA Testing () - [ ] Stakeholder Sign-off () - [ ] Deploy to Production () ### Total additional estimate: 5 ## QA Notes Detailed instructions for testing, one checkbox per test to be completed. ### Contextual tests - [ ] Accessibility check - [ ] Cross-browser check (Edge, Chrome, Firefox) - [ ] Responsive check
1.0
We need to add Call To Action to the Event model, then add that choice for inline events in promos - ## Feature or problem - [ ] Update the event model with a `callToAction` property - [ ] Add call to action to the inline event editor in promos - [ ] Update the AggregateEvent component to handle a `callToAction` property ## UX Validation Not Validated ### Suggested priority High ### Stakeholders *Submitted:* michael ### Definition of done How will we know when this feature is complete? ### Subtasks A detailed list of changes that need to be made or subtasks. One checkbox per. - [ ] Brew the coffee ## Developer estimate To help the team accurately estimate the complexity of this task, take a moment to walk through this list and estimate each item. At the end, you can total the estimates and round to the nearest prime number. If any of these are at a `5` or higher, or if the total is above a `5`, consider breaking this issue into multiple smaller issues. - [ ] Changes to the database () - [ ] Changes to the API () - [ ] Testing Changes to the API () - [ ] Changes to Application Code () - [ ] Adding or updating unit tests () - [ ] Local developer testing () ### Total developer estimate: 0 ## Additional estimate - [ ] Code review () - [ ] QA Testing () - [ ] Stakeholder Sign-off () - [ ] Deploy to Production () ### Total additional estimate: 5 ## QA Notes Detailed instructions for testing, one checkbox per test to be completed. ### Contextual tests - [ ] Accessibility check - [ ] Cross-browser check (Edge, Chrome, Firefox) - [ ] Responsive check
priority
we need to add call to action to the event model then add that choice for inline events in promos feature or problem update the event model with a calltoaction property add call to action to the inline event editor in promos update the aggregateevent component to handle a calltoaction property ux validation not validated suggested priority high stakeholders submitted michael definition of done how will we know when this feature is complete subtasks a detailed list of changes that need to be made or subtasks one checkbox per brew the coffee developer estimate to help the team accurately estimate the complexity of this task take a moment to walk through this list and estimate each item at the end you can total the estimates and round to the nearest prime number if any of these are at a or higher or if the total is above a consider breaking this issue into multiple smaller issues changes to the database changes to the api testing changes to the api changes to application code adding or updating unit tests local developer testing total developer estimate additional estimate code review qa testing stakeholder sign off deploy to production total additional estimate qa notes detailed instructions for testing one checkbox per test to be completed contextual tests accessibility check cross browser check edge chrome firefox responsive check
1
656,894
21,779,074,648
IssuesEvent
2022-05-13 16:40:05
WordPress/openverse-frontend
https://api.github.com/repos/WordPress/openverse-frontend
opened
Feedback page contains Content Security Policy violations
๐ŸŸฉ priority: low ๐Ÿ›  goal: fix ๐Ÿ•น aspect: interface ๐ŸŸจ tech: javascript
## Description <!-- Concisely describe the bug. Compare your experience with what you expected to happen. --> <!-- For example: "I clicked the 'submit' button and instead of seeing a thank you message, I saw a blank page." --> The feedback page issues warnings about ignored Content Security Policies. ## Reproduction <!-- Provide detailed steps to reproduce the bug. --> 1. Open the browser console 2. Visit https://search.openverse.engineering/feedback ## Screenshots <!-- Add screenshots to show the problem; or delete the section entirely. --> ![Screenshot_2022-05-13_09-37-26](https://user-images.githubusercontent.com/10214785/168328790-f1bfae9b-aa6b-428b-819b-4408ad404f82.png) ## Additional context <!-- Add any other context about the problem here; or delete the section entirely. --> https://sentry.io/share/issue/0d32050590d8435d9a1e898c6c326379/ ## Resolution <!-- Replace the [ ] with [x] to check the box. --> - [ ] ๐Ÿ™‹ I would be interested in resolving this bug.
1.0
Feedback page contains Content Security Policy violations - ## Description <!-- Concisely describe the bug. Compare your experience with what you expected to happen. --> <!-- For example: "I clicked the 'submit' button and instead of seeing a thank you message, I saw a blank page." --> The feedback page issues warnings about ignored Content Security Policies. ## Reproduction <!-- Provide detailed steps to reproduce the bug. --> 1. Open the browser console 2. Visit https://search.openverse.engineering/feedback ## Screenshots <!-- Add screenshots to show the problem; or delete the section entirely. --> ![Screenshot_2022-05-13_09-37-26](https://user-images.githubusercontent.com/10214785/168328790-f1bfae9b-aa6b-428b-819b-4408ad404f82.png) ## Additional context <!-- Add any other context about the problem here; or delete the section entirely. --> https://sentry.io/share/issue/0d32050590d8435d9a1e898c6c326379/ ## Resolution <!-- Replace the [ ] with [x] to check the box. --> - [ ] ๐Ÿ™‹ I would be interested in resolving this bug.
priority
feedback page contains content security policy violations description the feedback page issues warnings about ignored content security policies reproduction open the browser console visit screenshots additional context resolution ๐Ÿ™‹ i would be interested in resolving this bug
1
303,718
26,225,475,105
IssuesEvent
2023-01-04 18:16:07
cockroachdb/cockroach
https://api.github.com/repos/cockroachdb/cockroach
reopened
logictest: mixed-version testserver tests are too flaky
C-bug skipped-test T-sql-sessions
According to the stats on https://teamcity.cockroachdb.com/test/2967917534255592156?currentProjectId=Cockroach_Ci_TestsGcpLinuxX8664BigVm&branch=&expandTestHistoryChartSection=true, 98 of the last 255 runs failed. The failure generally is: ``` Failed === RUN TestLogic_testserver_test_22_1_22_2 test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_24214293579 test_log_scope.go:79: use -show-logs to present logs inline logic.go:3045: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/7181/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-fastbuild/bin/pkg/sql/logictest/tests/cockroach-go-testserver-22.1-22.2/cockroach-go-testserver-22_1-22_2_test_/cockroach-go-testserver-22_1-22_2_test.runfiles/com_github_cockroachdb_cockroach/pkg/sql/logictest/testdata/logic_test/testserver_test_22.1_22.2:13: error while processing logic.go:3045: init did not finish for node 1 ``` Jira issue: CRDB-21892
1.0
logictest: mixed-version testserver tests are too flaky - According to the stats on https://teamcity.cockroachdb.com/test/2967917534255592156?currentProjectId=Cockroach_Ci_TestsGcpLinuxX8664BigVm&branch=&expandTestHistoryChartSection=true, 98 of the last 255 runs failed. The failure generally is: ``` Failed === RUN TestLogic_testserver_test_22_1_22_2 test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_24214293579 test_log_scope.go:79: use -show-logs to present logs inline logic.go:3045: /home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/7181/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-fastbuild/bin/pkg/sql/logictest/tests/cockroach-go-testserver-22.1-22.2/cockroach-go-testserver-22_1-22_2_test_/cockroach-go-testserver-22_1-22_2_test.runfiles/com_github_cockroachdb_cockroach/pkg/sql/logictest/testdata/logic_test/testserver_test_22.1_22.2:13: error while processing logic.go:3045: init did not finish for node 1 ``` Jira issue: CRDB-21892
non_priority
logictest mixed version testserver tests are too flaky according to the stats on of the last runs failed the failure generally is failed run testlogic testserver test test log scope go test logs captured to artifacts tmp tmp logtestlogic testserver test test log scope go use show logs to present logs inline logic go home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out fastbuild bin pkg sql logictest tests cockroach go testserver cockroach go testserver test cockroach go testserver test runfiles com github cockroachdb cockroach pkg sql logictest testdata logic test testserver test error while processing logic go init did not finish for node jira issue crdb
0
219,863
16,853,750,271
IssuesEvent
2021-06-21 01:25:43
irods/irods
https://api.github.com/repos/irods/irods
closed
Codespell report for "iRODS" (on fossies.org)
bug documentation
The FOSS server [fossies.org](https://fossies.org) - supporting also the [iRODS](https://fossies.org/iRODS) project - offers among others a feature named "[Source code misspelling reports](https://fossies.org/features.html#codespell)". Such reports are normally only generated on request, but as Fossies administrator I have just created for testing purposes such a [codespell](https://github.com/codespell-project/codespell) based analysis for the iRODS GitHub "master" version: &nbsp;https://fossies.org/linux/test/irods-master.tar.gz/codespell.html That version independent URL hopefully always redirects to the report for the latest "master" version identified by the short GitHub commit ID and a year-month-day string (YYMMDD) representing the according git pull date (mostly = commit date). The data are residing within a special restricted "test" folder that isn't really integrated into the standard Fossies services and should also not be accessible to search engines. The report should be available at least for some weeks and is continuously updated (currently with a half-hourly refresh rate). Although after a first review some obviously wrong matches ("False Positives") are already filtered out (ignored) please inform me if you find more of them so that I can exclude them if applicable. OK, no errors were found in the code itself and most errors are "only" in comments and are therefore not directly visible and relevant to the user, but some are also in output strings. Particularly striking seemed to me the spelling of the variable [${langauge}](https://fossies.org/linux/test/irods-master.tar.gz/codespell.html#langauge). Just for information there are also three supplemental pages showing some used "codespell" [configuration details](https://fossies.org/linux/test/irods-master.tar.gz/codespell_conf.html), all obvious [false positives](https://fossies.org/linux/test/irods-master.tar.gz/codespell_fps.html) and an [misspelling history](https://fossies.org/linux/test/irods-master.tar.gz/codespell_hist.html) (log). Spelling corrections certainly have a low priority, but they may also contribute to the overall quality of a software project.
1.0
Codespell report for "iRODS" (on fossies.org) - The FOSS server [fossies.org](https://fossies.org) - supporting also the [iRODS](https://fossies.org/iRODS) project - offers among others a feature named "[Source code misspelling reports](https://fossies.org/features.html#codespell)". Such reports are normally only generated on request, but as Fossies administrator I have just created for testing purposes such a [codespell](https://github.com/codespell-project/codespell) based analysis for the iRODS GitHub "master" version: &nbsp;https://fossies.org/linux/test/irods-master.tar.gz/codespell.html That version independent URL hopefully always redirects to the report for the latest "master" version identified by the short GitHub commit ID and a year-month-day string (YYMMDD) representing the according git pull date (mostly = commit date). The data are residing within a special restricted "test" folder that isn't really integrated into the standard Fossies services and should also not be accessible to search engines. The report should be available at least for some weeks and is continuously updated (currently with a half-hourly refresh rate). Although after a first review some obviously wrong matches ("False Positives") are already filtered out (ignored) please inform me if you find more of them so that I can exclude them if applicable. OK, no errors were found in the code itself and most errors are "only" in comments and are therefore not directly visible and relevant to the user, but some are also in output strings. Particularly striking seemed to me the spelling of the variable [${langauge}](https://fossies.org/linux/test/irods-master.tar.gz/codespell.html#langauge). Just for information there are also three supplemental pages showing some used "codespell" [configuration details](https://fossies.org/linux/test/irods-master.tar.gz/codespell_conf.html), all obvious [false positives](https://fossies.org/linux/test/irods-master.tar.gz/codespell_fps.html) and an [misspelling history](https://fossies.org/linux/test/irods-master.tar.gz/codespell_hist.html) (log). Spelling corrections certainly have a low priority, but they may also contribute to the overall quality of a software project.
non_priority
codespell report for irods on fossies org the foss server supporting also the project offers among others a feature named such reports are normally only generated on request but as fossies administrator i have just created for testing purposes such a based analysis for the irods github master version nbsp that version independent url hopefully always redirects to the report for the latest master version identified by the short github commit id and a year month day string yymmdd representing the according git pull date mostly commit date the data are residing within a special restricted test folder that isn t really integrated into the standard fossies services and should also not be accessible to search engines the report should be available at least for some weeks and is continuously updated currently with a half hourly refresh rate although after a first review some obviously wrong matches false positives are already filtered out ignored please inform me if you find more of them so that i can exclude them if applicable ok no errors were found in the code itself and most errors are only in comments and are therefore not directly visible and relevant to the user but some are also in output strings particularly striking seemed to me the spelling of the variable just for information there are also three supplemental pages showing some used codespell all obvious and an log spelling corrections certainly have a low priority but they may also contribute to the overall quality of a software project
0
90,108
25,977,413,018
IssuesEvent
2022-12-19 15:54:29
GoogleContainerTools/skaffold
https://api.github.com/repos/GoogleContainerTools/skaffold
closed
Deploy might not work properly warning while building an image
area/build priority/p2 kind/friction
### Expected behavior There should not be any "deploy" related warnings if Kubernetes context is not relevant. Alternatively I expect an option to suppress such warnings. ### Actual behavior I get the following on `skaffold build`: ``` time="2022-10-22T14:40:11Z" level=warning msg="unable to get the kubectl context's namespace - deploy might not work properly!" subtask=-1 task=DevLoop ``` https://github.com/GoogleContainerTools/skaffold/pull/7965 assumes I do have a configured namespace in the current context. But I don't even have `kubectl` installed in that environment. ### Information - Skaffold version: 2.0.0 - Operating system: MacOS 12.4 - Installed via: `storage.googleapis.com/skaffold/releases/v2.0.0` - Contents of skaffold.yaml: ```yaml apiVersion: skaffold/v3 kind: Config build: artifacts: - image: quay.io/org/project context: ./docker/project docker: dockerfile: Dockerfile tagPolicy: customTemplate: template: prefix-{{.INPUT_DIGEST}} local: useBuildkit: false ``` ### Steps to reproduce the behavior 1. Prepare `skaffold.yaml` 2. Remove `kubectl` from the PATH 3. Execute `skaffold build`
1.0
Deploy might not work properly warning while building an image - ### Expected behavior There should not be any "deploy" related warnings if Kubernetes context is not relevant. Alternatively I expect an option to suppress such warnings. ### Actual behavior I get the following on `skaffold build`: ``` time="2022-10-22T14:40:11Z" level=warning msg="unable to get the kubectl context's namespace - deploy might not work properly!" subtask=-1 task=DevLoop ``` https://github.com/GoogleContainerTools/skaffold/pull/7965 assumes I do have a configured namespace in the current context. But I don't even have `kubectl` installed in that environment. ### Information - Skaffold version: 2.0.0 - Operating system: MacOS 12.4 - Installed via: `storage.googleapis.com/skaffold/releases/v2.0.0` - Contents of skaffold.yaml: ```yaml apiVersion: skaffold/v3 kind: Config build: artifacts: - image: quay.io/org/project context: ./docker/project docker: dockerfile: Dockerfile tagPolicy: customTemplate: template: prefix-{{.INPUT_DIGEST}} local: useBuildkit: false ``` ### Steps to reproduce the behavior 1. Prepare `skaffold.yaml` 2. Remove `kubectl` from the PATH 3. Execute `skaffold build`
non_priority
deploy might not work properly warning while building an image expected behavior there should not be any deploy related warnings if kubernetes context is not relevant alternatively i expect an option to suppress such warnings actual behavior i get the following on skaffold build time level warning msg unable to get the kubectl context s namespace deploy might not work properly subtask task devloop assumes i do have a configured namespace in the current context but i don t even have kubectl installed in that environment information skaffold version operating system macos installed via storage googleapis com skaffold releases contents of skaffold yaml yaml apiversion skaffold kind config build artifacts image quay io org project context docker project docker dockerfile dockerfile tagpolicy customtemplate template prefix input digest local usebuildkit false steps to reproduce the behavior prepare skaffold yaml remove kubectl from the path execute skaffold build
0
7,089
16,494,742,023
IssuesEvent
2021-05-25 09:05:50
RasaHQ/rasa
https://api.github.com/repos/RasaHQ/rasa
closed
Prototype Rasa 3.0 Architecture
area:rasa-oss :ferris_wheel: feature:rasa-3.0/architecture-prototype type:enhancement :sparkles:
Following on from discussions about a new Rasa OS architecture for 3.0: - [Initial concept](https://www.notion.so/rasa/Rasa-Project-26915237c1c74d578af4a44f0df95755) - [Discussion of current problems](https://www.notion.so/rasa/Rasa-Open-Source-Architecture-Sync-62f864267188476d9108cdeab2b6a5c3) - [Exploration of related frameworks](https://www.notion.so/rasa/Workflow-Frameworks-Comparison-429eb61f58184be9b0da0280409ceec1#4bd180db123b43e69996cf658935706e) We would like to build a prototype to assess the new proposed graph architecture. ## Functionality ### Must have: * train NLU only based on current model config * train entire model (core + NLU) based on current model config (including e2e) * load and persist model * do action predictions * implement caching / fingerprinting for training * users are able to speak to model via input channel (only the entire model, not NLU-only) ### Nice to have: * extract + deduplicate policy featurization ### Don't need: * `rasa test` , `rasa interactive` ## Implementation details Following on from a "protoprototype" we have decided to use [Dask](https://dask.org/) for the prototype. Dask allows for lightweight task graphs to be created and then run on arbitrary backends (e.g. single thread, multi-process, distributed cluster). It also includes a huge amount of plug and play functionality which can all be used optionally. It seems to fit the balance of providing a lot of useful hard-to-do functionality, but not being too heavyweight or opinionated. Rather than being a full framework, it is a collection of useful related utilities. ## TODO - [x] Prototype for the prototype. Initial sanity check and exploration to determine whether a full prototype is possible. - [x] [Train NLU model](https://github.com/RasaHQ/rasa/issues/8408) - [ ] [Derive training graph from current NLU config](https://github.com/RasaHQ/rasa/issues/8409) - [ ] [Train entire model](https://github.com/RasaHQ/rasa/issues/8410) - [ ] [Make action predictions with graph model](https://github.com/RasaHQ/rasa/issues/8412) - [ ] [Derive training graph from current model config](https://github.com/RasaHQ/rasa/issues/8411) - [ ] [Derive prediction graph from training graph or current config format](https://github.com/RasaHQ/rasa/issues/8414) - [ ] [Persist and load model trained from graph](https://github.com/RasaHQ/rasa/issues/8404) - [ ] [Implement caching / fingerprinting for training](https://github.com/RasaHQ/rasa/issues/8405) - [ ] [Integrate graph model in server](https://github.com/RasaHQ/rasa/issues/8406) - [ ] [Test with realistic dataset](https://github.com/RasaHQ/rasa/issues/8488) - [ ] [Explore partial dataset loading for NLU graph](https://github.com/RasaHQ/rasa/issues/8407) (Thomas) ## Time estimation: 4 weeks
1.0
Prototype Rasa 3.0 Architecture - Following on from discussions about a new Rasa OS architecture for 3.0: - [Initial concept](https://www.notion.so/rasa/Rasa-Project-26915237c1c74d578af4a44f0df95755) - [Discussion of current problems](https://www.notion.so/rasa/Rasa-Open-Source-Architecture-Sync-62f864267188476d9108cdeab2b6a5c3) - [Exploration of related frameworks](https://www.notion.so/rasa/Workflow-Frameworks-Comparison-429eb61f58184be9b0da0280409ceec1#4bd180db123b43e69996cf658935706e) We would like to build a prototype to assess the new proposed graph architecture. ## Functionality ### Must have: * train NLU only based on current model config * train entire model (core + NLU) based on current model config (including e2e) * load and persist model * do action predictions * implement caching / fingerprinting for training * users are able to speak to model via input channel (only the entire model, not NLU-only) ### Nice to have: * extract + deduplicate policy featurization ### Don't need: * `rasa test` , `rasa interactive` ## Implementation details Following on from a "protoprototype" we have decided to use [Dask](https://dask.org/) for the prototype. Dask allows for lightweight task graphs to be created and then run on arbitrary backends (e.g. single thread, multi-process, distributed cluster). It also includes a huge amount of plug and play functionality which can all be used optionally. It seems to fit the balance of providing a lot of useful hard-to-do functionality, but not being too heavyweight or opinionated. Rather than being a full framework, it is a collection of useful related utilities. ## TODO - [x] Prototype for the prototype. Initial sanity check and exploration to determine whether a full prototype is possible. - [x] [Train NLU model](https://github.com/RasaHQ/rasa/issues/8408) - [ ] [Derive training graph from current NLU config](https://github.com/RasaHQ/rasa/issues/8409) - [ ] [Train entire model](https://github.com/RasaHQ/rasa/issues/8410) - [ ] [Make action predictions with graph model](https://github.com/RasaHQ/rasa/issues/8412) - [ ] [Derive training graph from current model config](https://github.com/RasaHQ/rasa/issues/8411) - [ ] [Derive prediction graph from training graph or current config format](https://github.com/RasaHQ/rasa/issues/8414) - [ ] [Persist and load model trained from graph](https://github.com/RasaHQ/rasa/issues/8404) - [ ] [Implement caching / fingerprinting for training](https://github.com/RasaHQ/rasa/issues/8405) - [ ] [Integrate graph model in server](https://github.com/RasaHQ/rasa/issues/8406) - [ ] [Test with realistic dataset](https://github.com/RasaHQ/rasa/issues/8488) - [ ] [Explore partial dataset loading for NLU graph](https://github.com/RasaHQ/rasa/issues/8407) (Thomas) ## Time estimation: 4 weeks
non_priority
prototype rasa architecture following on from discussions about a new rasa os architecture for we would like to build a prototype to assess the new proposed graph architecture functionality must have train nlu only based on current model config train entire model core nlu based on current model config including load and persist model do action predictions implement caching fingerprinting for training users are able to speak to model via input channel only the entire model not nlu only nice to have extract deduplicate policy featurization don t need rasa test rasa interactive implementation details following on from a protoprototype we have decided to use for the prototype dask allows for lightweight task graphs to be created and then run on arbitrary backends e g single thread multi process distributed cluster it also includes a huge amount of plug and play functionality which can all be used optionally it seems to fit the balance of providing a lot of useful hard to do functionality but not being too heavyweight or opinionated rather than being a full framework it is a collection of useful related utilities todo prototype for the prototype initial sanity check and exploration to determine whether a full prototype is possible thomas time estimation weeks
0