Unnamed: 0 int64 0 832k | id float64 2.49B 32.1B | type stringclasses 1
value | created_at stringlengths 19 19 | repo stringlengths 5 112 | repo_url stringlengths 34 141 | action stringclasses 3
values | title stringlengths 1 1k | labels stringlengths 4 1.38k | body stringlengths 1 262k | index stringclasses 16
values | text_combine stringlengths 96 262k | label stringclasses 2
values | text stringlengths 96 252k | binary_label int64 0 1 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
183,130 | 6,677,462,769 | IssuesEvent | 2017-10-05 10:33:27 | WordPress/gutenberg | https://api.github.com/repos/WordPress/gutenberg | closed | Internet Explorer 11: all the SVG icons are focusable | Accessibility Browser Issues Priority High | IE 11 suffers from a bug where all SVG icons _inside focusable elements_ default to `focusable=โtrueโ`. As a consequence, both the wrapper focusable element _and_ the inner SVG get focus and create a tab stop.
This is new to me (not a great SVG expert here) but seems to be a well known bug. More details, for example, here: http://simplyaccessible.com/article/7-solutions-svgs/#acc-heading-4
I've reproduced this behavior testing with IE 11 on all the controls that use SVG icons, for example the ones highlighted in the screenshot below:

This is very annoying because, when using a keyboard, users have to tab twice to navigate content every time they encounter a control with a SVG icon.
I haven't been able to reproduce in Edge, where everything seems to work fine, but some more testing would be nice.
Seems the recommended fix is to add `focusable="false"` to the SVGs, but maybe worth researching if there are other, less intrusive, fixes. | 1.0 | Internet Explorer 11: all the SVG icons are focusable - IE 11 suffers from a bug where all SVG icons _inside focusable elements_ default to `focusable=โtrueโ`. As a consequence, both the wrapper focusable element _and_ the inner SVG get focus and create a tab stop.
This is new to me (not a great SVG expert here) but seems to be a well known bug. More details, for example, here: http://simplyaccessible.com/article/7-solutions-svgs/#acc-heading-4
I've reproduced this behavior testing with IE 11 on all the controls that use SVG icons, for example the ones highlighted in the screenshot below:

This is very annoying because, when using a keyboard, users have to tab twice to navigate content every time they encounter a control with a SVG icon.
I haven't been able to reproduce in Edge, where everything seems to work fine, but some more testing would be nice.
Seems the recommended fix is to add `focusable="false"` to the SVGs, but maybe worth researching if there are other, less intrusive, fixes. | priority | internet explorer all the svg icons are focusable ie suffers from a bug where all svg icons inside focusable elements default to focusable โtrueโ as a consequence both the wrapper focusable element and the inner svg get focus and create a tab stop this is new to me not a great svg expert here but seems to be a well known bug more details for example here i ve reproduced this behavior testing with ie on all the controls that use svg icons for example the ones highlighted in the screenshot below this is very annoying because when using a keyboard users have to tab twice to navigate content every time they encounter a control with a svg icon i haven t been able to reproduce in edge where everything seems to work fine but some more testing would be nice seems the recommended fix is to add focusable false to the svgs but maybe worth researching if there are other less intrusive fixes | 1 |
210,371 | 16,098,094,656 | IssuesEvent | 2021-04-27 05:02:27 | rancher/rancher | https://api.github.com/repos/rancher/rancher | opened | RKE2 Provisioning: Cluster Options - CNI - Canal | [zube]: To Test area/rke2 | Canal as a CNI Option
```
apiVersion: provisioning.cattle.io/v1
kind: Cluster
metadata:
name: #string
annotations:
{}
# key: string
labels:
{}
# key: string
namespace: fleet-default
spec:
cloudCredentialSecretName: do
kubernetesVersion: v1.20.5+rke2r1
rkeConfig:
# cni: string
``` | 1.0 | RKE2 Provisioning: Cluster Options - CNI - Canal - Canal as a CNI Option
```
apiVersion: provisioning.cattle.io/v1
kind: Cluster
metadata:
name: #string
annotations:
{}
# key: string
labels:
{}
# key: string
namespace: fleet-default
spec:
cloudCredentialSecretName: do
kubernetesVersion: v1.20.5+rke2r1
rkeConfig:
# cni: string
``` | non_priority | provisioning cluster options cni canal canal as a cni option apiversion provisioning cattle io kind cluster metadata name string annotations key string labels key string namespace fleet default spec cloudcredentialsecretname do kubernetesversion rkeconfig cni string | 0 |
134,692 | 10,927,151,824 | IssuesEvent | 2019-11-22 16:06:00 | LiskHQ/lisk-sdk | https://api.github.com/repos/LiskHQ/lisk-sdk | closed | Add more test coverage for logic that uses delegateMinHeightActive value | type: test | ### Description
As a follow up to the #4473 we need to add missing unit and integration tests.
### Acceptance Criteria
- Add unit test coverage to DPoS module
- Add integration test coverage to DPoS module.
- Add unit test coverage to BFT module.
### Additional Information
| 1.0 | Add more test coverage for logic that uses delegateMinHeightActive value - ### Description
As a follow up to the #4473 we need to add missing unit and integration tests.
### Acceptance Criteria
- Add unit test coverage to DPoS module
- Add integration test coverage to DPoS module.
- Add unit test coverage to BFT module.
### Additional Information
| non_priority | add more test coverage for logic that uses delegateminheightactive value description as a follow up to the we need to add missing unit and integration tests acceptance criteria add unit test coverage to dpos module add integration test coverage to dpos module add unit test coverage to bft module additional information | 0 |
553,336 | 16,370,062,895 | IssuesEvent | 2021-05-15 00:22:20 | Roadhog360/Et-Futurum | https://api.github.com/repos/Roadhog360/Et-Futurum | closed | Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. | Enhancement Priority: High | Just as the Title says, Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. Because "blockCopper" is assumed by every single other Mod to be worth 9 Ingots, resulting in a super easy exploit.
This is only about the OreDict registration, the 4 Ingot Recipe can stay as long as the Block is not OreDicted as "blockCopper". | 1.0 | Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. - Just as the Title says, Copper Blocks should only be registered to the OreDict when the Config makes their Recipe worth 9 Ingots. Because "blockCopper" is assumed by every single other Mod to be worth 9 Ingots, resulting in a super easy exploit.
This is only about the OreDict registration, the 4 Ingot Recipe can stay as long as the Block is not OreDicted as "blockCopper". | priority | copper blocks should only be registered to the oredict when the config makes their recipe worth ingots just as the title says copper blocks should only be registered to the oredict when the config makes their recipe worth ingots because blockcopper is assumed by every single other mod to be worth ingots resulting in a super easy exploit this is only about the oredict registration the ingot recipe can stay as long as the block is not oredicted as blockcopper | 1 |
318,491 | 23,723,847,137 | IssuesEvent | 2022-08-30 17:39:43 | bloom-housing/bloom | https://api.github.com/repos/bloom-housing/bloom | closed | Add documentation of the translations process and string locations | Documentation | I expect this will be one of the most common sources of customization and changes, so I think we should invest in having good developer documentation for how to do it, since the actual work should be super straight-forward once you find all the files in the right places.
My initial vision in just a Markdown doc in the top-level docs directory, similar to my poorly-stubbed out Styling.MD, but I'm wide open to other options.
For extra credit, add useful content to Styling.MD too :) | 1.0 | Add documentation of the translations process and string locations - I expect this will be one of the most common sources of customization and changes, so I think we should invest in having good developer documentation for how to do it, since the actual work should be super straight-forward once you find all the files in the right places.
My initial vision in just a Markdown doc in the top-level docs directory, similar to my poorly-stubbed out Styling.MD, but I'm wide open to other options.
For extra credit, add useful content to Styling.MD too :) | non_priority | add documentation of the translations process and string locations i expect this will be one of the most common sources of customization and changes so i think we should invest in having good developer documentation for how to do it since the actual work should be super straight forward once you find all the files in the right places my initial vision in just a markdown doc in the top level docs directory similar to my poorly stubbed out styling md but i m wide open to other options for extra credit add useful content to styling md too | 0 |
263,837 | 8,302,336,805 | IssuesEvent | 2018-09-21 14:15:36 | ZeusWPI/MOZAIC | https://api.github.com/repos/ZeusWPI/MOZAIC | opened | Proxy server | difficulty:hard networking priority:medium | Create a proxy for MOZAIC connections. Basically, this would require creating some 'forwarding table', to which you'd add (match, destination) pairs.
You could then register your locally-running match with the proxy, so that your games can traverse NATs and whatnot.
| 1.0 | Proxy server - Create a proxy for MOZAIC connections. Basically, this would require creating some 'forwarding table', to which you'd add (match, destination) pairs.
You could then register your locally-running match with the proxy, so that your games can traverse NATs and whatnot.
| priority | proxy server create a proxy for mozaic connections basically this would require creating some forwarding table to which you d add match destination pairs you could then register your locally running match with the proxy so that your games can traverse nats and whatnot | 1 |
60,590 | 14,562,631,941 | IssuesEvent | 2020-12-17 00:32:12 | Dima2021/lodash | https://api.github.com/repos/Dima2021/lodash | opened | CVE-2017-16138 (High) detected in mime-1.2.11.tgz | security vulnerability | ## CVE-2017-16138 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mime-1.2.11.tgz</b></p></summary>
<p>A comprehensive library for mime-type mapping</p>
<p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p>
<p>Path to dependency file: lodash/package.json</p>
<p>Path to vulnerable library: lodash/node_modules/form-data/node_modules/mime/package.json</p>
<p>
Dependency Hierarchy:
- codecov.io-0.1.6.tgz (Root Library)
- request-2.42.0.tgz
- form-data-0.1.4.tgz
- :x: **mime-1.2.11.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/Dima2021/lodash/commits/50af7e310d557bae73ac2badb6ac6ecda0cebcb0">50af7e310d557bae73ac2badb6ac6ecda0cebcb0</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138>CVE-2017-16138</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution: 1.4.1,2.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mime","packageVersion":"1.2.11","isTransitiveDependency":true,"dependencyTree":"codecov.io:0.1.6;request:2.42.0;form-data:0.1.4;mime:1.2.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.1,2.0.3"}],"vulnerabilityIdentifier":"CVE-2017-16138","vulnerabilityDetails":"The mime module \u003c 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | True | CVE-2017-16138 (High) detected in mime-1.2.11.tgz - ## CVE-2017-16138 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>mime-1.2.11.tgz</b></p></summary>
<p>A comprehensive library for mime-type mapping</p>
<p>Library home page: <a href="https://registry.npmjs.org/mime/-/mime-1.2.11.tgz">https://registry.npmjs.org/mime/-/mime-1.2.11.tgz</a></p>
<p>Path to dependency file: lodash/package.json</p>
<p>Path to vulnerable library: lodash/node_modules/form-data/node_modules/mime/package.json</p>
<p>
Dependency Hierarchy:
- codecov.io-0.1.6.tgz (Root Library)
- request-2.42.0.tgz
- form-data-0.1.4.tgz
- :x: **mime-1.2.11.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://api.github.com/repos/Dima2021/lodash/commits/50af7e310d557bae73ac2badb6ac6ecda0cebcb0">50af7e310d557bae73ac2badb6ac6ecda0cebcb0</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
The mime module < 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.
<p>Publish Date: 2018-06-07
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138>CVE-2017-16138</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-16138</a></p>
<p>Release Date: 2018-06-07</p>
<p>Fix Resolution: 1.4.1,2.0.3</p>
</p>
</details>
<p></p>
<!-- <REMEDIATE>{"isOpenPROnVulnerability":true,"isPackageBased":true,"isDefaultBranch":true,"packages":[{"packageType":"javascript/Node.js","packageName":"mime","packageVersion":"1.2.11","isTransitiveDependency":true,"dependencyTree":"codecov.io:0.1.6;request:2.42.0;form-data:0.1.4;mime:1.2.11","isMinimumFixVersionAvailable":true,"minimumFixVersion":"1.4.1,2.0.3"}],"vulnerabilityIdentifier":"CVE-2017-16138","vulnerabilityDetails":"The mime module \u003c 1.4.1, 2.0.1, 2.0.2 is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input.","vulnerabilityUrl":"https://vuln.whitesourcesoftware.com/vulnerability/CVE-2017-16138","cvss3Severity":"high","cvss3Score":"7.5","cvss3Metrics":{"A":"High","AC":"Low","PR":"None","S":"Unchanged","C":"None","UI":"None","AV":"Network","I":"None"},"extraData":{}}</REMEDIATE> --> | non_priority | cve high detected in mime tgz cve high severity vulnerability vulnerable library mime tgz a comprehensive library for mime type mapping library home page a href path to dependency file lodash package json path to vulnerable library lodash node modules form data node modules mime package json dependency hierarchy codecov io tgz root library request tgz form data tgz x mime tgz vulnerable library found in head commit a href found in base branch master vulnerability details the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution isopenpronvulnerability true ispackagebased true isdefaultbranch true packages vulnerabilityidentifier cve vulnerabilitydetails the mime module is vulnerable to regular expression denial of service when a mime lookup is performed on untrusted user input vulnerabilityurl | 0 |
721,380 | 24,824,269,511 | IssuesEvent | 2022-10-25 19:09:16 | dnnsoftware/Dnn.Platform | https://api.github.com/repos/dnnsoftware/Dnn.Platform | closed | Cannot delete too many files at once in new Resource Manager | Type: Bug Area: Platform > Admin Modules Effort: Medium Priority: High Status: Ready for Development | ## Description of bug
When attempting to delete many files in the new Resource Manager, the UI does not allow for scrollable content.
## Steps to reproduce
1. Go to 'Site Assets' or `Global Assets`.
2. Upload a lot of files into the 'Images' folder.
3. Select a significant number of the files and click `Delete`.
4. See UI problem in screenshot below.
## Current behavior
The content is too tall for the page and the buttons are no longer viewable.
## Expected behavior
Content should be scrollable within the modal and limited to a percentage of the view height, allowing room for buttons.
## Screenshots

## Error information
n/a
## Additional context
n/a
## Affected version
* [ ] 10.00.00 alpha build
* [x] 09.11.00 release candidate
* [ ] 09.10.02 release candidate
* [ ] 09.10.01 latest supported release
## Affected browser
* [x] Chrome
* [x] Firefox
* [x] Safari
* [x] Internet Explorer 11
* [x] Microsoft Edge (Classic)
* [x] Microsoft Edge Chromium
| 1.0 | Cannot delete too many files at once in new Resource Manager - ## Description of bug
When attempting to delete many files in the new Resource Manager, the UI does not allow for scrollable content.
## Steps to reproduce
1. Go to 'Site Assets' or `Global Assets`.
2. Upload a lot of files into the 'Images' folder.
3. Select a significant number of the files and click `Delete`.
4. See UI problem in screenshot below.
## Current behavior
The content is too tall for the page and the buttons are no longer viewable.
## Expected behavior
Content should be scrollable within the modal and limited to a percentage of the view height, allowing room for buttons.
## Screenshots

## Error information
n/a
## Additional context
n/a
## Affected version
* [ ] 10.00.00 alpha build
* [x] 09.11.00 release candidate
* [ ] 09.10.02 release candidate
* [ ] 09.10.01 latest supported release
## Affected browser
* [x] Chrome
* [x] Firefox
* [x] Safari
* [x] Internet Explorer 11
* [x] Microsoft Edge (Classic)
* [x] Microsoft Edge Chromium
| priority | cannot delete too many files at once in new resource manager description of bug when attempting to delete many files in the new resource manager the ui does not allow for scrollable content steps to reproduce go to site assets or global assets upload a lot of files into the images folder select a significant number of the files and click delete see ui problem in screenshot below current behavior the content is too tall for the page and the buttons are no longer viewable expected behavior content should be scrollable within the modal and limited to a percentage of the view height allowing room for buttons screenshots error information n a additional context n a affected version alpha build release candidate release candidate latest supported release affected browser chrome firefox safari internet explorer microsoft edge classic microsoft edge chromium | 1 |
212,285 | 7,235,349,353 | IssuesEvent | 2018-02-13 00:14:10 | SmartlyDressedGames/Unturned-4.x-Community | https://api.github.com/repos/SmartlyDressedGames/Unturned-4.x-Community | closed | Recursive attachable slot search for T attachments view | Priority: High Status: Complete Type: Feature | Allow changing all attachments on the item in this view | 1.0 | Recursive attachable slot search for T attachments view - Allow changing all attachments on the item in this view | priority | recursive attachable slot search for t attachments view allow changing all attachments on the item in this view | 1 |
363,065 | 25,406,938,461 | IssuesEvent | 2022-11-22 15:56:13 | Orange-OpenSource/ods-ios | https://api.github.com/repos/Orange-OpenSource/ods-ios | opened | [Doc]: Text field documentation consistency | documentation | ### Documentation Location
https://orange-opensource.github.io/ods-ios/components/textSelection_docs
### Current issue
the side bar navigation and page title are not consistant
### Expected Correction
the "Text field" wording should be used everywhere
### Additional context
the file name should also be changed, but we need to update the DSM when this is pushed to production. | 1.0 | [Doc]: Text field documentation consistency - ### Documentation Location
https://orange-opensource.github.io/ods-ios/components/textSelection_docs
### Current issue
the side bar navigation and page title are not consistant
### Expected Correction
the "Text field" wording should be used everywhere
### Additional context
the file name should also be changed, but we need to update the DSM when this is pushed to production. | non_priority | text field documentation consistency documentation location current issue the side bar navigation and page title are not consistant expected correction the text field wording should be used everywhere additional context the file name should also be changed but we need to update the dsm when this is pushed to production | 0 |
226,204 | 17,316,896,085 | IssuesEvent | 2021-07-27 07:31:14 | Automattic/abacus | https://api.github.com/repos/Automattic/abacus | closed | Link wiki to code setup tab | [!priority] low [section] experiment overview [type] documentation | We discussed in our milestone planning meeting that we think it's a good idea to change the "code setup" tab to **simply link to the experimenter's guide** [writing code variants](https://github.com/Automattic/experimentation-platform/wiki/Experimenter's-Guide#writing-the-controlvariant-code-experiences) section. This will help clean up that tab, because we don't think many experimenters use it. We should make sure to open new tab when the tab is clicked (instead of redirecting current window). | 1.0 | Link wiki to code setup tab - We discussed in our milestone planning meeting that we think it's a good idea to change the "code setup" tab to **simply link to the experimenter's guide** [writing code variants](https://github.com/Automattic/experimentation-platform/wiki/Experimenter's-Guide#writing-the-controlvariant-code-experiences) section. This will help clean up that tab, because we don't think many experimenters use it. We should make sure to open new tab when the tab is clicked (instead of redirecting current window). | non_priority | link wiki to code setup tab we discussed in our milestone planning meeting that we think it s a good idea to change the code setup tab to simply link to the experimenter s guide section this will help clean up that tab because we don t think many experimenters use it we should make sure to open new tab when the tab is clicked instead of redirecting current window | 0 |
240,416 | 20,028,449,989 | IssuesEvent | 2022-02-02 00:49:34 | learnpack/learnpack | https://api.github.com/repos/learnpack/learnpack | closed | Positional argument | ๐ฅ unit-test ๐๐ฝ waiting-feedback | **Describe the bug**
A clear and concise description of what the bug is.
1. Positional argument was required (i.e. def hello_world(todos = todos): instead of just def hello_world(todos):)
I would say broadly otherwise, it was never explained how to check if basic flask functions like jsonify are working - how to test them in the console etc. Would be useful for determining if the error was my use of flask.jsonify() instead of flask.json.jsonify() or something along those lines.
**In what exercise**
If applicable, what exercise where you trying to complete?
05 - Returning JSON
**Screenshot**
If possible, add a screenshot of the error. You can use [awesome screenshot for free](https://www.awesomescreenshot.com/).
| 1.0 | Positional argument - **Describe the bug**
A clear and concise description of what the bug is.
1. Positional argument was required (i.e. def hello_world(todos = todos): instead of just def hello_world(todos):)
I would say broadly otherwise, it was never explained how to check if basic flask functions like jsonify are working - how to test them in the console etc. Would be useful for determining if the error was my use of flask.jsonify() instead of flask.json.jsonify() or something along those lines.
**In what exercise**
If applicable, what exercise where you trying to complete?
05 - Returning JSON
**Screenshot**
If possible, add a screenshot of the error. You can use [awesome screenshot for free](https://www.awesomescreenshot.com/).
| non_priority | positional argument describe the bug a clear and concise description of what the bug is positional argument was required i e def hello world todos todos instead of just def hello world todos i would say broadly otherwise it was never explained how to check if basic flask functions like jsonify are working how to test them in the console etc would be useful for determining if the error was my use of flask jsonify instead of flask json jsonify or something along those lines in what exercise if applicable what exercise where you trying to complete returning json screenshot if possible add a screenshot of the error you can use | 0 |
775,809 | 27,237,947,417 | IssuesEvent | 2023-02-21 17:44:56 | etternagame/etterna | https://api.github.com/repos/etternagame/etterna | opened | Replay playback slightly off by a tiny amount | Type: Bug Priority: Medium | 2 greats in playback, pfc in local and online replay
online playback is correct
https://etternaonline.com/song/view/103571#154228
https://etternaonline.com/score/view/Sdcbf00b32b1f08830b5985c1c70538dae09223e250483
https://www.youtube.com/watch?v=bcoWxVylsQI | 1.0 | Replay playback slightly off by a tiny amount - 2 greats in playback, pfc in local and online replay
online playback is correct
https://etternaonline.com/song/view/103571#154228
https://etternaonline.com/score/view/Sdcbf00b32b1f08830b5985c1c70538dae09223e250483
https://www.youtube.com/watch?v=bcoWxVylsQI | priority | replay playback slightly off by a tiny amount greats in playback pfc in local and online replay online playback is correct | 1 |
108,538 | 9,310,018,484 | IssuesEvent | 2019-03-25 17:45:57 | rancher/longhorn | https://api.github.com/repos/rancher/longhorn | opened | Add test case for invalid backup volume list in the manager | area/test | It's a follow up of https://github.com/rancher/longhorn/issues/399
We should mix healthy and failed backup volumes and make sure they work well with the manager API in the end. | 1.0 | Add test case for invalid backup volume list in the manager - It's a follow up of https://github.com/rancher/longhorn/issues/399
We should mix healthy and failed backup volumes and make sure they work well with the manager API in the end. | non_priority | add test case for invalid backup volume list in the manager it s a follow up of we should mix healthy and failed backup volumes and make sure they work well with the manager api in the end | 0 |
397,551 | 11,729,244,941 | IssuesEvent | 2020-03-10 19:00:33 | react-figma/react-figma | https://api.github.com/repos/react-figma/react-figma | closed | horizontalPadding/verticalPadding is not compatible with Yoga | complexity: medium priority: medium topic: figma api topic: yoga type: bug | Let's consider example:
```javascript
const NewComponent = createComponent();
export const App = () => {
return (
<Page name="New page" isCurrent>
<NewComponent.Component>
<View
layoutMode='HORIZONTAL'
horizontalPadding={4}
verticalPadding={1}
style={{
backgroundColor: '#EDF1F5'
}}
>
<Text
characters='testing'
/>
</View>
</NewComponent.Component>
</Page>
);
};
```
Component will have size that equal to text (37x14):
<img width="828" alt="Screenshot 2020-02-27 at 23 06 33" src="https://user-images.githubusercontent.com/1270648/75482419-df634900-59b5-11ea-8381-195006a24225.png">
| 1.0 | horizontalPadding/verticalPadding is not compatible with Yoga - Let's consider example:
```javascript
const NewComponent = createComponent();
export const App = () => {
return (
<Page name="New page" isCurrent>
<NewComponent.Component>
<View
layoutMode='HORIZONTAL'
horizontalPadding={4}
verticalPadding={1}
style={{
backgroundColor: '#EDF1F5'
}}
>
<Text
characters='testing'
/>
</View>
</NewComponent.Component>
</Page>
);
};
```
Component will have size that equal to text (37x14):
<img width="828" alt="Screenshot 2020-02-27 at 23 06 33" src="https://user-images.githubusercontent.com/1270648/75482419-df634900-59b5-11ea-8381-195006a24225.png">
| priority | horizontalpadding verticalpadding is not compatible with yoga let s consider example javascript const newcomponent createcomponent export const app return view layoutmode horizontal horizontalpadding verticalpadding style backgroundcolor text characters testing component will have size that equal to text img width alt screenshot at src | 1 |
237,834 | 7,767,107,230 | IssuesEvent | 2018-06-03 00:41:04 | martchellop/Entretenibit | https://api.github.com/repos/martchellop/Entretenibit | closed | Add the user click in the card | enhancement priority: high | When the user clicks in a card, a bigger card will show up in the middle of the screen and the background will be out of focus.
See #44 for more reference. | 1.0 | Add the user click in the card - When the user clicks in a card, a bigger card will show up in the middle of the screen and the background will be out of focus.
See #44 for more reference. | priority | add the user click in the card when the user clicks in a card a bigger card will show up in the middle of the screen and the background will be out of focus see for more reference | 1 |
36,234 | 5,039,670,815 | IssuesEvent | 2016-12-18 22:52:21 | red/red | https://api.github.com/repos/red/red | closed | Console crashes when `compose` used with `url!` as an argument to `write` | status.built status.tested type.bug | ```
red>> write http://abc.com compose []
*** Internal error: reserved for future use (or not yet implemented)
*** Where: write
```
But
```
red>> write http://abc.com compose [ {} {} ]
```
gives (in debug mode) -
```
*** Runtime Error 1: access violation
*** in file: /C/Users/ABC/Desktop/red/environment/console/datatypes/symbol.reds
*** at line: 137
***
*** stack: red/symbol/resolve 3514672
*** stack: red/url/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h *** stack: red/actions/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h
*** stack: red/actions/write* -1 -1 -1 -1 -1 -1 -1 -1
*** stack: red/interpreter/eval-arguments 0285B310h 0287C828h 0287C828h 00000000h 00000000h
*** stack: red/interpreter/eval-code 0285B310h 0287C7F8h 0287C828h false 00000000h 00000000h 0285B310h
*** stack: red/interpreter/eval-expression 0287C7F8h 0287C828h false false
*** stack: red/interpreter/eval 027C3B80h true
*** stack: red/natives/do* false -1
*** stack: red/interpreter/eval-arguments 0285B4D0h 0284EEB0h 0284EEB0h 00000000h 00000000h
*** stack: red/interpreter/eval-code 0285B4D0h 0284EEA0h 0284EEB0h true 00000000h 00000000h 0285B4D0h
*** stack: red/interpreter/eval-expression 0284EEA0h 0284EEB0h false true
*** stack: red/interpreter/eval-arguments 0285AA70h 0284EE90h 0284EEB0h 0284EE70h 0284EEC4h
*** stack: red/interpreter/eval-code 0285AA70h 0284EE80h 0284EEB0h true 0284EE70h 0284EEC4h 0285AA70h
*** stack: red/interpreter/eval-path 0284EE70h 0284EE80h 0284EEB0h false false false false
*** stack: red/interpreter/eval-expression 0284EE80h 0284EEB0h false false
*** stack: red/interpreter/eval 027C3B50h true
*** stack: red/natives/catch* true 1
*** stack: ctx253~try-do 0035CE0Ch
*** stack: red/_function/call 0283914Ch 0035CE0Ch
*** stack: red/interpreter/eval-code 0283914Ch 0284F574h 0284F5C4h true 00000000h 00000000h 0283914Ch
*** stack: red/interpreter/eval-expression 0284F564h 0284F5C4h false true
*** stack: red/interpreter/eval-arguments 0285AA70h 0284F554h 0284F5C4h 0284F534h 0284F5D8h
*** stack: red/interpreter/eval-code 0285AA70h 0284F544h 0284F5C4h true 0284F534h 0284F5D8h 0285AA70h
*** stack: red/interpreter/eval-path 0284F534h 0284F544h 0284F5C4h false false false false
*** stack: red/interpreter/eval-expression 0284F544h 0284F5C4h false false
*** stack: red/interpreter/eval 027C3AD0h true
*** stack: red/natives/unless* false
*** stack: red/interpreter/eval-arguments 0285B370h 0284F410h 0284F430h 00000000h 00000000h
*** stack: red/interpreter/eval-code 0285B370h 0284F3E0h 0284F430h false 00000000h 00000000h 0285B370h
*** stack: red/interpreter/eval-expression 0284F3E0h 0284F430h false false
*** stack: red/interpreter/eval 027C3AB0h true
*** stack: red/natives/do* true -1
*** stack: ctx253~eval-command 0035CE0Ch
*** stack: ctx253~run 0035CE0Ch
*** stack: ctx253~launch 0035CE0Ch
```
| 1.0 | Console crashes when `compose` used with `url!` as an argument to `write` - ```
red>> write http://abc.com compose []
*** Internal error: reserved for future use (or not yet implemented)
*** Where: write
```
But
```
red>> write http://abc.com compose [ {} {} ]
```
gives (in debug mode) -
```
*** Runtime Error 1: access violation
*** in file: /C/Users/ABC/Desktop/red/environment/console/datatypes/symbol.reds
*** at line: 137
***
*** stack: red/symbol/resolve 3514672
*** stack: red/url/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h *** stack: red/actions/write 027C3B90h 027C3BA0h false false false false 027C3B80h 027C3B80h 027C3B80h 027C3B80h
*** stack: red/actions/write* -1 -1 -1 -1 -1 -1 -1 -1
*** stack: red/interpreter/eval-arguments 0285B310h 0287C828h 0287C828h 00000000h 00000000h
*** stack: red/interpreter/eval-code 0285B310h 0287C7F8h 0287C828h false 00000000h 00000000h 0285B310h
*** stack: red/interpreter/eval-expression 0287C7F8h 0287C828h false false
*** stack: red/interpreter/eval 027C3B80h true
*** stack: red/natives/do* false -1
*** stack: red/interpreter/eval-arguments 0285B4D0h 0284EEB0h 0284EEB0h 00000000h 00000000h
*** stack: red/interpreter/eval-code 0285B4D0h 0284EEA0h 0284EEB0h true 00000000h 00000000h 0285B4D0h
*** stack: red/interpreter/eval-expression 0284EEA0h 0284EEB0h false true
*** stack: red/interpreter/eval-arguments 0285AA70h 0284EE90h 0284EEB0h 0284EE70h 0284EEC4h
*** stack: red/interpreter/eval-code 0285AA70h 0284EE80h 0284EEB0h true 0284EE70h 0284EEC4h 0285AA70h
*** stack: red/interpreter/eval-path 0284EE70h 0284EE80h 0284EEB0h false false false false
*** stack: red/interpreter/eval-expression 0284EE80h 0284EEB0h false false
*** stack: red/interpreter/eval 027C3B50h true
*** stack: red/natives/catch* true 1
*** stack: ctx253~try-do 0035CE0Ch
*** stack: red/_function/call 0283914Ch 0035CE0Ch
*** stack: red/interpreter/eval-code 0283914Ch 0284F574h 0284F5C4h true 00000000h 00000000h 0283914Ch
*** stack: red/interpreter/eval-expression 0284F564h 0284F5C4h false true
*** stack: red/interpreter/eval-arguments 0285AA70h 0284F554h 0284F5C4h 0284F534h 0284F5D8h
*** stack: red/interpreter/eval-code 0285AA70h 0284F544h 0284F5C4h true 0284F534h 0284F5D8h 0285AA70h
*** stack: red/interpreter/eval-path 0284F534h 0284F544h 0284F5C4h false false false false
*** stack: red/interpreter/eval-expression 0284F544h 0284F5C4h false false
*** stack: red/interpreter/eval 027C3AD0h true
*** stack: red/natives/unless* false
*** stack: red/interpreter/eval-arguments 0285B370h 0284F410h 0284F430h 00000000h 00000000h
*** stack: red/interpreter/eval-code 0285B370h 0284F3E0h 0284F430h false 00000000h 00000000h 0285B370h
*** stack: red/interpreter/eval-expression 0284F3E0h 0284F430h false false
*** stack: red/interpreter/eval 027C3AB0h true
*** stack: red/natives/do* true -1
*** stack: ctx253~eval-command 0035CE0Ch
*** stack: ctx253~run 0035CE0Ch
*** stack: ctx253~launch 0035CE0Ch
```
| non_priority | console crashes when compose used with url as an argument to write red write compose internal error reserved for future use or not yet implemented where write but red write compose gives in debug mode runtime error access violation in file c users abc desktop red environment console datatypes symbol reds at line stack red symbol resolve stack red url write false false false false stack red actions write false false false false stack red actions write stack red interpreter eval arguments stack red interpreter eval code false stack red interpreter eval expression false false stack red interpreter eval true stack red natives do false stack red interpreter eval arguments stack red interpreter eval code true stack red interpreter eval expression false true stack red interpreter eval arguments stack red interpreter eval code true stack red interpreter eval path false false false false stack red interpreter eval expression false false stack red interpreter eval true stack red natives catch true stack try do stack red function call stack red interpreter eval code true stack red interpreter eval expression false true stack red interpreter eval arguments stack red interpreter eval code true stack red interpreter eval path false false false false stack red interpreter eval expression false false stack red interpreter eval true stack red natives unless false stack red interpreter eval arguments stack red interpreter eval code false stack red interpreter eval expression false false stack red interpreter eval true stack red natives do true stack eval command stack run stack launch | 0 |
139,132 | 31,241,553,876 | IssuesEvent | 2023-08-20 23:09:56 | SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf | https://api.github.com/repos/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf | opened | Code Security Report: 90 high severity findings, 168 total findings | Mend: code security findings | # Code Security Report
### Scan Metadata
**Latest Scan:** 2023-08-20 11:07pm
**Total Findings:** 168 | **New Findings:** 0 | **Resolved Findings:** 0
**Tested Project Files:** 3
**Detected Programming Languages:** 1 (Java*)
<!-- SAST-MANUAL-SCAN-START -->
- [ ] Check this box to manually trigger a scan
<!-- SAST-MANUAL-SCAN-END -->
### Most Relevant Findings
> The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/92ccbcba-2f80-4d2d-a448-ff078ff4f884/details).
<table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L194-L199
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L188
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1178-L1183
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1163
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L194-L199
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L188
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1178-L1183
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1163
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225-L1230
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1215
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy 2.java:721](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L721)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L716-L721
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L714
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy 2.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225-L1230
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1215
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings.java:696](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L696)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L691-L696
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L685
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy 2.java:744](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L744)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L739-L744
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L738
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:172](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L167-L172
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L166
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr></tbody></table>
### Findings Overview
| Severity | Vulnerability Type | CWE | Language | Count |
|-|-|-|-|-|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Java*|9|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Command Injection|[CWE-78](https://cwe.mitre.org/data/definitions/78.html)|Java*|27|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|12|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Expression Language Injection|[CWE-917](https://cwe.mitre.org/data/definitions/917.html)|Java*|12|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Unsafe Format String|[CWE-134](https://cwe.mitre.org/data/definitions/134.html)|Java*|6|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|9|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|15|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Trust Boundary Violation|[CWE-501](https://cwe.mitre.org/data/definitions/501.html)|Java*|3|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Insecure Cryptographic Algorithm|[CWE-327](https://cwe.mitre.org/data/definitions/327.html)|Java*|21|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|21|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Improper Verification of JWT Signature|[CWE-347](https://cwe.mitre.org/data/definitions/347.html)|Java*|12|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|9|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|LDAP Injection|[CWE-90](https://cwe.mitre.org/data/definitions/90.html)|Java*|3|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|HTTP Header Injection|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|Java*|3|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|6|
| 1.0 | Code Security Report: 90 high severity findings, 168 total findings - # Code Security Report
### Scan Metadata
**Latest Scan:** 2023-08-20 11:07pm
**Total Findings:** 168 | **New Findings:** 0 | **Resolved Findings:** 0
**Tested Project Files:** 3
**Detected Programming Languages:** 1 (Java*)
<!-- SAST-MANUAL-SCAN-START -->
- [ ] Check this box to manually trigger a scan
<!-- SAST-MANUAL-SCAN-END -->
### Most Relevant Findings
> The below list presents the 10 most relevant findings that need your attention. To view information on the remaining findings, navigate to the [Mend SAST Application](https://dev.whitesourcesoftware.com/sast/#/scans/92ccbcba-2f80-4d2d-a448-ff078ff4f884/details).
<table role='table'><thead><tr><th>Severity</th><th>Vulnerability Type</th><th>CWE</th><th>File</th><th>Data Flows</th><th>Date</th></tr></thead><tbody><tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L194-L199
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L188
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L199
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1178-L1183
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1163
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L1183
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:199](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L194-L199
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L188
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L199
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:1183](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1178-L1183
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1163
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1167
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1179
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1183
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225-L1230
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1215
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L1230
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy 2.java:721](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L721)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L716-L721
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L714
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy 2.java:1230](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225-L1230
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1215
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1219
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1225
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L1230
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings.java:696](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L696)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L691-L696
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings.java#L685
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy 2.java:744](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L744)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L739-L744
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy 2.java#L738
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr><tr><td colspan='6'> </td></tr>
<tr><td><a href='#'><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20></a> High</td><td>Command Injection</td><td>
[CWE-78](https://cwe.mitre.org/data/definitions/78.html)
</td><td>
[60Findings copy.java:172](https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172)
</td><td>1</td><td>2023-08-20 11:09pm</td></tr><tr><td colspan='6'><details><summary><a href='#'><img src='https://saas.mend.io/sast/favicon.png' width=15 height=15></a> Vulnerable Code</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L167-L172
<details>
<summary>1 Data Flow/s detected</summary></br>
<details>
<summary>View Data Flow 1</summary>
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L166
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172
https://github.com/SAST-OldPlatform-DEV/SAST-Test-Repo-1e2b0c79-1082-443e-89bb-c3d57c2612bf/blob/6345003bba2e05288a172a042e3f41ca0f5a9ad1/60Findings copy.java#L172
</details>
</details>
</details>
<details>
<summary><a href='#'><img src='https://integration-api.securecodewarrior.com/explorer/favicon-32x32.png' width=15 height=15></a> Secure Code Warrior Training Material</summary>
<ul><li>Training<ul><li>
[Secure Code Warrior Command Injection Training](https://portal.securecodewarrior.com/?utm_source=partner-integration:mend&partner_id=mend#/contextual-microlearning/web/injection/oscmd/java/vanilla)</li>
</ul></li>
<li>Videos<ul><li>
[Secure Code Warrior Command Injection Video](https://media.securecodewarrior.com/OS+Command+Injections_v2.mp4)</li>
</ul></li>
<li>Further Reading<ul><li>
[OWASP testing for Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013))</li>
<li>
[OWASP Command Injection](https://owasp.org/www-community/attacks/Command_Injection)</li>
</ul></li>
</ul>
</details>
</td></tr></tbody></table>
### Findings Overview
| Severity | Vulnerability Type | CWE | Language | Count |
|-|-|-|-|-|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Cross-Site Scripting|[CWE-79](https://cwe.mitre.org/data/definitions/79.html)|Java*|9|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Command Injection|[CWE-78](https://cwe.mitre.org/data/definitions/78.html)|Java*|27|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Path/Directory Traversal|[CWE-22](https://cwe.mitre.org/data/definitions/22.html)|Java*|12|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Expression Language Injection|[CWE-917](https://cwe.mitre.org/data/definitions/917.html)|Java*|12|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Unsafe Format String|[CWE-134](https://cwe.mitre.org/data/definitions/134.html)|Java*|6|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|SQL Injection|[CWE-89](https://cwe.mitre.org/data/definitions/89.html)|Java*|9|
|<img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png?' width=19 height=20> High|Deserialization of Untrusted Data|[CWE-502](https://cwe.mitre.org/data/definitions/502.html)|Java*|15|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Trust Boundary Violation|[CWE-501](https://cwe.mitre.org/data/definitions/501.html)|Java*|3|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Insecure Cryptographic Algorithm|[CWE-327](https://cwe.mitre.org/data/definitions/327.html)|Java*|21|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Hardcoded Password/Credentials|[CWE-798](https://cwe.mitre.org/data/definitions/798.html)|Java*|21|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Improper Verification of JWT Signature|[CWE-347](https://cwe.mitre.org/data/definitions/347.html)|Java*|12|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|Error Messages Information Exposure|[CWE-209](https://cwe.mitre.org/data/definitions/209.html)|Java*|9|
|<img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium|LDAP Injection|[CWE-90](https://cwe.mitre.org/data/definitions/90.html)|Java*|3|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|HTTP Header Injection|[CWE-113](https://cwe.mitre.org/data/definitions/113.html)|Java*|3|
|<img src='https://whitesource-resources.whitesourcesoftware.com/low_vul.png?' width=19 height=20> Low|Weak Hash Strength|[CWE-328](https://cwe.mitre.org/data/definitions/328.html)|Java*|6|
| non_priority | code security report high severity findings total findings code security report scan metadata latest scan total findings new findings resolved findings tested project files detected programming languages java check this box to manually trigger a scan most relevant findings the below list presents the most relevant findings that need your attention to view information on the remaining findings navigate to the severity vulnerability type cwe file data flows date high command injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high command injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java copy java copy java copy java copy java secure code warrior training material training videos further reading nbsp high command injection vulnerable code data flow s detected view data flow secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java secure code warrior training material training videos further reading nbsp high command injection copy java vulnerable code copy java data flow s detected view data flow copy java copy java copy java copy java secure code warrior training material training videos further reading findings overview severity vulnerability type cwe language count high cross site scripting high command injection high path directory traversal high expression language injection high unsafe format string high sql injection high deserialization of untrusted data medium trust boundary violation medium insecure cryptographic algorithm medium hardcoded password credentials medium improper verification of jwt signature medium error messages information exposure medium ldap injection low http header injection low weak hash strength | 0 |
107,856 | 16,762,433,188 | IssuesEvent | 2021-06-14 02:01:15 | atlslscsrv-app/https-net-atlsecsrv-org.github.io-dev.azure.portal.dashboard- | https://api.github.com/repos/atlslscsrv-app/https-net-atlsecsrv-org.github.io-dev.azure.portal.dashboard- | opened | CVE-2019-13173 (High) detected in fstream-0.1.31.tgz, fstream-1.0.11.tgz | security vulnerability | ## CVE-2019-13173 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>fstream-0.1.31.tgz</b>, <b>fstream-1.0.11.tgz</b></p></summary>
<p>
<details><summary><b>fstream-0.1.31.tgz</b></p></summary>
<p>Advanced file system stream things</p>
<p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz">https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/fstream/package.json</p>
<p>
Dependency Hierarchy:
- unzip-0.1.11.tgz (Root Library)
- :x: **fstream-0.1.31.tgz** (Vulnerable Library)
</details>
<details><summary><b>fstream-1.0.11.tgz</b></p></summary>
<p>Advanced file system stream things</p>
<p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz">https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/unzipper/node_modules/fstream/package.json</p>
<p>
Dependency Hierarchy:
- unzipper-0.9.2.tgz (Root Library)
- :x: **fstream-1.0.11.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
<p>Publish Date: 2019-07-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173>CVE-2019-13173</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173</a></p>
<p>Release Date: 2019-07-02</p>
<p>Fix Resolution: 1.0.12</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2019-13173 (High) detected in fstream-0.1.31.tgz, fstream-1.0.11.tgz - ## CVE-2019-13173 - High Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Libraries - <b>fstream-0.1.31.tgz</b>, <b>fstream-1.0.11.tgz</b></p></summary>
<p>
<details><summary><b>fstream-0.1.31.tgz</b></p></summary>
<p>Advanced file system stream things</p>
<p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz">https://registry.npmjs.org/fstream/-/fstream-0.1.31.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/fstream/package.json</p>
<p>
Dependency Hierarchy:
- unzip-0.1.11.tgz (Root Library)
- :x: **fstream-0.1.31.tgz** (Vulnerable Library)
</details>
<details><summary><b>fstream-1.0.11.tgz</b></p></summary>
<p>Advanced file system stream things</p>
<p>Library home page: <a href="https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz">https://registry.npmjs.org/fstream/-/fstream-1.0.11.tgz</a></p>
<p>Path to dependency file: /tmp/ws-scm/security-alerts-atlslscsrv.app/package.json</p>
<p>Path to vulnerable library: /tmp/ws-scm/security-alerts-atlslscsrv.app/node_modules/unzipper/node_modules/fstream/package.json</p>
<p>
Dependency Hierarchy:
- unzipper-0.9.2.tgz (Root Library)
- :x: **fstream-1.0.11.tgz** (Vulnerable Library)
</details>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/high_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
fstream before 1.0.12 is vulnerable to Arbitrary File Overwrite. Extracting tarballs containing a hardlink to a file that already exists in the system, and a file that matches the hardlink, will overwrite the system's file with the contents of the extracted file. The fstream.DirWriter() function is vulnerable.
<p>Publish Date: 2019-07-02
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2019-13173>CVE-2019-13173</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>7.5</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173">https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13173</a></p>
<p>Release Date: 2019-07-02</p>
<p>Fix Resolution: 1.0.12</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve high detected in fstream tgz fstream tgz cve high severity vulnerability vulnerable libraries fstream tgz fstream tgz fstream tgz advanced file system stream things library home page a href path to dependency file tmp ws scm security alerts atlslscsrv app package json path to vulnerable library tmp ws scm security alerts atlslscsrv app node modules fstream package json dependency hierarchy unzip tgz root library x fstream tgz vulnerable library fstream tgz advanced file system stream things library home page a href path to dependency file tmp ws scm security alerts atlslscsrv app package json path to vulnerable library tmp ws scm security alerts atlslscsrv app node modules unzipper node modules fstream package json dependency hierarchy unzipper tgz root library x fstream tgz vulnerable library vulnerability details fstream before is vulnerable to arbitrary file overwrite extracting tarballs containing a hardlink to a file that already exists in the system and a file that matches the hardlink will overwrite the system s file with the contents of the extracted file the fstream dirwriter function is vulnerable publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact none integrity impact high availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
261,237 | 27,809,519,806 | IssuesEvent | 2023-03-18 01:01:39 | kristakunkle/juice-shop | https://api.github.com/repos/kristakunkle/juice-shop | closed | notevil-1.3.3.tgz: 1 vulnerabilities (highest severity is: 6.5) - autoclosed | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>notevil-1.3.3.tgz</b></p></summary>
<p>Evalulate javascript like the built-in eval() method but safely</p>
<p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/notevil/package.json</p>
<p>
</details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (notevil version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-23771](https://www.mend.io/vulnerability-database/CVE-2021-23771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | notevil-1.3.3.tgz | Direct | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-23771</summary>
### Vulnerable Library - <b>notevil-1.3.3.tgz</b></p>
<p>Evalulate javascript like the built-in eval() method but safely</p>
<p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/notevil/package.json</p>
<p>
Dependency Hierarchy:
- :x: **notevil-1.3.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878).
<p>Publish Date: 2022-03-17
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23771>CVE-2021-23771</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
</details> | True | notevil-1.3.3.tgz: 1 vulnerabilities (highest severity is: 6.5) - autoclosed - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>notevil-1.3.3.tgz</b></p></summary>
<p>Evalulate javascript like the built-in eval() method but safely</p>
<p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/notevil/package.json</p>
<p>
</details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (notevil version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2021-23771](https://www.mend.io/vulnerability-database/CVE-2021-23771) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Medium | 6.5 | notevil-1.3.3.tgz | Direct | N/A | ❌ |
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> CVE-2021-23771</summary>
### Vulnerable Library - <b>notevil-1.3.3.tgz</b></p>
<p>Evalulate javascript like the built-in eval() method but safely</p>
<p>Library home page: <a href="https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz">https://registry.npmjs.org/notevil/-/notevil-1.3.3.tgz</a></p>
<p>Path to dependency file: /package.json</p>
<p>Path to vulnerable library: /node_modules/notevil/package.json</p>
<p>
Dependency Hierarchy:
- :x: **notevil-1.3.3.tgz** (Vulnerable Library)
<p>Found in base branch: <b>master</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from an incomplete fix in [SNYK-JS-NOTEVIL-608878](https://security.snyk.io/vuln/SNYK-JS-NOTEVIL-608878).
<p>Publish Date: 2022-03-17
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2021-23771>CVE-2021-23771</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>6.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: Low
- Integrity Impact: Low
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
</details> | non_priority | notevil tgz vulnerabilities highest severity is autoclosed vulnerable library notevil tgz evalulate javascript like the built in eval method but safely library home page a href path to dependency file package json path to vulnerable library node modules notevil package json vulnerabilities cve severity cvss dependency type fixed in notevil version remediation available medium notevil tgz direct n a details cve vulnerable library notevil tgz evalulate javascript like the built in eval method but safely library home page a href path to dependency file package json path to vulnerable library node modules notevil package json dependency hierarchy x notevil tgz vulnerable library found in base branch master vulnerability details this affects all versions of package notevil all versions of package argencoders notevil it is vulnerable to sandbox escape leading to prototype pollution the package fails to restrict access to the main context allowing an attacker to add or modify an object s prototype note this vulnerability derives from an incomplete fix in publish date url a href cvss score details base score metrics exploitability metrics attack vector network attack complexity low privileges required none user interaction none scope unchanged impact metrics confidentiality impact low integrity impact low availability impact none for more information on scores click a href | 0 |
788,781 | 27,765,901,841 | IssuesEvent | 2023-03-16 11:27:15 | brucestull/health-activity-tracker | https://api.github.com/repos/brucestull/health-activity-tracker | closed | Add RO-DBT 'Diary Card' model. | priority | Add basic `DiaryCard` model.
Future updates will include the numerous fields of the model. | 1.0 | Add RO-DBT 'Diary Card' model. - Add basic `DiaryCard` model.
Future updates will include the numerous fields of the model. | priority | add ro dbt diary card model add basic diarycard model future updates will include the numerous fields of the model | 1 |
167,462 | 6,338,997,834 | IssuesEvent | 2017-07-27 07:00:58 | BinPar/PRM | https://api.github.com/repos/BinPar/PRM | closed | PRM UNI PRO: ERROR CREANDO LA NUEVA PROMOCION. REFERENCIA A OBJETO... | Priority: High | 
Usuario: Noemรญ
Promociรณn: Katch ebook
@CristianBinpar @minigoBinpar @franciscorrr | 1.0 | PRM UNI PRO: ERROR CREANDO LA NUEVA PROMOCION. REFERENCIA A OBJETO... - 
Usuario: Noemรญ
Promociรณn: Katch ebook
@CristianBinpar @minigoBinpar @franciscorrr | priority | prm uni pro error creando la nueva promocion referencia a objeto usuario noemรญ promociรณn katch ebook cristianbinpar minigobinpar franciscorrr | 1 |
156,960 | 5,995,251,380 | IssuesEvent | 2017-06-03 01:35:25 | universAAL/middleware | https://api.github.com/repos/universAAL/middleware | closed | Abstract types are not serialized | bug imported priority 3 | _Originally Opened: @Alfiva (2012-04-12 19:00:30_)
_Originally Closed: 2013-09-17 15:51:47_
I am not sure that this is actually a bug (and not a design decision) but it is as frustrating.
With the introduction of the new data repr. abstract classes it took me a while realizing that abstract types of a concept are not serialized (sorry if this was explained somewhere). Example:
"apX" is an instance of AssistedPerson.
AssistedPerson is an ont subclass of User, which is an ont subclass of Profilable.
Profilable is an abstract ont class.
When "apX" is serialized its types are listed as:
"apX a ..User, ..AssistedPerson."
But Profilable is not listed.
I checked that if I make Profilable not abstract it appears.
Could it be possible to include abstract types when serializing?
Or is there some reason to prevent this?
--
From: _this issue has been automatically imported from our old issue tracker_ | 1.0 | Abstract types are not serialized - _Originally Opened: @Alfiva (2012-04-12 19:00:30_)
_Originally Closed: 2013-09-17 15:51:47_
I am not sure that this is actually a bug (and not a design decision) but it is as frustrating.
With the introduction of the new data repr. abstract classes it took me a while realizing that abstract types of a concept are not serialized (sorry if this was explained somewhere). Example:
"apX" is an instance of AssistedPerson.
AssistedPerson is an ont subclass of User, which is an ont subclass of Profilable.
Profilable is an abstract ont class.
When "apX" is serialized its types are listed as:
"apX a ..User, ..AssistedPerson."
But Profilable is not listed.
I checked that if I make Profilable not abstract it appears.
Could it be possible to include abstract types when serializing?
Or is there some reason to prevent this?
--
From: _this issue has been automatically imported from our old issue tracker_ | priority | abstract types are not serialized originally opened alfiva originally closed i am not sure that this is actually a bug and not a design decision but it is as frustrating with the introduction of the new data repr abstract classes it took me a while realizing that abstract types of a concept are not serialized sorry if this was explained somewhere example quot apx quot is an instance of assistedperson assistedperson is an ont subclass of user which is an ont subclass of profilable profilable is an abstract ont class when quot apx quot is serialized its types are listed as quot apx a user assistedperson quot but profilable is not listed i checked that if i make profilable not abstract it appears could it be possible to include abstract types when serializing or is there some reason to prevent this from this issue has been automatically imported from our old issue tracker | 1 |
247,631 | 7,921,344,802 | IssuesEvent | 2018-07-05 07:08:32 | hackoregon/data-science-pet-containers | https://api.github.com/repos/hackoregon/data-science-pet-containers | closed | refactor disturbance stops code to use less RAM | High priority bug | It's pushing past 7 GB when the rest of it works in 5 - | 1.0 | refactor disturbance stops code to use less RAM - It's pushing past 7 GB when the rest of it works in 5 - | priority | refactor disturbance stops code to use less ram it s pushing past gb when the rest of it works in | 1 |
349,062 | 10,456,424,873 | IssuesEvent | 2019-09-20 01:04:17 | busy-beaver-dev/busy-beaver | https://api.github.com/repos/busy-beaver-dev/busy-beaver | closed | Investigate alternative release workflow | effort high priority low spike | As a developer, I would like to have a nice release workflow
Right now everything that gets merged into master gets deployed. This is good, but also not good. It would be good to cut releases. Investigate a good pattern. | 1.0 | Investigate alternative release workflow - As a developer, I would like to have a nice release workflow
Right now everything that gets merged into master gets deployed. This is good, but also not good. It would be good to cut releases. Investigate a good pattern. | priority | investigate alternative release workflow as a developer i would like to have a nice release workflow right now everything that gets merged into master gets deployed this is good but also not good it would be good to cut releases investigate a good pattern | 1 |
22,708 | 3,792,385,873 | IssuesEvent | 2016-03-22 09:28:58 | CaliOpen/Caliopen | https://api.github.com/repos/CaliOpen/Caliopen | opened | [messages list] Show only the number of messages and not ยซ x/x ยป | design | Show only the number of messages:

and not ยซ x/โฆ ยป

| 1.0 | [messages list] Show only the number of messages and not ยซ x/x ยป - Show only the number of messages:

and not ยซ x/โฆ ยป

| non_priority | show only the number of messages and not ยซ x x ยป show only the number of messages and not ยซ x โฆ ยป | 0 |
393,043 | 26,969,922,822 | IssuesEvent | 2023-02-09 03:18:21 | anansi-project/comicinfo | https://api.github.com/repos/anansi-project/comicinfo | closed | Roundup? StoryArc? What are they? | documentation question | As a user I would very much appreciate more details about the metadata and how it's supposed to be populated. What exactly _is_ the definition of `StoryArc` within the context of the rfcs? Is it the name of a chapter? A collection of chapters? Furthermore, what is `ComicPageType: Roundup` (and the other page types for that matter)? These metadata fields are confusing and I can't find any details on how to use them as the needed context is missing from the [schema documentation](https://anansi-project.github.io/docs/comicinfo/documentation). If it's all explained somewhere, I'll ask that you please excuse my obtuseness and point me toward it! Also, I'd like to request Page Type: ToC. | 1.0 | Roundup? StoryArc? What are they? - As a user I would very much appreciate more details about the metadata and how it's supposed to be populated. What exactly _is_ the definition of `StoryArc` within the context of the rfcs? Is it the name of a chapter? A collection of chapters? Furthermore, what is `ComicPageType: Roundup` (and the other page types for that matter)? These metadata fields are confusing and I can't find any details on how to use them as the needed context is missing from the [schema documentation](https://anansi-project.github.io/docs/comicinfo/documentation). If it's all explained somewhere, I'll ask that you please excuse my obtuseness and point me toward it! Also, I'd like to request Page Type: ToC. | non_priority | roundup storyarc what are they as a user i would very much appreciate more details about the metadata and how it s supposed to be populated what exactly is the definition of storyarc within the context of the rfcs is it the name of a chapter a collection of chapters furthermore what is comicpagetype roundup and the other page types for that matter these metadata fields are confusing and i can t find any details on how to use them as the needed context is missing from the if it s all explained somewhere i ll ask that you please excuse my obtuseness and point me toward it also i d like to request page type toc | 0 |
111,651 | 14,116,610,127 | IssuesEvent | 2020-11-08 04:15:11 | HACC2020/Trigeeks | https://api.github.com/repos/HACC2020/Trigeeks | closed | make Upcomming event View UI better | UI design | add a toggle button to hide ended events
sort events
make guestList UI better | 1.0 | make Upcomming event View UI better - add a toggle button to hide ended events
sort events
make guestList UI better | non_priority | make upcomming event view ui better add a toggle button to hide ended events sort events make guestlist ui better | 0 |
706,975 | 24,290,039,976 | IssuesEvent | 2022-09-29 04:35:59 | JasonBock/Rocks | https://api.github.com/repos/JasonBock/Rocks | closed | Use Hash Code to Get Consistent Value From String | enhancement Medium Priority | Using `GetHashCode()` on a `string` seems to yield a different value within every instance of an application or test run. Which is fine - `GetHashCode()` isn't meant to be an object identifier. But I'm using this in `MockProjectedDelegateBuilder`, and it makes testing code that projects these types ... well, hard, to say the least. I'd like to create a hash code for a `string` that will always give me the same answer every single time. It doesn't even have to be a 32-bit number; 64- or 128-bits are fine as well. | 1.0 | Use Hash Code to Get Consistent Value From String - Using `GetHashCode()` on a `string` seems to yield a different value within every instance of an application or test run. Which is fine - `GetHashCode()` isn't meant to be an object identifier. But I'm using this in `MockProjectedDelegateBuilder`, and it makes testing code that projects these types ... well, hard, to say the least. I'd like to create a hash code for a `string` that will always give me the same answer every single time. It doesn't even have to be a 32-bit number; 64- or 128-bits are fine as well. | priority | use hash code to get consistent value from string using gethashcode on a string seems to yield a different value within every instance of an application or test run which is fine gethashcode isn t meant to be an object identifier but i m using this in mockprojecteddelegatebuilder and it makes testing code that projects these types well hard to say the least i d like to create a hash code for a string that will always give me the same answer every single time it doesn t even have to be a bit number or bits are fine as well | 1 |
407,514 | 27,618,745,224 | IssuesEvent | 2023-03-09 21:41:52 | gravitational/teleport | https://api.github.com/repos/gravitational/teleport | opened | Move uninstall instructions to docs | documentation support-load | This guide is in discussions
https://github.com/gravitational/teleport/discussions/9920
Customers don't think it's official and ask us to add this to docs instead.
| 1.0 | Move uninstall instructions to docs - This guide is in discussions
https://github.com/gravitational/teleport/discussions/9920
Customers don't think it's official and ask us to add this to docs instead.
| non_priority | move uninstall instructions to docs this guide is in discussions customers don t think it s official and ask us to add this to docs instead | 0 |
45,902 | 5,988,871,289 | IssuesEvent | 2017-06-02 06:45:20 | geetsisbac/IQ4LK23ROQOKHZC3VKUTGRNI | https://api.github.com/repos/geetsisbac/IQ4LK23ROQOKHZC3VKUTGRNI | reopened | C9sGJ03248TDDO9xOQ9vZLyWe5wnSz96xUm5eW3WTzntq+wrMTG0zUHMYOkUUAmHqw5sZKMGFhXNaH1/ZOIJKMS41rj1FvKovp3inj6/OvWzthT+HYFyUmbDWkQGS01wKlJoW8+W7ijkMLMHxaZ+e/689nLehhr4spCDgK4sqSM= | design | 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 | 1.0 | C9sGJ03248TDDO9xOQ9vZLyWe5wnSz96xUm5eW3WTzntq+wrMTG0zUHMYOkUUAmHqw5sZKMGFhXNaH1/ZOIJKMS41rj1FvKovp3inj6/OvWzthT+HYFyUmbDWkQGS01wKlJoW8+W7ijkMLMHxaZ+e/689nLehhr4spCDgK4sqSM= - 1k7+ImuR0ZyFQv8px5+FF1TWTogREtiwXT7QNu5dDStlcXjwEVAu0cN+j3+c91QN30ZpiEAdV9JR5Eea6iZWSFfpgEmUDBK4DJCF73dOczag2FyZzUKpBeJtpf5tV4q92r1bPK+31Un5em0qMMngg8HsioAl7lAlDNP68Xmgo0/JozqFbBDGiUMgvFISP3JWNMh6lvz18UXaoXAFypSxPPCqJLraj5M4sGOfjVtOjluPwxAMPFelTNyUqwZeD5eOuY/JCXT9sKiwEGadwSBQYkLFJ78lCRq97hVh66IFwHb06DPUGMU9sWN0q3OGgd53SMrLH4JlOUtxFvEG45/znmj7eADhDGbR9quNCHmNP5p1nFTI1vPDwvkcFrQitfWxaT0IBlYeR7uMGh4ZAU5LSipNzw1ODg0IzpLUFi32s+38+eXi8n4o5BsnY2HFL9FzeLjGI3UYH0bJtEZbrU0a/REmoCVBuF0E0PUVBejHITcjLzyj6SyubdwoFih7agrL6pnuhxJkTSfrai+1qONoSvAKBjT/AJEL1eZt2yqTzW/qCKcqYKVICvlnLi/tO7Yo6pnuhxJkTSfrai+1qONoSvAKBjT/AJEL1eZt2yqTzW/PP947HSBsVnT7uZMtB5/gYBfe7sg8dxCCSRqWPMI4w91HrpSWVKFbbZ1svSqztt4P+MmvsYcraz5btfGytOpZlU84e/W1sqmGlQyX0Y5zWX5k0CYg8M9/iUawlKJ/l5sxkLeBdzqqkbS7W7M3fKUQLP4Su62j5iNiHTE12MHl/VaunS/lbR+a5Uw9b/kSFLySkZUCKu591ngbj14hSpXqq1uM5j8DuoDRTH1mWDen/Q== | non_priority | ovwztht e qckcqykvicvlnli iuawlkj vauns lbr q | 0 |
73,303 | 14,021,170,015 | IssuesEvent | 2020-10-29 20:50:31 | r-lib/usethis | https://api.github.com/repos/r-lib/usethis | closed | Extend `use_test` to support writing tests for files in `src/` | code :desktop_computer: feature | It seems like a reasonable use case to support writing testthat tests for exported functions from `src/` and not restrict things just to scripts in `R/`. This is currently being handled by the `get_active_r_file` functions which supports only files in `R/` with `r` or `R` extensions. | 1.0 | Extend `use_test` to support writing tests for files in `src/` - It seems like a reasonable use case to support writing testthat tests for exported functions from `src/` and not restrict things just to scripts in `R/`. This is currently being handled by the `get_active_r_file` functions which supports only files in `R/` with `r` or `R` extensions. | non_priority | extend use test to support writing tests for files in src it seems like a reasonable use case to support writing testthat tests for exported functions from src and not restrict things just to scripts in r this is currently being handled by the get active r file functions which supports only files in r with r or r extensions | 0 |
288,395 | 8,839,086,629 | IssuesEvent | 2019-01-06 01:05:12 | bosik/diacomp | https://api.github.com/repos/bosik/diacomp | closed | Login / Once logged and tapped Back, login screen is shown again | app:android priority:major type:bug | STR:
* Fresh install or clear app data
* Start app
* Login into account, wait until data imported
* Tap Back
ER:
* App is closed
AR:
* Login activity is shown | 1.0 | Login / Once logged and tapped Back, login screen is shown again - STR:
* Fresh install or clear app data
* Start app
* Login into account, wait until data imported
* Tap Back
ER:
* App is closed
AR:
* Login activity is shown | priority | login once logged and tapped back login screen is shown again str fresh install or clear app data start app login into account wait until data imported tap back er app is closed ar login activity is shown | 1 |
26,782 | 7,869,116,592 | IssuesEvent | 2018-06-24 09:43:52 | archlinuxcn/repo | https://api.github.com/repos/archlinuxcn/repo | closed | PHP53's obsolete dependency. | rebuild | ### ้ฎ้ข็ฑปๅ / Type of issues
Obsolete dependency.
* ๆๅ
้่ฏฏ / packaging error
### ๅๅฝฑๅ็่ฝฏไปถๅ
/ Affected packages
* `php53`
----
่ฏทๅจๆญค่กฅๅ
่ฏดๆใ
Please describe in detail here.
```
Cannot load modules/libphp53.so into server: libicui18n.so.59:
```
Existing shared object:
```
> pacman -Ql icu | grep libicui18n
icu /usr/lib/libicui18n.so
icu /usr/lib/libicui18n.so.61
icu /usr/lib/libicui18n.so.61.1
``` | 1.0 | PHP53's obsolete dependency. - ### ้ฎ้ข็ฑปๅ / Type of issues
Obsolete dependency.
* ๆๅ
้่ฏฏ / packaging error
### ๅๅฝฑๅ็่ฝฏไปถๅ
/ Affected packages
* `php53`
----
่ฏทๅจๆญค่กฅๅ
่ฏดๆใ
Please describe in detail here.
```
Cannot load modules/libphp53.so into server: libicui18n.so.59:
```
Existing shared object:
```
> pacman -Ql icu | grep libicui18n
icu /usr/lib/libicui18n.so
icu /usr/lib/libicui18n.so.61
icu /usr/lib/libicui18n.so.61.1
``` | non_priority | s obsolete dependency ้ฎ้ข็ฑปๅ type of issues obsolete dependency ๆๅ
้่ฏฏ packaging error ๅๅฝฑๅ็่ฝฏไปถๅ
affected packages ่ฏทๅจๆญค่กฅๅ
่ฏดๆใ please describe in detail here cannot load modules so into server so existing shared object pacman ql icu grep icu usr lib so icu usr lib so icu usr lib so | 0 |
343,741 | 24,781,004,836 | IssuesEvent | 2022-10-24 04:57:27 | Susmita-Dey/Sukoon | https://api.github.com/repos/Susmita-Dey/Sukoon | closed | Incorrect Links in CONTRIBUTING.md and CODE_OF_CONDUCT.md | documentation good first issue assigned hacktoberfest | 2 of the Quick Links in [CONTRIUBTING.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CONTRIBUTING.md#quicklinks) aren't working and Mozilla code of conduct enforcement ladder link in [CODE_OF_CONDUCT.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CODE_OF_CONDUCT.md#attribution) is pointing towards just mozilla inclusion repo instead of actual enforcement ladder documentation. | 1.0 | Incorrect Links in CONTRIBUTING.md and CODE_OF_CONDUCT.md - 2 of the Quick Links in [CONTRIUBTING.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CONTRIBUTING.md#quicklinks) aren't working and Mozilla code of conduct enforcement ladder link in [CODE_OF_CONDUCT.md](https://github.com/Susmita-Dey/Sukoon/blob/main/CODE_OF_CONDUCT.md#attribution) is pointing towards just mozilla inclusion repo instead of actual enforcement ladder documentation. | non_priority | incorrect links in contributing md and code of conduct md of the quick links in aren t working and mozilla code of conduct enforcement ladder link in is pointing towards just mozilla inclusion repo instead of actual enforcement ladder documentation | 0 |
566,803 | 16,830,821,076 | IssuesEvent | 2021-06-18 04:20:11 | openmsupply/msupply-dashboard | https://api.github.com/repos/openmsupply/msupply-dashboard | closed | User permissions | Priority: High | I've been meaning to write this out awhile ago, better late then never, this is one idea of how we can handle finer grained user permissions (looks like it can be done for Grafana Enterprise (paid version), but not for the free version.
### Exposing Grafana User to SQL
Can hard code a variable `$grafanaUser`

With this small change, we can access $grafanaUser as a template variable (will give the name of currently logged in user)
### Permission Restriction
Instead of restricting each sql query, we can restrict what facilities and items appear in filters, using user, `user_store` table and some master list -> user association
### Restricting Store
Can use `user_store` table to figure out which stores user 'can login to'. A helper `view` can be quite useful, would envision a filter like this:
`select name from store where name like '% AMS' and ID in (select ID from userStores($grafanaUser))`
### Restricting Items
Need to create a join table between user and master list, similar to store it will allow the following filter restriction.
`select item_name from item where ID (select ID from userItems($grafanaUser))`
| 1.0 | User permissions - I've been meaning to write this out awhile ago, better late then never, this is one idea of how we can handle finer grained user permissions (looks like it can be done for Grafana Enterprise (paid version), but not for the free version.
### Exposing Grafana User to SQL
Can hard code a variable `$grafanaUser`

With this small change, we can access $grafanaUser as a template variable (will give the name of currently logged in user)
### Permission Restriction
Instead of restricting each sql query, we can restrict what facilities and items appear in filters, using user, `user_store` table and some master list -> user association
### Restricting Store
Can use `user_store` table to figure out which stores user 'can login to'. A helper `view` can be quite useful, would envision a filter like this:
`select name from store where name like '% AMS' and ID in (select ID from userStores($grafanaUser))`
### Restricting Items
Need to create a join table between user and master list, similar to store it will allow the following filter restriction.
`select item_name from item where ID (select ID from userItems($grafanaUser))`
| priority | user permissions i ve been meaning to write this out awhile ago better late then never this is one idea of how we can handle finer grained user permissions looks like it can be done for grafana enterprise paid version but not for the free version exposing grafana user to sql can hard code a variable grafanauser with this small change we can access grafanauser as a template variable will give the name of currently logged in user permission restriction instead of restricting each sql query we can restrict what facilities and items appear in filters using user user store table and some master list user association restricting store can use user store table to figure out which stores user can login to a helper view can be quite useful would envision a filter like this select name from store where name like ams and id in select id from userstores grafanauser restricting items need to create a join table between user and master list similar to store it will allow the following filter restriction select item name from item where id select id from useritems grafanauser | 1 |
203,681 | 23,169,848,031 | IssuesEvent | 2022-07-30 14:37:59 | jvm-bloggers/jvm-bloggers | https://api.github.com/repos/jvm-bloggers/jvm-bloggers | closed | Spring Boot update to 2.6.10 | Security Enhancement | As for now, we can safely bump up Spring Boot to version `2.6.10` - upgrading to `2.7` line is causing some bigger issues, mainly related to the `h2` v2 (that has been started used by default in this line) and `liquibase` operating on it, but it should be fixed in a different issue's scope. | True | Spring Boot update to 2.6.10 - As for now, we can safely bump up Spring Boot to version `2.6.10` - upgrading to `2.7` line is causing some bigger issues, mainly related to the `h2` v2 (that has been started used by default in this line) and `liquibase` operating on it, but it should be fixed in a different issue's scope. | non_priority | spring boot update to as for now we can safely bump up spring boot to version upgrading to line is causing some bigger issues mainly related to the that has been started used by default in this line and liquibase operating on it but it should be fixed in a different issue s scope | 0 |
288,872 | 8,852,541,138 | IssuesEvent | 2019-01-08 18:39:10 | visit-dav/issues-test | https://api.github.com/repos/visit-dav/issues-test | closed | BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS | bug crash likelihood medium priority reviewed severity high wrong results |
-----------------------REDMINE MIGRATION-----------------------
This ticket was migrated from Redmine. As such, not all
information was able to be captured in the transition. Below is
a complete record of the original redmine ticket.
Ticket number: 294
Status: Resolved
Project: VisIt
Tracker: Bug
Priority: Urgent
Subject: BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS
Assigned to: Mark Miller
Category: -
Target version: 2.0.2
Author: Mark Miller
Start: 07/28/2010
Due date:
% Done: 90%
Estimated time: 0.10 hour
Created: 07/28/2010 10:19 am
Updated: 08/03/2010 07:04 pm
Likelihood: 3 - Occasional
Severity: 4 - Crash / Wrong Results
Found in version: 2.0.0
Impact:
Expected Use:
OS: All
Support Group: Any
Description:
Comments:
There was an indexing loop variable error. Hank and I eye-balled together. Fixed in r12045
| 1.0 | BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS -
-----------------------REDMINE MIGRATION-----------------------
This ticket was migrated from Redmine. As such, not all
information was able to be captured in the transition. Below is
a complete record of the original redmine ticket.
Ticket number: 294
Status: Resolved
Project: VisIt
Tracker: Bug
Priority: Urgent
Subject: BOV reader coring in avtNekDomainBoundaries for certain settings for DATA_BRICKLETS
Assigned to: Mark Miller
Category: -
Target version: 2.0.2
Author: Mark Miller
Start: 07/28/2010
Due date:
% Done: 90%
Estimated time: 0.10 hour
Created: 07/28/2010 10:19 am
Updated: 08/03/2010 07:04 pm
Likelihood: 3 - Occasional
Severity: 4 - Crash / Wrong Results
Found in version: 2.0.0
Impact:
Expected Use:
OS: All
Support Group: Any
Description:
Comments:
There was an indexing loop variable error. Hank and I eye-balled together. Fixed in r12045
| priority | bov reader coring in avtnekdomainboundaries for certain settings for data bricklets redmine migration this ticket was migrated from redmine as such not all information was able to be captured in the transition below is a complete record of the original redmine ticket ticket number status resolved project visit tracker bug priority urgent subject bov reader coring in avtnekdomainboundaries for certain settings for data bricklets assigned to mark miller category target version author mark miller start due date done estimated time hour created am updated pm likelihood occasional severity crash wrong results found in version impact expected use os all support group any description comments there was an indexing loop variable error hank and i eye balled together fixed in | 1 |
471,011 | 13,551,743,520 | IssuesEvent | 2020-09-17 11:35:01 | gnosis/conditional-tokens-explorer | https://api.github.com/repos/gnosis/conditional-tokens-explorer | reopened | Do not clear out fields on the 'Split Positions' page when Reject transaction in Metamask | Low priority enhancement | **Steps:**
1. Open Split Position page
2. Fill on all the required fields
3. Click on the Split
4. Click on the Reject button in metamask
**Actual Result:** all the filled in fields are cleared out when the warning message appears

**Expected Result:** the fields remain to be filled in | 1.0 | Do not clear out fields on the 'Split Positions' page when Reject transaction in Metamask - **Steps:**
1. Open Split Position page
2. Fill on all the required fields
3. Click on the Split
4. Click on the Reject button in metamask
**Actual Result:** all the filled in fields are cleared out when the warning message appears

**Expected Result:** the fields remain to be filled in | priority | do not clear out fields on the split positions page when reject transaction in metamask steps open split position page fill on all the required fields click on the split click on the reject button in metamask actual result all the filled in fields are cleared out when the warning message appears expected result the fields remain to be filled in | 1 |
184,742 | 14,289,810,139 | IssuesEvent | 2020-11-23 19:51:48 | github-vet/rangeclosure-findings | https://api.github.com/repos/github-vet/rangeclosure-findings | closed | DE-labtory/it-chain: common/mock/network_manager_test.go; 21 LoC | fresh small test |
Found a possible issue in [DE-labtory/it-chain](https://www.github.com/DE-labtory/it-chain) at [common/mock/network_manager_test.go](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73)
The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements
which capture loop variables.
[Click here to see the code in its original context.](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73)
<details>
<summary>Click here to show the 21 line(s) of Go which triggered the analyzer.</summary>
```go
for testName, test := range tests {
networkManager := mock.NewNetworkManager()
t.Logf("running test case %s", testName)
deliverGrpc := &command.DeliverGrpc{
RecipientList: test.input.RecipientList,
Protocol: test.input.Protocol,
}
networkManager.GrpcCall("1", "message.deliver", *deliverGrpc, func() {})
t.Logf("end of test calling")
for _, processId := range test.input.RecipientList {
t.Logf("processId:%s is receiving", processId)
go func(processId string) {
a := <-networkManager.ChannelMap[processId]["message.receive"]
assert.Equal(t, a.Protocol, test.input.Protocol)
}(processId)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7
| 1.0 | DE-labtory/it-chain: common/mock/network_manager_test.go; 21 LoC -
Found a possible issue in [DE-labtory/it-chain](https://www.github.com/DE-labtory/it-chain) at [common/mock/network_manager_test.go](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73)
The below snippet of Go code triggered static analysis which searches for goroutines and/or defer statements
which capture loop variables.
[Click here to see the code in its original context.](https://github.com/DE-labtory/it-chain/blob/ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7/common/mock/network_manager_test.go#L53-L73)
<details>
<summary>Click here to show the 21 line(s) of Go which triggered the analyzer.</summary>
```go
for testName, test := range tests {
networkManager := mock.NewNetworkManager()
t.Logf("running test case %s", testName)
deliverGrpc := &command.DeliverGrpc{
RecipientList: test.input.RecipientList,
Protocol: test.input.Protocol,
}
networkManager.GrpcCall("1", "message.deliver", *deliverGrpc, func() {})
t.Logf("end of test calling")
for _, processId := range test.input.RecipientList {
t.Logf("processId:%s is receiving", processId)
go func(processId string) {
a := <-networkManager.ChannelMap[processId]["message.receive"]
assert.Equal(t, a.Protocol, test.input.Protocol)
}(processId)
}
}
```
</details>
Leave a reaction on this issue to contribute to the project by classifying this instance as a **Bug** :-1:, **Mitigated** :+1:, or **Desirable Behavior** :rocket:
See the descriptions of the classifications [here](https://github.com/github-vet/rangeclosure-findings#how-can-i-help) for more information.
commit ID: ae0dc29e864f6de1002aa7f31aa0650f39b8b8d7
| non_priority | de labtory it chain common mock network manager test go loc found a possible issue in at the below snippet of go code triggered static analysis which searches for goroutines and or defer statements which capture loop variables click here to show the line s of go which triggered the analyzer go for testname test range tests networkmanager mock newnetworkmanager t logf running test case s testname delivergrpc command delivergrpc recipientlist test input recipientlist protocol test input protocol networkmanager grpccall message deliver delivergrpc func t logf end of test calling for processid range test input recipientlist t logf processid s is receiving processid go func processid string a networkmanager channelmap assert equal t a protocol test input protocol processid leave a reaction on this issue to contribute to the project by classifying this instance as a bug mitigated or desirable behavior rocket see the descriptions of the classifications for more information commit id | 0 |
4,408 | 2,551,443,552 | IssuesEvent | 2015-02-02 09:42:54 | rweichler/cylinder | https://api.github.com/repos/rweichler/cylinder | closed | For some people, when opening folders the background disappears when the animation is going, and then it reappears when the animation finishes | bug PRIORITY | Stems from the solution to #17.
For the life of me I can't figure out what tweak is causing this. I have a hunch this is a 64-bit issue, because the only people who are reporting this have 5Ses... And if that's the case then I can't fix it :/ | 1.0 | For some people, when opening folders the background disappears when the animation is going, and then it reappears when the animation finishes - Stems from the solution to #17.
For the life of me I can't figure out what tweak is causing this. I have a hunch this is a 64-bit issue, because the only people who are reporting this have 5Ses... And if that's the case then I can't fix it :/ | priority | for some people when opening folders the background disappears when the animation is going and then it reappears when the animation finishes stems from the solution to for the life of me i can t figure out what tweak is causing this i have a hunch this is a bit issue because the only people who are reporting this have and if that s the case then i can t fix it | 1 |
801,613 | 28,495,393,576 | IssuesEvent | 2023-04-18 13:54:04 | quarkus-qe/quarkus-test-suite | https://api.github.com/repos/quarkus-qe/quarkus-test-suite | closed | Review and remove usage of @QuarkusTest | bug priority/urgent | There are still some tests that use `@QuarkusTest` rather than `@QuarkusScenario`. Review these tests and reimplement them with new framework. | 1.0 | Review and remove usage of @QuarkusTest - There are still some tests that use `@QuarkusTest` rather than `@QuarkusScenario`. Review these tests and reimplement them with new framework. | priority | review and remove usage of quarkustest there are still some tests that use quarkustest rather than quarkusscenario review these tests and reimplement them with new framework | 1 |
709,502 | 24,380,698,607 | IssuesEvent | 2022-10-04 07:33:37 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.gap.com - design is broken | browser-firefox priority-normal engine-gecko | <!-- @browser: Firefox 105.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/111688 -->
**URL**: https://www.gap.com/
**Browser / Version**: Firefox 105.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes Chrome
**Problem type**: Design is broken
**Description**: Items not fully visible
**Steps to Reproduce**:
missing sidebar "feedback" button
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2022/10/7f2aabcb-7c2e-45ce-9f15-06bfab211842.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | www.gap.com - design is broken - <!-- @browser: Firefox 105.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:105.0) Gecko/20100101 Firefox/105.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/111688 -->
**URL**: https://www.gap.com/
**Browser / Version**: Firefox 105.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes Chrome
**Problem type**: Design is broken
**Description**: Items not fully visible
**Steps to Reproduce**:
missing sidebar "feedback" button
<details>
<summary>View the screenshot</summary>
<img alt="Screenshot" src="https://webcompat.com/uploads/2022/10/7f2aabcb-7c2e-45ce-9f15-06bfab211842.jpeg">
</details>
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | design is broken url browser version firefox operating system windows tested another browser yes chrome problem type design is broken description items not fully visible steps to reproduce missing sidebar feedback button view the screenshot img alt screenshot src browser configuration none from with โค๏ธ | 1 |
594,381 | 18,044,436,473 | IssuesEvent | 2021-09-18 16:39:32 | Imanity-Software/ImanitySpigot3-git | https://api.github.com/repos/Imanity-Software/ImanitySpigot3-git | closed | ็กๆณไฝฟ็จ/knockback | bug priority=high | ### Expected behavior ้ ๆ็ๆณ
knockbackๆไปค้ไฝๆญฃๅธธ
### Observed/Actual behavior ๅฏฆ้็ๆณ
็ถๆไฝฟ็จ/kbๆๆฏ/knockbackๆไปคๆๅพ่บๆๅ ฑ้ฏ
### Steps/models to reproduce ้็พ็ๆนๅผ
[23:11:49 INFO]: [Server thread] Nw_Tohka_TW issued server command: /kb
[23:11:49 ERROR]: [Server thread] null
org.bukkit.command.CommandException: Unhandled exception executing 'kb' in org.imanity.imanityspigot.knockback.command.c(knockback)
at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:150) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.bukkit.craftbukkit.v1_8_R3.CraftServer.dispatchCommand(SourceFile:714) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PlayerConnection.handleCommand(SourceFile:1316) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PlayerConnection.a(SourceFile:1128) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:47) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:13) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PlayerConnectionUtils$1.run(SourceFile:21) ~[spigot.jar:git-iSpigot-PaperEdition]
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) ~[?:1.8.0_302]
at java.util.concurrent.FutureTask.run(FutureTask.java:266) ~[?:1.8.0_302]
at net.minecraft.server.v1_8_R3.SystemUtils.a(SourceFile:18) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.MinecraftServer.B(SourceFile:939) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.DedicatedServer.B(SourceFile:471) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.MinecraftServer.A(SourceFile:869) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.MinecraftServer.run(SourceFile:770) ~[spigot.jar:git-iSpigot-PaperEdition]
at java.lang.Thread.run(Thread.java:748) [?:1.8.0_302]
Caused by: java.lang.IllegalArgumentException: Duplicate handler name: Nw_Tohka_TW
at io.netty.channel.DefaultChannelPipeline.checkDuplicateName(DefaultChannelPipeline.java:1055) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at io.netty.channel.DefaultChannelPipeline.filterName(DefaultChannelPipeline.java:284) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:247) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:237) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at com.comphenix.protocol.injector.netty.PipelineProxy.addBefore(PipelineProxy.java:61) ~[?:?]
at com.comphenix.protocol.injector.netty.ChannelInjector$3$1.addBefore(ChannelInjector.java:314) ~[?:?]
at org.imanity.imanityspigot.db.c(SourceFile:68) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition]
at java.util.concurrent.ConcurrentHashMap.computeIfAbsent(ConcurrentHashMap.java:1660) ~[?:1.8.0_302]
at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.cG.b(SourceFile:79) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.cD.a(SourceFile:83) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.ch.a(SourceFile:34) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.knockback.command.c.execute(SourceFile:60) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:143) ~[spigot.jar:git-iSpigot-PaperEdition]
... 14 more
[23:12:06 WARN]: [er Thread - 2] Exception in thread "Craft Scheduler Thread - 2" org.apache.commons.lang.UnhandledException: Plugin PlaceholderAPI v2.10.9 generated an exception while executing task 8467
[23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:57)
[23:12:06 WARN]: [er Thread - 2] at org.github.paperspigot.ServerSchedulerReportingWrapper.run(SourceFile:22)
[23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
[23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
[23:12:06 WARN]: [er Thread - 2] at java.lang.Thread.run(Thread.java:748)
[23:12:06 WARN]: [er Thread - 2] Caused by: java.lang.NullPointerException
[23:12:06 WARN]: [er Thread - 2] at me.scruffyboy13.Economy.utils.EconomyUtils.getBalance(EconomyUtils.java:168)
[23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.VaultEcoHook.getBalance(VaultEcoHook.java:220)
[23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.BalTopTask.run(BalTopTask.java:48)
[23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftTask.run(SourceFile:59)
[23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:53)
[23:12:06 WARN]: [er Thread - 2] ... 4 more

[latest.log](https://github.com/Imanity-Software/ImanitySpigot3-git/files/7190165/latest.log)
### Plugin list ๆไปถๅ่กจ
.
### ImanitySpigot3 ็็ๆฌ
2021.09.2 BUILD 1
### Agreements ๅๆไบ้
- [X] ๆ็ฎๅ้่ก็ ImanitySpigot3 ็ๆฌๅจ #client-info ้ ป้ไธญๆ้กฏ็คบๅจ ๆญฃๅจๆฏๆด ็็ๆฌๅ่กจ่ฃก.
- [X] ๆๆๅจ้ๅ Issue Tracker ไธญๆๅฐ้ไธฆๆฒๆ็ผ็พ้กไผผ็ๅ้กๅๅ ฑ.
- [X] ๆๅทฒ็ถๆๅ็็ TacoSpigot 1.8.8 ๅ ImanitySpigot3 ไบ็ธๆฏ่ผ้ไธฆไธ็ขบๅฎๅชๆ ImanitySpigot3 ๆ็ผ็้ๅๅ้ก.
### Others ้กๅค่ณ่จ
none | 1.0 | ็กๆณไฝฟ็จ/knockback - ### Expected behavior ้ ๆ็ๆณ
knockbackๆไปค้ไฝๆญฃๅธธ
### Observed/Actual behavior ๅฏฆ้็ๆณ
็ถๆไฝฟ็จ/kbๆๆฏ/knockbackๆไปคๆๅพ่บๆๅ ฑ้ฏ
### Steps/models to reproduce ้็พ็ๆนๅผ
[23:11:49 INFO]: [Server thread] Nw_Tohka_TW issued server command: /kb
[23:11:49 ERROR]: [Server thread] null
org.bukkit.command.CommandException: Unhandled exception executing 'kb' in org.imanity.imanityspigot.knockback.command.c(knockback)
at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:150) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.bukkit.craftbukkit.v1_8_R3.CraftServer.dispatchCommand(SourceFile:714) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PlayerConnection.handleCommand(SourceFile:1316) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PlayerConnection.a(SourceFile:1128) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:47) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PacketPlayInChat.a(SourceFile:13) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.PlayerConnectionUtils$1.run(SourceFile:21) ~[spigot.jar:git-iSpigot-PaperEdition]
at java.util.concurrent.Executors$RunnableAdapter.call(Executors.java:511) ~[?:1.8.0_302]
at java.util.concurrent.FutureTask.run(FutureTask.java:266) ~[?:1.8.0_302]
at net.minecraft.server.v1_8_R3.SystemUtils.a(SourceFile:18) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.MinecraftServer.B(SourceFile:939) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.DedicatedServer.B(SourceFile:471) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.MinecraftServer.A(SourceFile:869) ~[spigot.jar:git-iSpigot-PaperEdition]
at net.minecraft.server.v1_8_R3.MinecraftServer.run(SourceFile:770) ~[spigot.jar:git-iSpigot-PaperEdition]
at java.lang.Thread.run(Thread.java:748) [?:1.8.0_302]
Caused by: java.lang.IllegalArgumentException: Duplicate handler name: Nw_Tohka_TW
at io.netty.channel.DefaultChannelPipeline.checkDuplicateName(DefaultChannelPipeline.java:1055) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at io.netty.channel.DefaultChannelPipeline.filterName(DefaultChannelPipeline.java:284) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:247) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at io.netty.channel.DefaultChannelPipeline.addBefore(DefaultChannelPipeline.java:237) ~[netty-4.1.60.Final.jar:4.1.60.Final]
at com.comphenix.protocol.injector.netty.PipelineProxy.addBefore(PipelineProxy.java:61) ~[?:?]
at com.comphenix.protocol.injector.netty.ChannelInjector$3$1.addBefore(ChannelInjector.java:314) ~[?:?]
at org.imanity.imanityspigot.db.c(SourceFile:68) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition]
at java.util.concurrent.ConcurrentHashMap.computeIfAbsent(ConcurrentHashMap.java:1660) ~[?:1.8.0_302]
at org.imanity.imanityspigot.db.a(SourceFile:33) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.cG.b(SourceFile:79) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.cD.a(SourceFile:83) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.ch.a(SourceFile:34) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.imanity.imanityspigot.knockback.command.c.execute(SourceFile:60) ~[spigot.jar:git-iSpigot-PaperEdition]
at org.bukkit.command.SimpleCommandMap.dispatch(SimpleCommandMap.java:143) ~[spigot.jar:git-iSpigot-PaperEdition]
... 14 more
[23:12:06 WARN]: [er Thread - 2] Exception in thread "Craft Scheduler Thread - 2" org.apache.commons.lang.UnhandledException: Plugin PlaceholderAPI v2.10.9 generated an exception while executing task 8467
[23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:57)
[23:12:06 WARN]: [er Thread - 2] at org.github.paperspigot.ServerSchedulerReportingWrapper.run(SourceFile:22)
[23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
[23:12:06 WARN]: [er Thread - 2] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
[23:12:06 WARN]: [er Thread - 2] at java.lang.Thread.run(Thread.java:748)
[23:12:06 WARN]: [er Thread - 2] Caused by: java.lang.NullPointerException
[23:12:06 WARN]: [er Thread - 2] at me.scruffyboy13.Economy.utils.EconomyUtils.getBalance(EconomyUtils.java:168)
[23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.VaultEcoHook.getBalance(VaultEcoHook.java:220)
[23:12:06 WARN]: [er Thread - 2] at com.extendedclip.papi.expansion.vault.BalTopTask.run(BalTopTask.java:48)
[23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftTask.run(SourceFile:59)
[23:12:06 WARN]: [er Thread - 2] at org.bukkit.craftbukkit.v1_8_R3.scheduler.CraftAsyncTask.run(SourceFile:53)
[23:12:06 WARN]: [er Thread - 2] ... 4 more

[latest.log](https://github.com/Imanity-Software/ImanitySpigot3-git/files/7190165/latest.log)
### Plugin list ๆไปถๅ่กจ
.
### ImanitySpigot3 ็็ๆฌ
2021.09.2 BUILD 1
### Agreements ๅๆไบ้
- [X] ๆ็ฎๅ้่ก็ ImanitySpigot3 ็ๆฌๅจ #client-info ้ ป้ไธญๆ้กฏ็คบๅจ ๆญฃๅจๆฏๆด ็็ๆฌๅ่กจ่ฃก.
- [X] ๆๆๅจ้ๅ Issue Tracker ไธญๆๅฐ้ไธฆๆฒๆ็ผ็พ้กไผผ็ๅ้กๅๅ ฑ.
- [X] ๆๅทฒ็ถๆๅ็็ TacoSpigot 1.8.8 ๅ ImanitySpigot3 ไบ็ธๆฏ่ผ้ไธฆไธ็ขบๅฎๅชๆ ImanitySpigot3 ๆ็ผ็้ๅๅ้ก.
### Others ้กๅค่ณ่จ
none | priority | ็กๆณไฝฟ็จ knockback expected behavior ้ ๆ็ๆณ knockbackๆไปค้ไฝๆญฃๅธธ observed actual behavior ๅฏฆ้็ๆณ ็ถๆไฝฟ็จ kbๆๆฏ knockbackๆไปคๆๅพ่บๆๅ ฑ้ฏ steps models to reproduce ้็พ็ๆนๅผ nw tohka tw issued server command kb null org bukkit command commandexception unhandled exception executing kb in org imanity imanityspigot knockback command c knockback at org bukkit command simplecommandmap dispatch simplecommandmap java at org bukkit craftbukkit craftserver dispatchcommand sourcefile at net minecraft server playerconnection handlecommand sourcefile at net minecraft server playerconnection a sourcefile at net minecraft server packetplayinchat a sourcefile at net minecraft server packetplayinchat a sourcefile at net minecraft server playerconnectionutils run sourcefile at java util concurrent executors runnableadapter call executors java at java util concurrent futuretask run futuretask java at net minecraft server systemutils a sourcefile at net minecraft server minecraftserver b sourcefile at net minecraft server dedicatedserver b sourcefile at net minecraft server minecraftserver a sourcefile at net minecraft server minecraftserver run sourcefile at java lang thread run thread java caused by java lang illegalargumentexception duplicate handler name nw tohka tw at io netty channel defaultchannelpipeline checkduplicatename defaultchannelpipeline java at io netty channel defaultchannelpipeline filtername defaultchannelpipeline java at io netty channel defaultchannelpipeline addbefore defaultchannelpipeline java at io netty channel defaultchannelpipeline addbefore defaultchannelpipeline java at com comphenix protocol injector netty pipelineproxy addbefore pipelineproxy java at com comphenix protocol injector netty channelinjector addbefore channelinjector java at org imanity imanityspigot db c sourcefile at org imanity imanityspigot db a sourcefile at java util concurrent concurrenthashmap computeifabsent concurrenthashmap java at org imanity imanityspigot db a sourcefile at org imanity imanityspigot cg b sourcefile at org imanity imanityspigot cd a sourcefile at org imanity imanityspigot ch a sourcefile at org imanity imanityspigot knockback command c execute sourcefile at org bukkit command simplecommandmap dispatch simplecommandmap java more exception in thread craft scheduler thread org apache commons lang unhandledexception plugin placeholderapi generated an exception while executing task at org bukkit craftbukkit scheduler craftasynctask run sourcefile at org github paperspigot serverschedulerreportingwrapper run sourcefile at java util concurrent threadpoolexecutor runworker threadpoolexecutor java at java util concurrent threadpoolexecutor worker run threadpoolexecutor java at java lang thread run thread java caused by java lang nullpointerexception at me economy utils economyutils getbalance economyutils java at com extendedclip papi expansion vault vaultecohook getbalance vaultecohook java at com extendedclip papi expansion vault baltoptask run baltoptask java at org bukkit craftbukkit scheduler crafttask run sourcefile at org bukkit craftbukkit scheduler craftasynctask run sourcefile more plugin list ๆไปถๅ่กจ ็็ๆฌ build agreements ๅๆไบ้
ๆ็ฎๅ้่ก็ ็ๆฌๅจ client info ้ ป้ไธญๆ้กฏ็คบๅจ ๆญฃๅจๆฏๆด ็็ๆฌๅ่กจ่ฃก ๆๆๅจ้ๅ issue tracker ไธญๆๅฐ้ไธฆๆฒๆ็ผ็พ้กไผผ็ๅ้กๅๅ ฑ ๆๅทฒ็ถๆๅ็็ tacospigot ๅ ไบ็ธๆฏ่ผ้ไธฆไธ็ขบๅฎๅชๆ ๆ็ผ็้ๅๅ้ก others ้กๅค่ณ่จ none | 1 |
323,017 | 27,661,509,586 | IssuesEvent | 2023-03-12 15:23:05 | digirati-co-uk/iiif-manifest-editor | https://api.github.com/repos/digirati-co-uk/iiif-manifest-editor | closed | Adding a new Canvas inserts into the sequence after the current selection | :computer: Usability Testing | Building on top of #136, adding a new Canvas will add it immediately after the current Canvas context, rather than always at the end.
If this insertion point is currently out of view, scroll it into view. Google slides will bring it into view but moving it as little as possible - it won't centre it, just adjust the viewport enough to bring it into view either at the top or bottom.
| 1.0 | Adding a new Canvas inserts into the sequence after the current selection - Building on top of #136, adding a new Canvas will add it immediately after the current Canvas context, rather than always at the end.
If this insertion point is currently out of view, scroll it into view. Google slides will bring it into view but moving it as little as possible - it won't centre it, just adjust the viewport enough to bring it into view either at the top or bottom.
| non_priority | adding a new canvas inserts into the sequence after the current selection building on top of adding a new canvas will add it immediately after the current canvas context rather than always at the end if this insertion point is currently out of view scroll it into view google slides will bring it into view but moving it as little as possible it won t centre it just adjust the viewport enough to bring it into view either at the top or bottom | 0 |
540,712 | 15,816,200,031 | IssuesEvent | 2021-04-05 12:42:55 | worldanvil/worldanvil-bug-tracker | https://api.github.com/repos/worldanvil/worldanvil-bug-tracker | closed | User name and title is outside of span element on article comments | Feature: World Presentation Priority: Optional Severity: Trivial Status: Done Type: Bug | **World Anvil Username**: Ademal
**World / Campaign / RPG Character / Manuscript Title**: Ethnis
**Feature**:
**Related URLS** (To public & visible pages add screenshots otherwise):

**Describe the Issue**
In comments, user titles appear outside of their span so cannot be manipulated cleanly with CSS
**To Reproduce**
Inspect any comment and check the user title.
**Expected behavior**
The WA title of the person should appear inside of the title class span. | 1.0 | User name and title is outside of span element on article comments - **World Anvil Username**: Ademal
**World / Campaign / RPG Character / Manuscript Title**: Ethnis
**Feature**:
**Related URLS** (To public & visible pages add screenshots otherwise):

**Describe the Issue**
In comments, user titles appear outside of their span so cannot be manipulated cleanly with CSS
**To Reproduce**
Inspect any comment and check the user title.
**Expected behavior**
The WA title of the person should appear inside of the title class span. | priority | user name and title is outside of span element on article comments world anvil username ademal world campaign rpg character manuscript title ethnis feature related urls to public visible pages add screenshots otherwise describe the issue in comments user titles appear outside of their span so cannot be manipulated cleanly with css to reproduce inspect any comment and check the user title expected behavior the wa title of the person should appear inside of the title class span | 1 |
738,615 | 25,569,059,567 | IssuesEvent | 2022-11-30 16:16:55 | oncokb/oncokb | https://api.github.com/repos/oncokb/oncokb | closed | Prepare for data v3.18 release | high priority | - [x] Generate database
- [x] Run mvn test to make sure all tests pass, update tests accordingly
- [x] Generate v3.18 database dumps by running https://github.com/knowledgesystems/oncokb-deployment/blob/master/oncokb-data-release/release.sh
- [x] Update News
- [x] Update release note
- [x] Update oncokb-annotator tests
- [x] Update oncokb_summary image and update the index.html in oncokb-public for the tags <meta name="twitter:image"> and <meta property="og:image">
- [x] Update public site
- [ ] Update database
- [ ] Update website using latest image
- [x] Update EU public site
- [ ] Update database
- [ ] Update website using latest image
- [x] Update demo site
- [ ] Update database
- [ ] Update website using latest image
- [x] Update trimmed public site
- [ ] Update database
- [ ] Update website using latest image
| 1.0 | Prepare for data v3.18 release - - [x] Generate database
- [x] Run mvn test to make sure all tests pass, update tests accordingly
- [x] Generate v3.18 database dumps by running https://github.com/knowledgesystems/oncokb-deployment/blob/master/oncokb-data-release/release.sh
- [x] Update News
- [x] Update release note
- [x] Update oncokb-annotator tests
- [x] Update oncokb_summary image and update the index.html in oncokb-public for the tags <meta name="twitter:image"> and <meta property="og:image">
- [x] Update public site
- [ ] Update database
- [ ] Update website using latest image
- [x] Update EU public site
- [ ] Update database
- [ ] Update website using latest image
- [x] Update demo site
- [ ] Update database
- [ ] Update website using latest image
- [x] Update trimmed public site
- [ ] Update database
- [ ] Update website using latest image
| priority | prepare for data release generate database run mvn test to make sure all tests pass update tests accordingly generate database dumps by running update news update release note update oncokb annotator tests update oncokb summary image and update the index html in oncokb public for the tags and update public site update database update website using latest image update eu public site update database update website using latest image update demo site update database update website using latest image update trimmed public site update database update website using latest image | 1 |
275,658 | 30,279,985,414 | IssuesEvent | 2023-07-08 01:29:57 | opensearch-project/opentelemetry-demo | https://api.github.com/repos/opensearch-project/opentelemetry-demo | opened | proto-loader-0.7.6.tgz: 1 vulnerabilities (highest severity is: 5.5) | Mend: dependency security vulnerability | <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>proto-loader-0.7.6.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /src/paymentservice/package.json</p>
<p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (proto-loader version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2023-36665](https://www.mend.io/vulnerability-database/CVE-2023-36665) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | protobufjs-7.1.2.tgz | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-36665</summary>
### Vulnerable Library - <b>protobufjs-7.1.2.tgz</b></p>
<p>Protocol Buffers for JavaScript (& TypeScript).</p>
<p>Library home page: <a href="https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz">https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz</a></p>
<p>Path to dependency file: /src/paymentservice/package.json</p>
<p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p>
<p>
Dependency Hierarchy:
- proto-loader-0.7.6.tgz (Root Library)
- :x: **protobufjs-7.1.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype.<new-property> = ...;" whereas CVE-2022-25878 was about "Object.__proto__.<new-property> = ...;" instead.
<p>Publish Date: 2023-07-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-36665>CVE-2023-36665</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665">https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665</a></p>
<p>Release Date: 2023-07-05</p>
<p>Fix Resolution: protobufjs - 7.2.4</p>
</p>
<p></p>
</details> | True | proto-loader-0.7.6.tgz: 1 vulnerabilities (highest severity is: 5.5) - <details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>proto-loader-0.7.6.tgz</b></p></summary>
<p></p>
<p>Path to dependency file: /src/paymentservice/package.json</p>
<p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p>
<p>
<p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p></details>
## Vulnerabilities
| CVE | Severity | <img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS | Dependency | Type | Fixed in (proto-loader version) | Remediation Available |
| ------------- | ------------- | ----- | ----- | ----- | ------------- | --- |
| [CVE-2023-36665](https://www.mend.io/vulnerability-database/CVE-2023-36665) | <img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> Medium | 5.5 | protobufjs-7.1.2.tgz | Transitive | N/A* | ❌ |
<p>*For some transitive vulnerabilities, there is no version of direct dependency with a fix. Check the "Details" section below to see if there is a version of transitive dependency where vulnerability is fixed.</p>
## Details
<details>
<summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png?' width=19 height=20> CVE-2023-36665</summary>
### Vulnerable Library - <b>protobufjs-7.1.2.tgz</b></p>
<p>Protocol Buffers for JavaScript (& TypeScript).</p>
<p>Library home page: <a href="https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz">https://registry.npmjs.org/protobufjs/-/protobufjs-7.1.2.tgz</a></p>
<p>Path to dependency file: /src/paymentservice/package.json</p>
<p>Path to vulnerable library: /src/paymentservice/node_modules/protobufjs/package.json</p>
<p>
Dependency Hierarchy:
- proto-loader-0.7.6.tgz (Root Library)
- :x: **protobufjs-7.1.2.tgz** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/opensearch-project/opentelemetry-demo/commit/33de211a011c162169ca518e9e32f9f980ba7467">33de211a011c162169ca518e9e32f9f980ba7467</a></p>
<p>Found in base branch: <b>main</b></p>
</p>
<p></p>
### Vulnerability Details
<p>
protobuf.js (aka protobufjs) 6.10.0 through 7.x before 7.2.4 allows Prototype Pollution, a different vulnerability than CVE-2022-25878. A user-controlled protobuf message can be used by an attacker to pollute the prototype of Object.prototype by adding and overwriting its data and functions. Exploitation can involve: (1) using the function parse to parse protobuf messages on the fly, (2) loading .proto files by using load/loadSync functions, or (3) providing untrusted input to the functions ReflectionObject.setParsedOption and util.setProperty. NOTE: this CVE Record is about "Object.constructor.prototype.<new-property> = ...;" whereas CVE-2022-25878 was about "Object.__proto__.<new-property> = ...;" instead.
<p>Publish Date: 2023-07-05
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2023-36665>CVE-2023-36665</a></p>
</p>
<p></p>
### CVSS 3 Score Details (<b>5.5</b>)
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: Required
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
<p></p>
### Suggested Fix
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665">https://www.code-intelligence.com/blog/cve-protobufjs-prototype-pollution-cve-2023-36665</a></p>
<p>Release Date: 2023-07-05</p>
<p>Fix Resolution: protobufjs - 7.2.4</p>
</p>
<p></p>
</details> | non_priority | proto loader tgz vulnerabilities highest severity is vulnerable library proto loader tgz path to dependency file src paymentservice package json path to vulnerable library src paymentservice node modules protobufjs package json found in head commit a href vulnerabilities cve severity cvss dependency type fixed in proto loader version remediation available medium protobufjs tgz transitive n a for some transitive vulnerabilities there is no version of direct dependency with a fix check the details section below to see if there is a version of transitive dependency where vulnerability is fixed details cve vulnerable library protobufjs tgz protocol buffers for javascript typescript library home page a href path to dependency file src paymentservice package json path to vulnerable library src paymentservice node modules protobufjs package json dependency hierarchy proto loader tgz root library x protobufjs tgz vulnerable library found in head commit a href found in base branch main vulnerability details protobuf js aka protobufjs through x before allows prototype pollution a different vulnerability than cve a user controlled protobuf message can be used by an attacker to pollute the prototype of object prototype by adding and overwriting its data and functions exploitation can involve using the function parse to parse protobuf messages on the fly loading proto files by using load loadsync functions or providing untrusted input to the functions reflectionobject setparsedoption and util setproperty note this cve record is about object constructor prototype whereas cve was about object proto instead publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity low privileges required none user interaction required scope unchanged impact metrics confidentiality impact none integrity impact none availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution protobufjs | 0 |
269,403 | 23,441,259,948 | IssuesEvent | 2022-08-15 15:06:14 | elastic/kibana | https://api.github.com/repos/elastic/kibana | closed | Failing test: Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts - discover/classic "after all" hook: afterTestSuite.trigger in "discover/classic" | failed-test Team:DataDiscovery | A test failed on a tracked branch
```
NoSuchSessionError: invalid session id
at Object.throwDecodedError (node_modules/selenium-webdriver/lib/error.js:522:15)
at parseHttpResponse (node_modules/selenium-webdriver/lib/http.js:589:13)
at Executor.execute (node_modules/selenium-webdriver/lib/http.js:514:28)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at Task.exec (test/functional/services/remote/prevent_parallel_calls.ts:28:20) {
remoteStacktrace: '#0 0x5642cde32403 <unknown>\n' +
'#1 0x5642cdc3864b <unknown>\n' +
'#2 0x5642cdc62a0b <unknown>\n' +
'#3 0x5642cdc8d97c <unknown>\n' +
'#4 0x5642cdc8b620 <unknown>\n' +
'#5 0x5642cdc8ae47 <unknown>\n' +
'#6 0x5642cdc10584 <unknown>\n' +
'#7 0x5642cdc113e3 <unknown>\n' +
'#8 0x5642cde79e3d <unknown>\n' +
'#9 0x5642cde7cdb6 <unknown>\n' +
'#10 0x5642cde6313e <unknown>\n' +
'#11 0x5642cde7d9b5 <unknown>\n' +
'#12 0x5642cde57970 <unknown>\n' +
'#13 0x5642cdc100a5 <unknown>\n' +
'#14 0x7f91e86bd083 <unknown>\n'
}
```
First failure: [CI Build - 8.4](https://buildkite.com/elastic/kibana-on-merge/builds/19776#01828db3-5304-4342-9bb9-9a7540ae041e)
<!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts","test.name":"discover/classic \"after all\" hook: afterTestSuite.trigger in \"discover/classic\"","test.failCount":6}} --> | 1.0 | Failing test: Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts - discover/classic "after all" hook: afterTestSuite.trigger in "discover/classic" - A test failed on a tracked branch
```
NoSuchSessionError: invalid session id
at Object.throwDecodedError (node_modules/selenium-webdriver/lib/error.js:522:15)
at parseHttpResponse (node_modules/selenium-webdriver/lib/http.js:589:13)
at Executor.execute (node_modules/selenium-webdriver/lib/http.js:514:28)
at runMicrotasks (<anonymous>)
at processTicksAndRejections (node:internal/process/task_queues:96:5)
at Task.exec (test/functional/services/remote/prevent_parallel_calls.ts:28:20) {
remoteStacktrace: '#0 0x5642cde32403 <unknown>\n' +
'#1 0x5642cdc3864b <unknown>\n' +
'#2 0x5642cdc62a0b <unknown>\n' +
'#3 0x5642cdc8d97c <unknown>\n' +
'#4 0x5642cdc8b620 <unknown>\n' +
'#5 0x5642cdc8ae47 <unknown>\n' +
'#6 0x5642cdc10584 <unknown>\n' +
'#7 0x5642cdc113e3 <unknown>\n' +
'#8 0x5642cde79e3d <unknown>\n' +
'#9 0x5642cde7cdb6 <unknown>\n' +
'#10 0x5642cde6313e <unknown>\n' +
'#11 0x5642cde7d9b5 <unknown>\n' +
'#12 0x5642cde57970 <unknown>\n' +
'#13 0x5642cdc100a5 <unknown>\n' +
'#14 0x7f91e86bd083 <unknown>\n'
}
```
First failure: [CI Build - 8.4](https://buildkite.com/elastic/kibana-on-merge/builds/19776#01828db3-5304-4342-9bb9-9a7540ae041e)
<!-- kibanaCiData = {"failed-test":{"test.class":"Chrome UI Functional Tests.test/functional/apps/discover/classic/indexยทts","test.name":"discover/classic \"after all\" hook: afterTestSuite.trigger in \"discover/classic\"","test.failCount":6}} --> | non_priority | failing test chrome ui functional tests test functional apps discover classic indexยทts discover classic after all hook aftertestsuite trigger in discover classic a test failed on a tracked branch nosuchsessionerror invalid session id at object throwdecodederror node modules selenium webdriver lib error js at parsehttpresponse node modules selenium webdriver lib http js at executor execute node modules selenium webdriver lib http js at runmicrotasks at processticksandrejections node internal process task queues at task exec test functional services remote prevent parallel calls ts remotestacktrace n n n n n n n n n n n n n n n first failure | 0 |
297,170 | 9,161,370,731 | IssuesEvent | 2019-03-01 10:16:49 | rubykube/barong | https://api.github.com/repos/rubykube/barong | closed | Ability to specify multiple cors in 1.8 | Priority: high | We need ability for few cors domain origins in `1-8-stable`.
| 1.0 | Ability to specify multiple cors in 1.8 - We need ability for few cors domain origins in `1-8-stable`.
| priority | ability to specify multiple cors in we need ability for few cors domain origins in stable | 1 |
687,710 | 23,536,131,008 | IssuesEvent | 2022-08-19 21:01:42 | googleapis/nodejs-dlp | https://api.github.com/repos/googleapis/nodejs-dlp | closed | test: should list jobs failed | type: bug priority: p1 api: dlp flakybot: issue | This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: ab636eb83dffe1d3c2122b6abfd52c6c324da62b
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/c426605a-6579-4071-b4f2-34039bf71e30), [Sponge](http://sponge2/c426605a-6579-4071-b4f2-34039bf71e30)
status: failed
<details><summary>Test output</summary><br><pre>expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/
AssertionError: expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/
at Context.<anonymous> (system-test/jobs.test.js:114:12)</pre></details> | 1.0 | test: should list jobs failed - This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: ab636eb83dffe1d3c2122b6abfd52c6c324da62b
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/c426605a-6579-4071-b4f2-34039bf71e30), [Sponge](http://sponge2/c426605a-6579-4071-b4f2-34039bf71e30)
status: failed
<details><summary>Test output</summary><br><pre>expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/
AssertionError: expected '' to match /Job projects\/(\w|-)+\/locations\/global\/dlpJobs\/\w-\d+ status: DONE/
at Context.<anonymous> (system-test/jobs.test.js:114:12)</pre></details> | priority | test should list jobs failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output expected to match job projects w locations global dlpjobs w d status done assertionerror expected to match job projects w locations global dlpjobs w d status done at context system test jobs test js | 1 |
321,174 | 9,794,475,932 | IssuesEvent | 2019-06-10 23:07:04 | ilevkivskyi/com2ann | https://api.github.com/repos/ilevkivskyi/com2ann | closed | Crash when first statement in a function body is a decorator (class or function) | bug priority-high | For example this crashes:
```python
def outer():
# type: () -> None
@wrapper
def inner():
# type: () -> None
pass
``` | 1.0 | Crash when first statement in a function body is a decorator (class or function) - For example this crashes:
```python
def outer():
# type: () -> None
@wrapper
def inner():
# type: () -> None
pass
``` | priority | crash when first statement in a function body is a decorator class or function for example this crashes python def outer type none wrapper def inner type none pass | 1 |
40,957 | 10,597,056,456 | IssuesEvent | 2019-10-09 23:06:02 | orbeon/orbeon-forms | https://api.github.com/repos/orbeon/orbeon-forms | opened | Native landscape mode support | Module: Form Builder Module: Form Runner Type: RFE | - [ ] "Wide Form" or "Landscape Form" option in Form Builder
- possibly there could also be a "PDF Only" option
- [ ] show wider editing area when in landscape
- [ ] test mode should also be wider
- [ ] runtime should be wider
- [ ] PDF should print in landscape mode when configured (see also #1733)
[+1 from customer](https://3.basecamp.com/3600924/buckets/7873395/messages/2104739509) | 1.0 | Native landscape mode support - - [ ] "Wide Form" or "Landscape Form" option in Form Builder
- possibly there could also be a "PDF Only" option
- [ ] show wider editing area when in landscape
- [ ] test mode should also be wider
- [ ] runtime should be wider
- [ ] PDF should print in landscape mode when configured (see also #1733)
[+1 from customer](https://3.basecamp.com/3600924/buckets/7873395/messages/2104739509) | non_priority | native landscape mode support wide form or landscape form option in form builder possibly there could also be a pdf only option show wider editing area when in landscape test mode should also be wider runtime should be wider pdf should print in landscape mode when configured see also | 0 |
308,090 | 9,430,089,585 | IssuesEvent | 2019-04-12 08:09:09 | TNG/ngqp | https://api.github.com/repos/TNG/ngqp | closed | Type and export improvements | Comp: Core Priority: Low Status: Accepted Type: Improvement | In our ControlValueAccessors,
1. Do not export the provider itself
2. Change the type from `any` to `Provider` | 1.0 | Type and export improvements - In our ControlValueAccessors,
1. Do not export the provider itself
2. Change the type from `any` to `Provider` | priority | type and export improvements in our controlvalueaccessors do not export the provider itself change the type from any to provider | 1 |
728,149 | 25,068,064,579 | IssuesEvent | 2022-11-07 09:55:41 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.walmart.com - site is not usable | browser-firefox priority-important engine-gecko | <!-- @browser: Firefox 106.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; rv:106.0) Gecko/20100101 Firefox/106.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/113549 -->
**URL**: https://www.walmart.com
**Browser / Version**: Firefox 106.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes Other
**Problem type**: Site is not usable
**Description**: Page not loading correctly
**Steps to Reproduce**:
ok after going to walmart.com I go to departements and search for lets say tires get a site error "uh-oh we are having technical problems try again" I try again and the page loads for about a second and then goes back to error page , I used brave browser with no problems why is this hapening? I use a vpn but even after disableing it it still does it
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | www.walmart.com - site is not usable - <!-- @browser: Firefox 106.0 -->
<!-- @ua_header: Mozilla/5.0 (Windows NT 10.0; rv:106.0) Gecko/20100101 Firefox/106.0 -->
<!-- @reported_with: unknown -->
<!-- @public_url: https://github.com/webcompat/web-bugs/issues/113549 -->
**URL**: https://www.walmart.com
**Browser / Version**: Firefox 106.0
**Operating System**: Windows 10
**Tested Another Browser**: Yes Other
**Problem type**: Site is not usable
**Description**: Page not loading correctly
**Steps to Reproduce**:
ok after going to walmart.com I go to departements and search for lets say tires get a site error "uh-oh we are having technical problems try again" I try again and the page loads for about a second and then goes back to error page , I used brave browser with no problems why is this hapening? I use a vpn but even after disableing it it still does it
<details>
<summary>Browser Configuration</summary>
<ul>
<li>None</li>
</ul>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | site is not usable url browser version firefox operating system windows tested another browser yes other problem type site is not usable description page not loading correctly steps to reproduce ok after going to walmart com i go to departements and search for lets say tires get a site error uh oh we are having technical problems try again i try again and the page loads for about a second and then goes back to error page i used brave browser with no problems why is this hapening i use a vpn but even after disableing it it still does it browser configuration none from with โค๏ธ | 1 |
97,772 | 28,497,885,507 | IssuesEvent | 2023-04-18 15:17:48 | deephaven/deephaven-core | https://api.github.com/repos/deephaven/deephaven-core | opened | Add build information to native application | feature request build | For benchmarking and other provenance use cases, it would be useful to have more build information at the application layer. This is related to #3704, but focused on the officially packaged server application(s).
This could likely be served via our non-published jars MANIFEST:
* `deephaven-server-jetty-app.jar` for the native application
* `deephaven-py-embedded-server-java-runtime.jar` for the python embedded server
There's an argument we could make that it should be a simple file to make it more accessible to non java tooling (for example, to create `etc/deephaven-build.txt`). That said, it's pretty easy to extract using common tooling:
```
unzip -q -c lib/deephaven-server-jetty-app-0.23.0.jar META-INF/MANIFEST.MF
``` | 1.0 | Add build information to native application - For benchmarking and other provenance use cases, it would be useful to have more build information at the application layer. This is related to #3704, but focused on the officially packaged server application(s).
This could likely be served via our non-published jars MANIFEST:
* `deephaven-server-jetty-app.jar` for the native application
* `deephaven-py-embedded-server-java-runtime.jar` for the python embedded server
There's an argument we could make that it should be a simple file to make it more accessible to non java tooling (for example, to create `etc/deephaven-build.txt`). That said, it's pretty easy to extract using common tooling:
```
unzip -q -c lib/deephaven-server-jetty-app-0.23.0.jar META-INF/MANIFEST.MF
``` | non_priority | add build information to native application for benchmarking and other provenance use cases it would be useful to have more build information at the application layer this is related to but focused on the officially packaged server application s this could likely be served via our non published jars manifest deephaven server jetty app jar for the native application deephaven py embedded server java runtime jar for the python embedded server there s an argument we could make that it should be a simple file to make it more accessible to non java tooling for example to create etc deephaven build txt that said it s pretty easy to extract using common tooling unzip q c lib deephaven server jetty app jar meta inf manifest mf | 0 |
126,917 | 12,302,161,037 | IssuesEvent | 2020-05-11 16:30:40 | microsoft/MixedRealityToolkit-Unity | https://api.github.com/repos/microsoft/MixedRealityToolkit-Unity | closed | MRTK 2.4 Release Notes Missing ObjectManipulator and BoundsControl | Documentation Release Blocker | ## Describe the issue
Our 2.4 release notes are missing the awesome new ObjectManipulator graduation from @thalbern and @MenelvagorMilsom. We should mention these as they are much cleaner than ManipulationHandler and BoundingBox.
| 1.0 | MRTK 2.4 Release Notes Missing ObjectManipulator and BoundsControl - ## Describe the issue
Our 2.4 release notes are missing the awesome new ObjectManipulator graduation from @thalbern and @MenelvagorMilsom. We should mention these as they are much cleaner than ManipulationHandler and BoundingBox.
| non_priority | mrtk release notes missing objectmanipulator and boundscontrol describe the issue our release notes are missing the awesome new objectmanipulator graduation from thalbern and menelvagormilsom we should mention these as they are much cleaner than manipulationhandler and boundingbox | 0 |
658,490 | 21,894,695,896 | IssuesEvent | 2022-05-20 07:26:18 | bounswe/bounswe2022group3 | https://api.github.com/repos/bounswe/bounswe2022group3 | closed | [Practice App]: Containerization of the application | priority: moderate effort: moderate practice-app | We will deploy our app in docker containers. We need dockerfiles and docker-compose files to have a consistent and pre-configured deployment environment.
## Server
- [x] Create Dockerfile
- [x] Create Docker-compose file
- [x] Configure env variables and credentials
## Client
- [x] Create Dockerfile
- [x] Create Docker-compose file
- [x] Configure env variables and credentials
Deadline: 20.05.2022 | 1.0 | [Practice App]: Containerization of the application - We will deploy our app in docker containers. We need dockerfiles and docker-compose files to have a consistent and pre-configured deployment environment.
## Server
- [x] Create Dockerfile
- [x] Create Docker-compose file
- [x] Configure env variables and credentials
## Client
- [x] Create Dockerfile
- [x] Create Docker-compose file
- [x] Configure env variables and credentials
Deadline: 20.05.2022 | priority | containerization of the application we will deploy our app in docker containers we need dockerfiles and docker compose files to have a consistent and pre configured deployment environment server create dockerfile create docker compose file configure env variables and credentials client create dockerfile create docker compose file configure env variables and credentials deadline | 1 |
159,132 | 6,041,033,061 | IssuesEvent | 2017-06-10 20:02:29 | tatools/sunshine | https://api.github.com/repos/tatools/sunshine | closed | Public classes have to be final | Priority 1 | Declare all public classes as final to prevent 'bad' coding in future. | 1.0 | Public classes have to be final - Declare all public classes as final to prevent 'bad' coding in future. | priority | public classes have to be final declare all public classes as final to prevent bad coding in future | 1 |
361,221 | 10,705,888,564 | IssuesEvent | 2019-10-24 14:28:35 | pravega/pravega | https://api.github.com/repos/pravega/pravega | closed | Sporadic build failure: HDFSIntegrationTest> testEndToEndWithFencing | area/tier2 kind/bug priority/P1 version/0.6.0 version/0.7.0 | **Problem description**
This test failed on travis:
```
io.pravega.segmentstore.server.host.HDFSIntegrationTest > testEndToEndWithFencing FAILED
java.util.concurrent.CompletionException: java.util.concurrent.CancellationException: OperationProcessor is shutting down.
Caused by:java.util.concurrent.CancellationException: OperationProcessor is shutting down.
```
**Problem location**
HDFSIntegrationTest
**Suggestions for an improvement**
The test should pass consistently | 1.0 | Sporadic build failure: HDFSIntegrationTest> testEndToEndWithFencing - **Problem description**
This test failed on travis:
```
io.pravega.segmentstore.server.host.HDFSIntegrationTest > testEndToEndWithFencing FAILED
java.util.concurrent.CompletionException: java.util.concurrent.CancellationException: OperationProcessor is shutting down.
Caused by:java.util.concurrent.CancellationException: OperationProcessor is shutting down.
```
**Problem location**
HDFSIntegrationTest
**Suggestions for an improvement**
The test should pass consistently | priority | sporadic build failure hdfsintegrationtest testendtoendwithfencing problem description this test failed on travis io pravega segmentstore server host hdfsintegrationtest testendtoendwithfencing failed java util concurrent completionexception java util concurrent cancellationexception operationprocessor is shutting down caused by java util concurrent cancellationexception operationprocessor is shutting down problem location hdfsintegrationtest suggestions for an improvement the test should pass consistently | 1 |
249,334 | 18,858,184,796 | IssuesEvent | 2021-11-12 09:28:47 | YEOWEIHNGWHYELAB/pe | https://api.github.com/repos/YEOWEIHNGWHYELAB/pe | opened | DG's flow of content can be organized better. | severity.Low type.DocumentationBug | The product scope should be the first thing to be stated in the document so that developers know better about how this app will be deigned to suit the target audience. Glossary can be placed at the very end.
<!--session: 1636704749765-5400e6d5-3fc4-4aa2-81f0-3dd47a07d11c-->
<!--Version: Web v3.4.1--> | 1.0 | DG's flow of content can be organized better. - The product scope should be the first thing to be stated in the document so that developers know better about how this app will be deigned to suit the target audience. Glossary can be placed at the very end.
<!--session: 1636704749765-5400e6d5-3fc4-4aa2-81f0-3dd47a07d11c-->
<!--Version: Web v3.4.1--> | non_priority | dg s flow of content can be organized better the product scope should be the first thing to be stated in the document so that developers know better about how this app will be deigned to suit the target audience glossary can be placed at the very end | 0 |
244,244 | 7,872,541,801 | IssuesEvent | 2018-06-25 11:36:55 | VulcanForge/pvp-mode | https://api.github.com/repos/VulcanForge/pvp-mode | opened | Players with PvP Mode ON determine use of proximity info | improvement medium priority new feature | Provide a command '/pvp radar' for players with PvP Mode ON to toggle showing (ON) / not showing (OFF) the proximity info of themselves and other players with PvP Mode ON. If a player toggles it ON, his proximity is shown to all players with PvP Mode ON, and (s)he gets the proximity info of all other players with PvP Mode ON when using /pvplist.
This empowers players who prefer PvP, but wish to be hard to find at times, to decide for themselves if they can actively hunt and get actively hunted with assistance of player proximity info. | 1.0 | Players with PvP Mode ON determine use of proximity info - Provide a command '/pvp radar' for players with PvP Mode ON to toggle showing (ON) / not showing (OFF) the proximity info of themselves and other players with PvP Mode ON. If a player toggles it ON, his proximity is shown to all players with PvP Mode ON, and (s)he gets the proximity info of all other players with PvP Mode ON when using /pvplist.
This empowers players who prefer PvP, but wish to be hard to find at times, to decide for themselves if they can actively hunt and get actively hunted with assistance of player proximity info. | priority | players with pvp mode on determine use of proximity info provide a command pvp radar for players with pvp mode on to toggle showing on not showing off the proximity info of themselves and other players with pvp mode on if a player toggles it on his proximity is shown to all players with pvp mode on and s he gets the proximity info of all other players with pvp mode on when using pvplist this empowers players who prefer pvp but wish to be hard to find at times to decide for themselves if they can actively hunt and get actively hunted with assistance of player proximity info | 1 |
230,280 | 25,460,677,657 | IssuesEvent | 2022-11-24 18:33:11 | billmcchesney1/singleton | https://api.github.com/repos/billmcchesney1/singleton | opened | CVE-2022-41946 (Medium) detected in postgresql-42.2.16.jar | security vulnerability | ## CVE-2022-41946 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresql-42.2.16.jar</b></p></summary>
<p>PostgreSQL JDBC Driver Postgresql</p>
<p>Library home page: <a href="https://jdbc.postgresql.org">https://jdbc.postgresql.org</a></p>
<p>Path to dependency file: /g11n-ws/modules/md-data-initdb/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.16/a9ee12f737bd5dc7d046e4c065e391d38d6a3cfc/postgresql-42.2.16.jar</p>
<p>
Dependency Hierarchy:
- md-data-api-pgimpl-1.0 (Root Library)
- :x: **postgresql-42.2.16.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/singleton/commit/2bb883ae0b199f3e432621e91d0f801cfc406a89">2bb883ae0b199f3e432621e91d0f801cfc406a89</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability.
<p>Publish Date: 2022-11-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41946>CVE-2022-41946</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h">https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h</a></p>
<p>Release Date: 2022-11-23</p>
<p>Fix Resolution: org.postgresql:postgresql:42.2.27,42.3.8,42.4.3,42.5.1</p>
</p>
</details>
<p></p>
| True | CVE-2022-41946 (Medium) detected in postgresql-42.2.16.jar - ## CVE-2022-41946 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>postgresql-42.2.16.jar</b></p></summary>
<p>PostgreSQL JDBC Driver Postgresql</p>
<p>Library home page: <a href="https://jdbc.postgresql.org">https://jdbc.postgresql.org</a></p>
<p>Path to dependency file: /g11n-ws/modules/md-data-initdb/build.gradle</p>
<p>Path to vulnerable library: /home/wss-scanner/.gradle/caches/modules-2/files-2.1/org.postgresql/postgresql/42.2.16/a9ee12f737bd5dc7d046e4c065e391d38d6a3cfc/postgresql-42.2.16.jar</p>
<p>
Dependency Hierarchy:
- md-data-api-pgimpl-1.0 (Root Library)
- :x: **postgresql-42.2.16.jar** (Vulnerable Library)
<p>Found in HEAD commit: <a href="https://github.com/billmcchesney1/singleton/commit/2bb883ae0b199f3e432621e91d0f801cfc406a89">2bb883ae0b199f3e432621e91d0f801cfc406a89</a></p>
<p>Found in base branch: <b>master</b></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
pgjdbc is an open source postgresql JDBC Driver. In affected versions a prepared statement using either `PreparedStatement.setText(int, InputStream)` or `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 2k. This will create a temporary file which is readable by other users on Unix like systems, but not MacOS. On Unix like systems, the system's temporary directory is shared between all users on that system. Because of this, when files and directories are written into this directory they are, by default, readable by other users on that same system. This vulnerability does not allow other users to overwrite the contents of these directories or files. This is purely an information disclosure vulnerability. Because certain JDK file system APIs were only added in JDK 1.7, this this fix is dependent upon the version of the JDK you are using. Java 1.7 and higher users: this vulnerability is fixed in 4.5.0. Java 1.6 and lower users: no patch is available. If you are unable to patch, or are stuck running on Java 1.6, specifying the java.io.tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability.
<p>Publish Date: 2022-11-23
<p>URL: <a href=https://www.mend.io/vulnerability-database/CVE-2022-41946>CVE-2022-41946</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>4.7</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h">https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h</a></p>
<p>Release Date: 2022-11-23</p>
<p>Fix Resolution: org.postgresql:postgresql:42.2.27,42.3.8,42.4.3,42.5.1</p>
</p>
</details>
<p></p>
| non_priority | cve medium detected in postgresql jar cve medium severity vulnerability vulnerable library postgresql jar postgresql jdbc driver postgresql library home page a href path to dependency file ws modules md data initdb build gradle path to vulnerable library home wss scanner gradle caches modules files org postgresql postgresql postgresql jar dependency hierarchy md data api pgimpl root library x postgresql jar vulnerable library found in head commit a href found in base branch master vulnerability details pgjdbc is an open source postgresql jdbc driver in affected versions a prepared statement using either preparedstatement settext int inputstream or preparedstatemet setbytea int inputstream will create a temporary file if the inputstream is larger than this will create a temporary file which is readable by other users on unix like systems but not macos on unix like systems the system s temporary directory is shared between all users on that system because of this when files and directories are written into this directory they are by default readable by other users on that same system this vulnerability does not allow other users to overwrite the contents of these directories or files this is purely an information disclosure vulnerability because certain jdk file system apis were only added in jdk this this fix is dependent upon the version of the jdk you are using java and higher users this vulnerability is fixed in java and lower users no patch is available if you are unable to patch or are stuck running on java specifying the java io tmpdir system environment variable to a directory that is exclusively owned by the executing user will mitigate this vulnerability publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required low user interaction none scope unchanged impact metrics confidentiality impact high integrity impact none availability impact none for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution org postgresql postgresql | 0 |
9,876 | 8,736,582,338 | IssuesEvent | 2018-12-11 19:56:19 | HumanCellAtlas/dcp | https://api.github.com/repos/HumanCellAtlas/dcp | closed | M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported | Epic Secondary Analysis Service | Relates to:
M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported.
[See DCP-General Availability Document](https://docs.google.com/document/d/14gVAMscd0d8KgWqOO11Y1kSp4ztVavZXA7zrtrhyiW0/edit#)
| 1.0 | M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported - Relates to:
M1.9: Ensure analysis pipelines output logs in enough detail to diagnose errors when reported.
[See DCP-General Availability Document](https://docs.google.com/document/d/14gVAMscd0d8KgWqOO11Y1kSp4ztVavZXA7zrtrhyiW0/edit#)
| non_priority | ensure analysis pipelines output logs in enough detail to diagnose errors when reported relates to ensure analysis pipelines output logs in enough detail to diagnose errors when reported | 0 |
644,965 | 20,991,938,253 | IssuesEvent | 2022-03-29 10:04:24 | GoogleCloudPlatform/python-docs-samples | https://api.github.com/repos/GoogleCloudPlatform/python-docs-samples | opened | appengine.flexible.twilio.main_test: test_receive_sms failed | priority: p1 type: bug flakybot: issue | This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 3b6d797140afa6ca900a1e38a554795bfe800368
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/7e7321f5-302f-441b-b01b-0047fd05b625), [Sponge](http://sponge2/7e7321f5-302f-441b-b01b-0047fd05b625)
status: failed
<details><summary>Test output</summary><br><pre>Traceback (most recent call last):
File "/workspace/appengine/flexible/twilio/main_test.py", line 75, in test_receive_sms
'From': '5558675309', 'Body': 'Jenny, I got your number.'})
File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1139, in post
return self.open(*args, **kw)
File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/flask/testing.py", line 220, in open
follow_redirects=follow_redirects,
File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1081, in open
builder = EnvironBuilder(*args, **kwargs)
TypeError: __init__() got an unexpected keyword argument 'as_tuple'</pre></details> | 1.0 | appengine.flexible.twilio.main_test: test_receive_sms failed - This test failed!
To configure my behavior, see [the Flaky Bot documentation](https://github.com/googleapis/repo-automation-bots/tree/main/packages/flakybot).
If I'm commenting on this issue too often, add the `flakybot: quiet` label and
I will stop commenting.
---
commit: 3b6d797140afa6ca900a1e38a554795bfe800368
buildURL: [Build Status](https://source.cloud.google.com/results/invocations/7e7321f5-302f-441b-b01b-0047fd05b625), [Sponge](http://sponge2/7e7321f5-302f-441b-b01b-0047fd05b625)
status: failed
<details><summary>Test output</summary><br><pre>Traceback (most recent call last):
File "/workspace/appengine/flexible/twilio/main_test.py", line 75, in test_receive_sms
'From': '5558675309', 'Body': 'Jenny, I got your number.'})
File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1139, in post
return self.open(*args, **kw)
File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/flask/testing.py", line 220, in open
follow_redirects=follow_redirects,
File "/workspace/appengine/flexible/twilio/.nox/py-3-7/lib/python3.7/site-packages/werkzeug/test.py", line 1081, in open
builder = EnvironBuilder(*args, **kwargs)
TypeError: __init__() got an unexpected keyword argument 'as_tuple'</pre></details> | priority | appengine flexible twilio main test test receive sms failed this test failed to configure my behavior see if i m commenting on this issue too often add the flakybot quiet label and i will stop commenting commit buildurl status failed test output traceback most recent call last file workspace appengine flexible twilio main test py line in test receive sms from body jenny i got your number file workspace appengine flexible twilio nox py lib site packages werkzeug test py line in post return self open args kw file workspace appengine flexible twilio nox py lib site packages flask testing py line in open follow redirects follow redirects file workspace appengine flexible twilio nox py lib site packages werkzeug test py line in open builder environbuilder args kwargs typeerror init got an unexpected keyword argument as tuple | 1 |
792,551 | 27,965,253,380 | IssuesEvent | 2023-03-24 18:54:41 | sunpy/sunpy | https://api.github.com/repos/sunpy/sunpy | closed | Provide easier access to valid TimeSeries source keywords | Feature Request Package Novice Priority Low Effort Medium timeseries Hacktoberfest Good First Issue | <!--
We know asking good questions takes effort, and we appreciate your time.
Thank you.
Please be aware that everyone has to follow our code of conduct:
https://github.com/sunpy/sunpy/blob/master/CODE_OF_CONDUCT.rst
Also that these comments are hidden when you submit this github issue.
Please have a search on our GitHub repository to see if a similar issue has already been posted.
If a similar issue is closed, have a quick look to see if you are satisfied by the resolution.
If not please go ahead and open an issue!
-->
### Description
<!--
Provide a general description of the feature you would like.
If you prefer, you can also suggest a draft design or API.
This way we have a deeper discussion on the feature.
-->
I suggest that it should be shown at the top when a user inputs the command
```python
help(TimeSeries)
```
### Additional context
<!--
Add any other context or screenshots
This part is optional.
Delete this section heading if you do not use it.
-->
| 1.0 | Provide easier access to valid TimeSeries source keywords - <!--
We know asking good questions takes effort, and we appreciate your time.
Thank you.
Please be aware that everyone has to follow our code of conduct:
https://github.com/sunpy/sunpy/blob/master/CODE_OF_CONDUCT.rst
Also that these comments are hidden when you submit this github issue.
Please have a search on our GitHub repository to see if a similar issue has already been posted.
If a similar issue is closed, have a quick look to see if you are satisfied by the resolution.
If not please go ahead and open an issue!
-->
### Description
<!--
Provide a general description of the feature you would like.
If you prefer, you can also suggest a draft design or API.
This way we have a deeper discussion on the feature.
-->
I suggest that it should be shown at the top when a user inputs the command
```python
help(TimeSeries)
```
### Additional context
<!--
Add any other context or screenshots
This part is optional.
Delete this section heading if you do not use it.
-->
| priority | provide easier access to valid timeseries source keywords we know asking good questions takes effort and we appreciate your time thank you please be aware that everyone has to follow our code of conduct also that these comments are hidden when you submit this github issue please have a search on our github repository to see if a similar issue has already been posted if a similar issue is closed have a quick look to see if you are satisfied by the resolution if not please go ahead and open an issue description provide a general description of the feature you would like if you prefer you can also suggest a draft design or api this way we have a deeper discussion on the feature i suggest that it should be shown at the top when a user inputs the command python help timeseries additional context add any other context or screenshots this part is optional delete this section heading if you do not use it | 1 |
18,627 | 10,166,975,014 | IssuesEvent | 2019-08-07 17:04:26 | PrometheusClientNet/Prometheus.Client | https://api.github.com/repos/PrometheusClientNet/Prometheus.Client | opened | Consider cache encoded strings in MetricsWriter | enhancement performance | As it shown by benchmarks it takes lots of time to encode strings while scrape processing. Consider to implement some caching layer to hold encoded values to improve the performance. | True | Consider cache encoded strings in MetricsWriter - As it shown by benchmarks it takes lots of time to encode strings while scrape processing. Consider to implement some caching layer to hold encoded values to improve the performance. | non_priority | consider cache encoded strings in metricswriter as it shown by benchmarks it takes lots of time to encode strings while scrape processing consider to implement some caching layer to hold encoded values to improve the performance | 0 |
435,629 | 30,510,702,220 | IssuesEvent | 2023-07-18 20:35:18 | cd-moj/cd-moj.docs | https://api.github.com/repos/cd-moj/cd-moj.docs | closed | [Doc]: Criaรงรฃo de guia de contribuiรงรฃo | documentation good first issue | **Descriรงรฃo**
Criar um guia de contribuiรงรฃo para padronizar a criaรงรฃo de issues e commits realizados, alรฉm de mostrar como contribuir.
**Tarefas :**
- [x] Criar o arquivo do guia de contribuiรงรฃo na documentaรงรฃo;
- [x] Realizar o deploy;
| 1.0 | [Doc]: Criaรงรฃo de guia de contribuiรงรฃo - **Descriรงรฃo**
Criar um guia de contribuiรงรฃo para padronizar a criaรงรฃo de issues e commits realizados, alรฉm de mostrar como contribuir.
**Tarefas :**
- [x] Criar o arquivo do guia de contribuiรงรฃo na documentaรงรฃo;
- [x] Realizar o deploy;
| non_priority | criaรงรฃo de guia de contribuiรงรฃo descriรงรฃo criar um guia de contribuiรงรฃo para padronizar a criaรงรฃo de issues e commits realizados alรฉm de mostrar como contribuir tarefas criar o arquivo do guia de contribuiรงรฃo na documentaรงรฃo realizar o deploy | 0 |
140,114 | 5,397,252,041 | IssuesEvent | 2017-02-27 14:12:56 | g8os/fs | https://api.github.com/repos/g8os/fs | closed | New Flist implementation | priority_major state_verification type_feature | fs should support the new flist format.
This new flist format is based on capnp and distributed in the form of a rocksdb DB files.
Jumpscale is still used to generate the flist. You can find reference implementation at https://github.com/Jumpscale/jumpscale_core8/tree/8.2.0_dev_flist/lib/JumpScale/tools/flist | 1.0 | New Flist implementation - fs should support the new flist format.
This new flist format is based on capnp and distributed in the form of a rocksdb DB files.
Jumpscale is still used to generate the flist. You can find reference implementation at https://github.com/Jumpscale/jumpscale_core8/tree/8.2.0_dev_flist/lib/JumpScale/tools/flist | priority | new flist implementation fs should support the new flist format this new flist format is based on capnp and distributed in the form of a rocksdb db files jumpscale is still used to generate the flist you can find reference implementation at | 1 |
377,141 | 11,165,079,879 | IssuesEvent | 2019-12-27 07:59:01 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | m.mobile.de - site is not usable | browser-firefox-mobile engine-gecko ml-needsdiagnosis-false ml-probability-high priority-important | <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://m.mobile.de/lkw-inserat/mercedes-benz-lf-409-so-kfz-l%C3%B6schfahrzeug-mit-feuerl%C3%B6schpumpe-n%C3%BCrnberg/279478145.html?ref=srp
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: links to detailed view falls mostly
**Steps to Reproduce**:
When one wants to see The Details oft a car of interest and click onto it the NEW Page ist empty mostly in Very rare cases it works
[](https://webcompat.com/uploads/2019/12/b3ed1c82-f0c6-48c4-98d3-751339c17b0d.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191222171214</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2019/12/b3e50aba-2ee8-45ac-953a-76d5bd2be42c)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | m.mobile.de - site is not usable - <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 9; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://m.mobile.de/lkw-inserat/mercedes-benz-lf-409-so-kfz-l%C3%B6schfahrzeug-mit-feuerl%C3%B6schpumpe-n%C3%BCrnberg/279478145.html?ref=srp
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: Yes
**Problem type**: Site is not usable
**Description**: links to detailed view falls mostly
**Steps to Reproduce**:
When one wants to see The Details oft a car of interest and click onto it the NEW Page ist empty mostly in Very rare cases it works
[](https://webcompat.com/uploads/2019/12/b3ed1c82-f0c6-48c4-98d3-751339c17b0d.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191222171214</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
</details>
[View console log messages](https://webcompat.com/console_logs/2019/12/b3e50aba-2ee8-45ac-953a-76d5bd2be42c)
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | m mobile de site is not usable url browser version firefox mobile operating system android tested another browser yes problem type site is not usable description links to detailed view falls mostly steps to reproduce when one wants to see the details oft a car of interest and click onto it the new page ist empty mostly in very rare cases it works browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false from with โค๏ธ | 1 |
176,385 | 6,558,869,421 | IssuesEvent | 2017-09-06 23:48:20 | washingtonstateuniversity/WSUWP-Plugin-iDonate | https://api.github.com/repos/washingtonstateuniversity/WSUWP-Plugin-iDonate | opened | Update iDonate Data Tags | priority: 1 severity: 2 - High | We are currently using extra data tags that we don't need for single designations, which may be causing some additional issues. See below for a response from iDonate
For single designations, should we only use data-designation and set the data-cash-default to pass in the amount? Currently, we also set data-designations.
Yes only setting data-designation for single designation donations.
Data-gift-arrays โ What is this tag doing and when should we use it? Is the second number in the array a gift amount?
This is for the different options that are presented to the user. data-gift_arrays=โ[[โTitleโ,Amount],[โTitleโ,Amount]]โ
data-cash_default=โ150โ //this should be set to one of the available amounts, it will preselect, note the underscore and not a hyphen
We'll still want to set data-cash_default, but we should remove the data-designations and data-gift-arrays tags. | 1.0 | Update iDonate Data Tags - We are currently using extra data tags that we don't need for single designations, which may be causing some additional issues. See below for a response from iDonate
For single designations, should we only use data-designation and set the data-cash-default to pass in the amount? Currently, we also set data-designations.
Yes only setting data-designation for single designation donations.
Data-gift-arrays โ What is this tag doing and when should we use it? Is the second number in the array a gift amount?
This is for the different options that are presented to the user. data-gift_arrays=โ[[โTitleโ,Amount],[โTitleโ,Amount]]โ
data-cash_default=โ150โ //this should be set to one of the available amounts, it will preselect, note the underscore and not a hyphen
We'll still want to set data-cash_default, but we should remove the data-designations and data-gift-arrays tags. | priority | update idonate data tags we are currently using extra data tags that we don t need for single designations which may be causing some additional issues see below for a response from idonate for single designations should we only use data designation and set the data cash default to pass in the amount currently we also set data designations yes only setting data designation for single designation donations data gift arrays โ what is this tag doing and when should we use it is the second number in the array a gift amount this is for the different options that are presented to the user data gift arrays โ โ data cash default โ โ this should be set to one of the available amounts it will preselect note the underscore and not a hyphen we ll still want to set data cash default but we should remove the data designations and data gift arrays tags | 1 |
445,895 | 12,837,778,498 | IssuesEvent | 2020-07-07 16:19:07 | hydroshare/hydroshare | https://api.github.com/repos/hydroshare/hydroshare | closed | bag it creation fails for resource with hidden chararacter in title | High Priority bug | @Castronova discover that for this resource https://www.hydroshare.org/resource/1fedd80cd20245409a0ea02cc2a1ecf0/ downloading as a bagit file fails . Downloading a simple zip works. I did some resource and the title does contain hidden characters:
Achieving Reproducible Computational Hydrologic Models by Integrating Scientific Cyberinfrastructures
Testing on beta by removing the characters does indeed solve the problem and the BagIt file creates correctly.
we should consider to
1. add additional checks to sanitize the title and other textfields
2. develop a management script to remove illegal characters | 1.0 | bag it creation fails for resource with hidden chararacter in title - @Castronova discover that for this resource https://www.hydroshare.org/resource/1fedd80cd20245409a0ea02cc2a1ecf0/ downloading as a bagit file fails . Downloading a simple zip works. I did some resource and the title does contain hidden characters:
Achieving Reproducible Computational Hydrologic Models by Integrating Scientific Cyberinfrastructures
Testing on beta by removing the characters does indeed solve the problem and the BagIt file creates correctly.
we should consider to
1. add additional checks to sanitize the title and other textfields
2. develop a management script to remove illegal characters | priority | bag it creation fails for resource with hidden chararacter in title castronova discover that for this resource downloading as a bagit file fails downloading a simple zip works i did some resource and the title does contain hidden characters achieving reproducible computational hydrologic models by integrating scientific cyberinfrastructures testing on beta by removing the characters does indeed solve the problem and the bagit file creates correctly we should consider to add additional checks to sanitize the title and other textfields develop a management script to remove illegal characters | 1 |
396,762 | 11,713,672,144 | IssuesEvent | 2020-03-09 10:46:20 | mozilla/addons | https://api.github.com/repos/mozilla/addons | closed | API does not permit uploading additional source archive (required for review) | component: api neverstale priority: p3 | If a webextension's source is obfuscated, the reviewing rules say that authors must upload a source archive for reviewers. Webpack and other ES6 transpilers count as obfuscation, so this will affect many addons.
### Describe the problem and steps to reproduce it:
I want to upload a source code archive as well as the bundled source via the API so that I can automatically deploy my addon to AMO.
### What happened?
The API has no such function. | 1.0 | API does not permit uploading additional source archive (required for review) - If a webextension's source is obfuscated, the reviewing rules say that authors must upload a source archive for reviewers. Webpack and other ES6 transpilers count as obfuscation, so this will affect many addons.
### Describe the problem and steps to reproduce it:
I want to upload a source code archive as well as the bundled source via the API so that I can automatically deploy my addon to AMO.
### What happened?
The API has no such function. | priority | api does not permit uploading additional source archive required for review if a webextension s source is obfuscated the reviewing rules say that authors must upload a source archive for reviewers webpack and other transpilers count as obfuscation so this will affect many addons describe the problem and steps to reproduce it i want to upload a source code archive as well as the bundled source via the api so that i can automatically deploy my addon to amo what happened the api has no such function | 1 |
311,783 | 9,539,182,938 | IssuesEvent | 2019-04-30 16:18:34 | zeit/ncc | https://api.github.com/repos/zeit/ncc | closed | Failed to build fluent-ffmpeg with Error: Can't resolve './lib-cov/fluent-ffmpeg' | committed package issue priority | ## Steps to reproduce
```
git clone https://github.com/styfle/ncc-bug-fluent-ffmpeg
cd ncc-bug-fluent-ffmpeg
yarn
ncc build index.js
```
## Output
```
ncc: Version 0.18.1
ncc: Compiling file index.js
Error: Hash: 010bf5d256da3ab07bed
Version: webpack 5.0.0-alpha.9
Time: 93ms
Built at: 04/24/2019 5:21:04 PM
Asset Size Chunks Chunk Names
index.js 301 KiB {404} main
Entrypoint main = index.js
[64] external "util" 42 bytes {404}
[123] ./node_modules/fluent-ffmpeg/lib/fluent-ffmpeg.js 6.31 KiB {404}
[170] ./node_modules/fluent-ffmpeg/lib/options/misc.js 933 bytes {404}
[172] ./node_modules/fluent-ffmpeg/lib/options/output.js 3.84 KiB {404}
[200] ./node_modules/fluent-ffmpeg/lib/options/videosize.js 7.58 KiB {404}
[300] ./node_modules/fluent-ffmpeg/lib/options/audio.js 3.86 KiB {404}
[318] ./index.js 631 bytes {404}
[417] ./node_modules/fluent-ffmpeg/lib/options/custom.js 6.54 KiB {404}
[421] external "http" 42 bytes {404}
[476] ./node_modules/fluent-ffmpeg/lib/options/video.js 4.02 KiB {404}
[477] ./node_modules/fluent-ffmpeg/lib/options/inputs.js 3.89 KiB {404}
[485] external "events" 42 bytes {404}
[573] ./node_modules/fluent-ffmpeg/lib/utils.js 12.9 KiB {404}
[589] external "path" 42 bytes {404}
[805] ./node_modules/fluent-ffmpeg/index.js 117 bytes {404}
+ 14 hidden modules
ERROR in ./node_modules/fluent-ffmpeg/index.js 1:48-82
Module not found: Error: Can't resolve './lib-cov/fluent-ffmpeg' in '/Users/styfle/Code/foo/ncc-bug-fluent-ffmpeg/node_modules/fluent-ffmpeg'
@ ./index.js 1:15-39
at compiler.close.n (evalmachine.<anonymous>:3:1350162)
at _promise0.then._result0 (eval at create (evalmachine.<anonymous>:1:349386), <anonymous>:13:1)
at process._tickCallback (internal/process/next_tick.js:68:7)
``` | 1.0 | Failed to build fluent-ffmpeg with Error: Can't resolve './lib-cov/fluent-ffmpeg' - ## Steps to reproduce
```
git clone https://github.com/styfle/ncc-bug-fluent-ffmpeg
cd ncc-bug-fluent-ffmpeg
yarn
ncc build index.js
```
## Output
```
ncc: Version 0.18.1
ncc: Compiling file index.js
Error: Hash: 010bf5d256da3ab07bed
Version: webpack 5.0.0-alpha.9
Time: 93ms
Built at: 04/24/2019 5:21:04 PM
Asset Size Chunks Chunk Names
index.js 301 KiB {404} main
Entrypoint main = index.js
[64] external "util" 42 bytes {404}
[123] ./node_modules/fluent-ffmpeg/lib/fluent-ffmpeg.js 6.31 KiB {404}
[170] ./node_modules/fluent-ffmpeg/lib/options/misc.js 933 bytes {404}
[172] ./node_modules/fluent-ffmpeg/lib/options/output.js 3.84 KiB {404}
[200] ./node_modules/fluent-ffmpeg/lib/options/videosize.js 7.58 KiB {404}
[300] ./node_modules/fluent-ffmpeg/lib/options/audio.js 3.86 KiB {404}
[318] ./index.js 631 bytes {404}
[417] ./node_modules/fluent-ffmpeg/lib/options/custom.js 6.54 KiB {404}
[421] external "http" 42 bytes {404}
[476] ./node_modules/fluent-ffmpeg/lib/options/video.js 4.02 KiB {404}
[477] ./node_modules/fluent-ffmpeg/lib/options/inputs.js 3.89 KiB {404}
[485] external "events" 42 bytes {404}
[573] ./node_modules/fluent-ffmpeg/lib/utils.js 12.9 KiB {404}
[589] external "path" 42 bytes {404}
[805] ./node_modules/fluent-ffmpeg/index.js 117 bytes {404}
+ 14 hidden modules
ERROR in ./node_modules/fluent-ffmpeg/index.js 1:48-82
Module not found: Error: Can't resolve './lib-cov/fluent-ffmpeg' in '/Users/styfle/Code/foo/ncc-bug-fluent-ffmpeg/node_modules/fluent-ffmpeg'
@ ./index.js 1:15-39
at compiler.close.n (evalmachine.<anonymous>:3:1350162)
at _promise0.then._result0 (eval at create (evalmachine.<anonymous>:1:349386), <anonymous>:13:1)
at process._tickCallback (internal/process/next_tick.js:68:7)
``` | priority | failed to build fluent ffmpeg with error can t resolve lib cov fluent ffmpeg steps to reproduce git clone cd ncc bug fluent ffmpeg yarn ncc build index js output ncc version ncc compiling file index js error hash version webpack alpha time built at pm asset size chunks chunk names index js kib main entrypoint main index js external util bytes node modules fluent ffmpeg lib fluent ffmpeg js kib node modules fluent ffmpeg lib options misc js bytes node modules fluent ffmpeg lib options output js kib node modules fluent ffmpeg lib options videosize js kib node modules fluent ffmpeg lib options audio js kib index js bytes node modules fluent ffmpeg lib options custom js kib external http bytes node modules fluent ffmpeg lib options video js kib node modules fluent ffmpeg lib options inputs js kib external events bytes node modules fluent ffmpeg lib utils js kib external path bytes node modules fluent ffmpeg index js bytes hidden modules error in node modules fluent ffmpeg index js module not found error can t resolve lib cov fluent ffmpeg in users styfle code foo ncc bug fluent ffmpeg node modules fluent ffmpeg index js at compiler close n evalmachine at then eval at create evalmachine at process tickcallback internal process next tick js | 1 |
291,690 | 25,167,017,989 | IssuesEvent | 2022-11-10 21:53:28 | devfile/api | https://api.github.com/repos/devfile/api | closed | Add schema validation to devfile community registry | area/test-automation | **Which area this feature is related to?**
/area test-automation
## Which functionality do you think we should add?
**Why is this needed? Is your feature request related to a problem?**
The existing devfile community registry test relies on functional tests, e.g. odo and others, to indirectly validate the devfiles in the registry to make sure that the devfiles in the registry conform to the devfile schema. However, when those tests fail, it is not immediately clear on the failure is caused by the invalid devfile or something else, e.g. failure to run by the tools.
Note: This item is based on the discussion on the devfile community call on 09/22: https://docs.google.com/document/d/1Zn6D1gNu1gDidtillni0hNAeU5pscfqwhx4mv3MmmwY/edit?pli=1#heading=h.ddgqx32cqyb8
**Detailed description:**
## Describe the solution you'd like
Explicitly run schema validation on the devfile entries in the devfile registry as part of the PR test to ensure all the devfiles in the public community registries are valid.
## Describe alternatives you've considered
Leave it as-is to indirect test as part of the tools test but it cannot correctly indicates the failure is caused by schema validation.
## Additional context
N/A
| 1.0 | Add schema validation to devfile community registry - **Which area this feature is related to?**
/area test-automation
## Which functionality do you think we should add?
**Why is this needed? Is your feature request related to a problem?**
The existing devfile community registry test relies on functional tests, e.g. odo and others, to indirectly validate the devfiles in the registry to make sure that the devfiles in the registry conform to the devfile schema. However, when those tests fail, it is not immediately clear on the failure is caused by the invalid devfile or something else, e.g. failure to run by the tools.
Note: This item is based on the discussion on the devfile community call on 09/22: https://docs.google.com/document/d/1Zn6D1gNu1gDidtillni0hNAeU5pscfqwhx4mv3MmmwY/edit?pli=1#heading=h.ddgqx32cqyb8
**Detailed description:**
## Describe the solution you'd like
Explicitly run schema validation on the devfile entries in the devfile registry as part of the PR test to ensure all the devfiles in the public community registries are valid.
## Describe alternatives you've considered
Leave it as-is to indirect test as part of the tools test but it cannot correctly indicates the failure is caused by schema validation.
## Additional context
N/A
| non_priority | add schema validation to devfile community registry which area this feature is related to area test automation which functionality do you think we should add why is this needed is your feature request related to a problem the existing devfile community registry test relies on functional tests e g odo and others to indirectly validate the devfiles in the registry to make sure that the devfiles in the registry conform to the devfile schema however when those tests fail it is not immediately clear on the failure is caused by the invalid devfile or something else e g failure to run by the tools note this item is based on the discussion on the devfile community call on detailed description describe the solution you d like explicitly run schema validation on the devfile entries in the devfile registry as part of the pr test to ensure all the devfiles in the public community registries are valid describe alternatives you ve considered leave it as is to indirect test as part of the tools test but it cannot correctly indicates the failure is caused by schema validation additional context n a | 0 |
736,660 | 25,482,085,854 | IssuesEvent | 2022-11-25 23:28:05 | Jexactyl/Jexactyl | https://api.github.com/repos/Jexactyl/Jexactyl | closed | Create server doesn't work after update | type: bug report priority: high | ### Current Behavior
When i try to create new server, i get error Unable to create this server. Please contact an administrator.
also, sometime if you write less ram etc, it sais Memory must be greater than or equal to 256 on all (256 instead of 4,096 RAM example)
### Expected Behavior
When you press create server it should create server
### Steps to Reproduce
For creation, go to store set it up and click create, error appears and server is not created
For the text bug, go to store set RAM, Disk to for example 4MB, you will see text Memory must be greater than or equal to 256 (this 256 is the bug)
### Panel Version
3.6.0
### Wings Version
1.7.2
### Games and/or Eggs Affected
Minecraft (all, bungee, paper etc)
### Docker Image
_No response_
### Error Logs
```bash
http://bin.ptdl.co/kr8n4
```
### Is there an existing issue for this?
- [X] I have searched the existing issues before opening this issue.
- [X] I have provided all relevant details, including the specific game and Docker images I am using if this issue is related to running a server.
- [X] I have checked in the Discord server and believe this is a bug with the software, and not a configuration issue with my specific system. | 1.0 | Create server doesn't work after update - ### Current Behavior
When i try to create new server, i get error Unable to create this server. Please contact an administrator.
also, sometime if you write less ram etc, it sais Memory must be greater than or equal to 256 on all (256 instead of 4,096 RAM example)
### Expected Behavior
When you press create server it should create server
### Steps to Reproduce
For creation, go to store set it up and click create, error appears and server is not created
For the text bug, go to store set RAM, Disk to for example 4MB, you will see text Memory must be greater than or equal to 256 (this 256 is the bug)
### Panel Version
3.6.0
### Wings Version
1.7.2
### Games and/or Eggs Affected
Minecraft (all, bungee, paper etc)
### Docker Image
_No response_
### Error Logs
```bash
http://bin.ptdl.co/kr8n4
```
### Is there an existing issue for this?
- [X] I have searched the existing issues before opening this issue.
- [X] I have provided all relevant details, including the specific game and Docker images I am using if this issue is related to running a server.
- [X] I have checked in the Discord server and believe this is a bug with the software, and not a configuration issue with my specific system. | priority | create server doesn t work after update current behavior when i try to create new server i get error unable to create this server please contact an administrator also sometime if you write less ram etc it sais memory must be greater than or equal to on all instead of ram example expected behavior when you press create server it should create server steps to reproduce for creation go to store set it up and click create error appears and server is not created for the text bug go to store set ram disk to for example you will see text memory must be greater than or equal to this is the bug panel version wings version games and or eggs affected minecraft all bungee paper etc docker image no response error logs bash is there an existing issue for this i have searched the existing issues before opening this issue i have provided all relevant details including the specific game and docker images i am using if this issue is related to running a server i have checked in the discord server and believe this is a bug with the software and not a configuration issue with my specific system | 1 |
90,065 | 11,341,110,922 | IssuesEvent | 2020-01-23 08:34:43 | microsoft/vscode | https://api.github.com/repos/microsoft/vscode | closed | comment codes within JSON | *as-designed json | Issue Type: <b>Bug</b>
In the below JSON, everything following the `/*` is interpreted as a multi-line comment.
{
'user-agent': 'python-requests/2.18.4',
'accept-encoding': 'gzip, deflate',
'accept': '\*/*',
'content-type': 'application/json'
}
VS Code version: Code 1.41.1 (26076a4de974ead31f97692a0d32f90d735645c0, 2019-12-18T14:57:51.166Z)
OS version: Darwin x64 19.2.0
<!-- generated by issue reporter --> | 1.0 | comment codes within JSON - Issue Type: <b>Bug</b>
In the below JSON, everything following the `/*` is interpreted as a multi-line comment.
{
'user-agent': 'python-requests/2.18.4',
'accept-encoding': 'gzip, deflate',
'accept': '\*/*',
'content-type': 'application/json'
}
VS Code version: Code 1.41.1 (26076a4de974ead31f97692a0d32f90d735645c0, 2019-12-18T14:57:51.166Z)
OS version: Darwin x64 19.2.0
<!-- generated by issue reporter --> | non_priority | comment codes within json issue type bug in the below json everything following the is interpreted as a multi line comment user agent python requests accept encoding gzip deflate accept content type application json vs code version code os version darwin | 0 |
656,155 | 21,722,039,730 | IssuesEvent | 2022-05-11 01:55:34 | grpc/grpc | https://api.github.com/repos/grpc/grpc | opened | shared library and global states | kind/question priority/P3 | Hello,
The problem is that grpc crashes in fallowing situation:
1. executable contains grpc server - static linking to grpc
2. library (dll) contains grpc services - static linking to grpc
Executable load dll via `QPluginLoader` that provides services.
In this use case grpc is initialized twice, once in main executable and second time in dll.
To work around this problem I had to pass `grpc::g_core_codegen_interface` from main executable to dll and in that situation all works fine (server resides in executable, invokes services that are located in dll).
Unfortunately this will not work if I want to initiate new `channel` from that dll service rpc method implementation, i.e.:
```
grpc::Status example(
grpc::ServerContext *context,
const proto::example::ExampleRequestDecimate *request,
grpc::ServerWriter<proto::example::ExampleResponseDecimated> *writer) override;
```
To make it work (instantiating new channel inside above rpc message) I have to store dll `grpc::g_core_codegen_interface` and switch between them. What I mean by this:
exe grpc server -> dll service -> grpc::Status example - using `grpc::g_core_codegen_interface` from executable to write messages
dll service -> grpc::Status example -> new proto::example2::NewStub - using `grpc::g_core_codegen_interface` from dll to invoke rpc command.
The main problem here is shared linkage and in above scenario issue with switching those `grpc::g_core_codegen_interface` with will most likely cause crash at some point.
My question is:
- is this use case valid ?
- any hints, excluding static linkage for service implementation instead of dll (via QPluginLoader), more then welcome
| 1.0 | shared library and global states - Hello,
The problem is that grpc crashes in fallowing situation:
1. executable contains grpc server - static linking to grpc
2. library (dll) contains grpc services - static linking to grpc
Executable load dll via `QPluginLoader` that provides services.
In this use case grpc is initialized twice, once in main executable and second time in dll.
To work around this problem I had to pass `grpc::g_core_codegen_interface` from main executable to dll and in that situation all works fine (server resides in executable, invokes services that are located in dll).
Unfortunately this will not work if I want to initiate new `channel` from that dll service rpc method implementation, i.e.:
```
grpc::Status example(
grpc::ServerContext *context,
const proto::example::ExampleRequestDecimate *request,
grpc::ServerWriter<proto::example::ExampleResponseDecimated> *writer) override;
```
To make it work (instantiating new channel inside above rpc message) I have to store dll `grpc::g_core_codegen_interface` and switch between them. What I mean by this:
exe grpc server -> dll service -> grpc::Status example - using `grpc::g_core_codegen_interface` from executable to write messages
dll service -> grpc::Status example -> new proto::example2::NewStub - using `grpc::g_core_codegen_interface` from dll to invoke rpc command.
The main problem here is shared linkage and in above scenario issue with switching those `grpc::g_core_codegen_interface` with will most likely cause crash at some point.
My question is:
- is this use case valid ?
- any hints, excluding static linkage for service implementation instead of dll (via QPluginLoader), more then welcome
| priority | shared library and global states hello the problem is that grpc crashes in fallowing situation executable contains grpc server static linking to grpc library dll contains grpc services static linking to grpc executable load dll via qpluginloader that provides services in this use case grpc is initialized twice once in main executable and second time in dll to work around this problem i had to pass grpc g core codegen interface from main executable to dll and in that situation all works fine server resides in executable invokes services that are located in dll unfortunately this will not work if i want to initiate new channel from that dll service rpc method implementation i e grpc status example grpc servercontext context const proto example examplerequestdecimate request grpc serverwriter writer override to make it work instantiating new channel inside above rpc message i have to store dll grpc g core codegen interface and switch between them what i mean by this exe grpc server dll service grpc status example using grpc g core codegen interface from executable to write messages dll service grpc status example new proto newstub using grpc g core codegen interface from dll to invoke rpc command the main problem here is shared linkage and in above scenario issue with switching those grpc g core codegen interface with will most likely cause crash at some point my question is is this use case valid any hints excluding static linkage for service implementation instead of dll via qpluginloader more then welcome | 1 |
540,270 | 15,803,538,098 | IssuesEvent | 2021-04-03 14:43:58 | zeoflow/flow-kit | https://api.github.com/repos/zeoflow/flow-kit | opened | Inside the *.app package the classes should implement lifecycle handlers | @bug @priority-very-low | **Description:** Inside the *.app package the classes should implement lifecycle handlers
###### To help us triage faster, please check to make sure you are using the [latest version](https://github.com/zeoflow/flow-kit/releases) of the library.
###### We also happily accept [pull requests](https://github.com/zeoflow/flow-kit/pulls).
| 1.0 | Inside the *.app package the classes should implement lifecycle handlers - **Description:** Inside the *.app package the classes should implement lifecycle handlers
###### To help us triage faster, please check to make sure you are using the [latest version](https://github.com/zeoflow/flow-kit/releases) of the library.
###### We also happily accept [pull requests](https://github.com/zeoflow/flow-kit/pulls).
| priority | inside the app package the classes should implement lifecycle handlers description inside the app package the classes should implement lifecycle handlers to help us triage faster please check to make sure you are using the of the library we also happily accept | 1 |
587,882 | 17,633,965,023 | IssuesEvent | 2021-08-19 11:34:03 | pingcap/tidb | https://api.github.com/repos/pingcap/tidb | closed | lightning endless loop and huge logs when there is UK duplicated items in tables with list partition. | type/bug priority/release-blocker severity/critical sig/migrate component/lightning | ## Bug Report
Please answer these questions before submitting your issue. Thanks!
### 1. Minimal reproduce step (Required)
- Use lightning to import tables with list partition, and there are duplicate items.
./tidb-lightning -config /minio/tools_test_data/list_partition_sample/lightning.toml
<!-- a step by step guide for reproducing the bug. -->
### 2. What did you expect to see? (Required)
- When there is duplicated items, lightning should fail quickly.
### 3. What did you see instead (Required)
- lightning endless loop, and generate lots of logs
[root@centos76_vm list_partition_sample]# grep "duplicated key found" *.log | more
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
[root@centos76_vm list_partition_sample]# du -shl *.log
513M tidb-lightning-2021-08-19T14-15-28.118.log
513M tidb-lightning-2021-08-19T14-16-34.172.log
513M tidb-lightning-2021-08-19T14-17-38.725.log
513M tidb-lightning-2021-08-19T14-18-43.035.log
513M tidb-lightning-2021-08-19T14-19-47.731.log
513M tidb-lightning-2021-08-19T14-20-52.501.log
513M tidb-lightning-2021-08-19T14-21-59.969.log
513M tidb-lightning-2021-08-19T14-23-04.200.log
513M tidb-lightning-2021-08-19T14-33-10.506.log
513M tidb-lightning-2021-08-19T14-34-19.252.log
513M tidb-lightning-2021-08-19T14-35-24.795.log
513M tidb-lightning-2021-08-19T14-36-30.362.log
513M tidb-lightning-2021-08-19T14-37-37.767.log
513M tidb-lightning-2021-08-19T14-38-42.938.log
### 4. What is your TiDB version? (Required)
5.0 master
| 1.0 | lightning endless loop and huge logs when there is UK duplicated items in tables with list partition. - ## Bug Report
Please answer these questions before submitting your issue. Thanks!
### 1. Minimal reproduce step (Required)
- Use lightning to import tables with list partition, and there are duplicate items.
./tidb-lightning -config /minio/tools_test_data/list_partition_sample/lightning.toml
<!-- a step by step guide for reproducing the bug. -->
### 2. What did you expect to see? (Required)
- When there is duplicated items, lightning should fail quickly.
### 3. What did you see instead (Required)
- lightning endless loop, and generate lots of logs
[root@centos76_vm list_partition_sample]# grep "duplicated key found" *.log | more
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
tidb-lightning-2021-08-19T14-15-28.118.log:[2021/08/19 14:14:20.758 +08:00] [WARN] [local.go:3144] ["duplicated key found, skipped"] [key="dIAAAAAAAAPFX3J/////////pA=="]
[root@centos76_vm list_partition_sample]# du -shl *.log
513M tidb-lightning-2021-08-19T14-15-28.118.log
513M tidb-lightning-2021-08-19T14-16-34.172.log
513M tidb-lightning-2021-08-19T14-17-38.725.log
513M tidb-lightning-2021-08-19T14-18-43.035.log
513M tidb-lightning-2021-08-19T14-19-47.731.log
513M tidb-lightning-2021-08-19T14-20-52.501.log
513M tidb-lightning-2021-08-19T14-21-59.969.log
513M tidb-lightning-2021-08-19T14-23-04.200.log
513M tidb-lightning-2021-08-19T14-33-10.506.log
513M tidb-lightning-2021-08-19T14-34-19.252.log
513M tidb-lightning-2021-08-19T14-35-24.795.log
513M tidb-lightning-2021-08-19T14-36-30.362.log
513M tidb-lightning-2021-08-19T14-37-37.767.log
513M tidb-lightning-2021-08-19T14-38-42.938.log
### 4. What is your TiDB version? (Required)
5.0 master
| priority | lightning endless loop and huge logs when there is uk duplicated items in tables with list partition bug report please answer these questions before submitting your issue thanks minimal reproduce step required use lightning to import tables with list partition and there are duplicate items tidb lightning config minio tools test data list partition sample lightning toml what did you expect to see required when there is duplicated items lightning should fail quickly what did you see instead required lightning endless loop and generate lots of logs grep duplicated key found log more tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log du shl log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log tidb lightning log what is your tidb version required master | 1 |
11,012 | 4,128,397,164 | IssuesEvent | 2016-06-10 06:03:33 | joomla/joomla-cms | https://api.github.com/repos/joomla/joomla-cms | closed | Joomla Backend login creates directory .pki in root of webserver | No Code Attached Yet | #### Steps to reproduce the issue
Login to Joomla v3.5.1 Backend creates directory .pki in the root of the webserver.
After deleting directory .pki, directory is created again during Joomla backend login.
#### Expected result
Not creating any directories during Joomla backend login.
#### Actual result
Creating of directory .pki in the fileserver root.
#### System information (as much as possible)
PHP Built On Linux webserver01.sylconia.nl 3.10.0-327.13.1.el7.x86_64 #1 SMP Thu Mar 31 16:04:38 UTC 2016 x86_64
Database Version 5.1.69-log
Database Collation latin1_swedish_ci
Database Connection Collation utf8_general_ci
PHP Version 5.6.22
Web Server Apache/2.4.6 (CentOS)
WebServer to PHP Interface fpm-fcgi
Joomla! Version Joomla! 3.5.1 Stable [ Unicorn ] 05-April-2016 22:45 GMT
Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT
User Agent Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
#### Additional comments
| 1.0 | Joomla Backend login creates directory .pki in root of webserver - #### Steps to reproduce the issue
Login to Joomla v3.5.1 Backend creates directory .pki in the root of the webserver.
After deleting directory .pki, directory is created again during Joomla backend login.
#### Expected result
Not creating any directories during Joomla backend login.
#### Actual result
Creating of directory .pki in the fileserver root.
#### System information (as much as possible)
PHP Built On Linux webserver01.sylconia.nl 3.10.0-327.13.1.el7.x86_64 #1 SMP Thu Mar 31 16:04:38 UTC 2016 x86_64
Database Version 5.1.69-log
Database Collation latin1_swedish_ci
Database Connection Collation utf8_general_ci
PHP Version 5.6.22
Web Server Apache/2.4.6 (CentOS)
WebServer to PHP Interface fpm-fcgi
Joomla! Version Joomla! 3.5.1 Stable [ Unicorn ] 05-April-2016 22:45 GMT
Joomla! Platform Version Joomla Platform 13.1.0 Stable [ Curiosity ] 24-Apr-2013 00:00 GMT
User Agent Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
#### Additional comments
| non_priority | joomla backend login creates directory pki in root of webserver steps to reproduce the issue login to joomla backend creates directory pki in the root of the webserver after deleting directory pki directory is created again during joomla backend login expected result not creating any directories during joomla backend login actual result creating of directory pki in the fileserver root system information as much as possible php built on linux sylconia nl smp thu mar utc database version log database collation swedish ci database connection collation general ci php version web server apache centos webserver to php interface fpm fcgi joomla version joomla stable april gmt joomla platform version joomla platform stable apr gmt user agent mozilla windows nt trident rv like gecko additional comments | 0 |
424,597 | 12,313,450,694 | IssuesEvent | 2020-05-12 15:19:27 | CDH-Studio/UpSkill | https://api.github.com/repos/CDH-Studio/UpSkill | closed | Implement CI\CD | Low Priority enhancement | Look into adding CI/CD probably with GitHub Actions verifying the application build and if the tests pass. | 1.0 | Implement CI\CD - Look into adding CI/CD probably with GitHub Actions verifying the application build and if the tests pass. | priority | implement ci cd look into adding ci cd probably with github actions verifying the application build and if the tests pass | 1 |
8,205 | 26,453,349,575 | IssuesEvent | 2023-01-16 12:52:02 | rancher/elemental | https://api.github.com/repos/rancher/elemental | closed | Research - Use autoscaling for self-hosted runners in public cloud | area/automation kind/QA | Right now, we have self hosted runners in the public cloud, the machines is started and stopped on demand.
It is a good first step but when we will add more tests, we will need something better.
We can think about autoscaling the runners, it is possible with the Github API and there are some resources on how to achieve it.
For instance:
https://www.dev-eth0.de/2021/03/09/autoscaling-gitlab-runner-instances-on-google-cloud-platform/
https://medium.com/philips-technology-blog/scaling-github-action-runners-a4a45f7c67a6
https://github.blog/changelog/2021-09-20-github-actions-ephemeral-self-hosted-runners-new-webhooks-for-auto-scaling/
But it's low priority at the moment. | 1.0 | Research - Use autoscaling for self-hosted runners in public cloud - Right now, we have self hosted runners in the public cloud, the machines is started and stopped on demand.
It is a good first step but when we will add more tests, we will need something better.
We can think about autoscaling the runners, it is possible with the Github API and there are some resources on how to achieve it.
For instance:
https://www.dev-eth0.de/2021/03/09/autoscaling-gitlab-runner-instances-on-google-cloud-platform/
https://medium.com/philips-technology-blog/scaling-github-action-runners-a4a45f7c67a6
https://github.blog/changelog/2021-09-20-github-actions-ephemeral-self-hosted-runners-new-webhooks-for-auto-scaling/
But it's low priority at the moment. | non_priority | research use autoscaling for self hosted runners in public cloud right now we have self hosted runners in the public cloud the machines is started and stopped on demand it is a good first step but when we will add more tests we will need something better we can think about autoscaling the runners it is possible with the github api and there are some resources on how to achieve it for instance but it s low priority at the moment | 0 |
360,453 | 25,290,255,958 | IssuesEvent | 2022-11-16 23:17:36 | primefaces/primeng | https://api.github.com/repos/primefaces/primeng | closed | Component: InputTextarea (Documentation) | Component: Documentation | ### Describe the bug
The documentation for InputTextarea has autoResize as a string in the example, it should be a boolean.
### Environment
N/A
### Reproducer
_No response_
### Angular version
14.2.7
### PrimeNG version
14.2.2
### Build / Runtime
Angular CLI App
### Language
ALL
### Node version (for AoT issues node --version)
16.14.2
### Browser(s)
_No response_
### Steps to reproduce the behavior
_No response_
### Expected behavior
_No response_ | 1.0 | Component: InputTextarea (Documentation) - ### Describe the bug
The documentation for InputTextarea has autoResize as a string in the example, it should be a boolean.
### Environment
N/A
### Reproducer
_No response_
### Angular version
14.2.7
### PrimeNG version
14.2.2
### Build / Runtime
Angular CLI App
### Language
ALL
### Node version (for AoT issues node --version)
16.14.2
### Browser(s)
_No response_
### Steps to reproduce the behavior
_No response_
### Expected behavior
_No response_ | non_priority | component inputtextarea documentation describe the bug the documentation for inputtextarea has autoresize as a string in the example it should be a boolean environment n a reproducer no response angular version primeng version build runtime angular cli app language all node version for aot issues node version browser s no response steps to reproduce the behavior no response expected behavior no response | 0 |
372,024 | 11,008,034,006 | IssuesEvent | 2019-12-04 09:44:38 | webcompat/web-bugs | https://api.github.com/repos/webcompat/web-bugs | closed | www.pcgamer.com - see bug description | browser-firefox-mobile engine-gecko priority-important | <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: Unknown
**Problem type**: Something else
**Description**: Autoplay isn't blocked despite my settings
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2019/12/dc2caecf-6804-4448-8edf-43f56168fdc0.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191202144737</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
<p>Console Messages:</p>
<pre>
['[JavaScript Error: "downloadable font: font load failed (font-family: "t" style:normal weight:400 stretch:100 src index:0): status=2147500037 source: data:application/font-woff2,"]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.onesignal.com/sdks/OneSignalSDK.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 198}]', '[console.log(DOMContentLoaded at, 564) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:94]', '[console.log(No archive filter present) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:54:33009]', '[console.debug(Event Tracking driver "ga" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(All Event Tracking drivers initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57435]', '[console.debug(IndexedDB database (fibet, version 4) opened successfully) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58435]', '[console.debug(Event Tracking driver "indexedDB" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(Purging events before 1570268456 (Sat Oct 05 2019 10:40:56 GMT+0100 (British Summer Time))) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:59728]', '[console.debug(Purge complete: 0 records deleted) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:60130]', '[console.debug(Purged old indexedDB entries) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58650]', '[console.log(BordeauxDone at, 893) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:38:425]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X590208%22,%22domains%22:[%22pcgamer.com%22,%22steamcommunity.com%22,%22facebook.com%22,%22twitter.com%22,%22youtube.com%22,%22twitch.tv%22,%22futureplc.com%22,%22send%22,%22reddit.com%22,%22%22,%22steampowered.com%22,%22halowaypoint.com%22,%22futureus.com%22],%22page%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://tags.bkrtx.com/js/bk-coretag.js?referer=." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://js-sec.indexww.com/ht/p/184056-14682440011580.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://c.amazon-adsystem.com/aax2/apstag.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.adsafeprotected.com/iasPET.1.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://securepubads.g.doubleclick.net/tag/js/gpt.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(PageLoad at, 2469) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:516]', '[JavaScript Error: "TypeError: You provided an invalid object where a stream was expected. You can provide an Observable, Promise, Array, or Iterable." {file: "https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js" line: 10}]\nt.subscribeTo@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:84771\nt.subscribeToResult@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:22707\nu</t.prototype._innerSub@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57949\nu</t.prototype._tryNext@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57798\nu</t.prototype._next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57621\np</t.prototype.next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:17378\nt.subscribeToArray/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:83678\ns</e.prototype._trySubscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20957\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20738\nl</e.prototype.call@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57267\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20605\nf/</<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4109\nf/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4121\n', '[JavaScript Error: "ReferenceError: lh0x3b2" {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 9}]', '[console.error(Error loading Bluekai API script -, [object Event], \n, <anonymous> @ 42:342507 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Index Exchange API script: -, [object Event], \n, <anonymous> @ 42:343628 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Amazon A9 API script -, [object Event], \n, <anonymous> @ 42:344720 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading IAS API script -, [object Event], \n, <anonymous> @ 42:345896 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading GPT API script -, [object Event], \n, <anonymous> @ 42:346018 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://googleads.g.doubleclick.net/pagead/id. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.doubleclick.net/instream/ad_status.js." {file: "https://www.youtube.com/embed/04gz8N9i9XI" line: 1}]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(cheerios) https://vanilla.futurecdn.net/pcgamer/147822/media/js/app.js:56:82795]', '[console.log(-RAMP VIDEO- video.setup) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=DBG&r=7086&ad=/10518929/PCGamer_Preroll_Carousel&crid=tag_url." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://ssl.p.jwpcdn.com/player/plugins/googima/v/8.7.6/googima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.adsafeprotected.com/vans-adapter-google-ima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.warn(JW Player Warning 305002. For more information see https://developer.jwplayer.com/jw-player/docs/developer-guide/api/errors-reference#305002) https://content.jwplatform.com/libraries/xRndq6xb.js:11:90821]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(-RAMP VIDEO- Video Viewed, [object Object]) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[console.log(-RAMP VIDEO- -RAMP VIDEO- Refresh) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=VV&r=3528&id=&pdid=&puids=&bid=&cp=&pl=&z=540x304&bdrid=3003&ad=&e=&l=https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://ads.servebom.com/tmntag.js?v=1.0vr&r=1690&o={%22f%22:1,%22p%22:%22%22,%22l%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22,%22tt%22:%22Halo%3A%20Reach%20brings%20the%20series%20back%20to%20PC%20with%20a%20mostly%20fantastic%20port%20%7C%20PC%20Gamer%22,%22fs%22:1,%22a%22:[{%22s%22:%22/10518929/PCGamer_Preroll_Carousel%22,%22z%22:[540,304],%22d%22:%22video_content_718%22,%22g%22:{%22apv%22:1}}],%22t%22:%222019-12-04%2009:41:02%22,%22tz%22:0,%22r%22:%22360x755%22,%22pam%22:%22managed%22}&uuid=d3ab5330976c494ba24a3066b7454025&at=v. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.taboola.com/libtrc/futureplc-pcgamer/loader.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(-RAMP VIDEO- Video error: TypeError: t.pubads is not a function) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | 1.0 | www.pcgamer.com - see bug description - <!-- @browser: Firefox Mobile 68.0 -->
<!-- @ua_header: Mozilla/5.0 (Android 10; Mobile; rv:68.0) Gecko/68.0 Firefox/68.0 -->
<!-- @reported_with: mobile-reporter -->
**URL**: https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb
**Browser / Version**: Firefox Mobile 68.0
**Operating System**: Android
**Tested Another Browser**: Unknown
**Problem type**: Something else
**Description**: Autoplay isn't blocked despite my settings
**Steps to Reproduce**:
[](https://webcompat.com/uploads/2019/12/dc2caecf-6804-4448-8edf-43f56168fdc0.jpeg)
<details>
<summary>Browser Configuration</summary>
<ul>
<li>gfx.webrender.all: false</li><li>gfx.webrender.blob-images: true</li><li>gfx.webrender.enabled: false</li><li>image.mem.shared: true</li><li>buildID: 20191202144737</li><li>channel: beta</li><li>hasTouchScreen: true</li><li>mixed active content blocked: false</li><li>mixed passive content blocked: false</li><li>tracking content blocked: false</li>
</ul>
<p>Console Messages:</p>
<pre>
['[JavaScript Error: "downloadable font: font load failed (font-family: "t" style:normal weight:400 stretch:100 src index:0): status=2147500037 source: data:application/font-woff2,"]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.onesignal.com/sdks/OneSignalSDK.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 198}]', '[console.log(DOMContentLoaded at, 564) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:94]', '[console.log(No archive filter present) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:54:33009]', '[console.debug(Event Tracking driver "ga" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(All Event Tracking drivers initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57435]', '[console.debug(IndexedDB database (fibet, version 4) opened successfully) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58435]', '[console.debug(Event Tracking driver "indexedDB" initialised) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:57008]', '[console.debug(Purging events before 1570268456 (Sat Oct 05 2019 10:40:56 GMT+0100 (British Summer Time))) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:59728]', '[console.debug(Purge complete: 0 records deleted) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:60130]', '[console.debug(Purged old indexedDB entries) https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:1:58650]', '[console.log(BordeauxDone at, 893) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:38:425]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://r.skimresources.com/api/?persistence=1&xguid=01BT2SNRZKMTD96W8181AS0KKC&data={%22pubcode%22:%2292X590208%22,%22domains%22:[%22pcgamer.com%22,%22steamcommunity.com%22,%22facebook.com%22,%22twitter.com%22,%22youtube.com%22,%22twitch.tv%22,%22futureplc.com%22,%22send%22,%22reddit.com%22,%22%22,%22steampowered.com%22,%22halowaypoint.com%22,%22futureus.com%22],%22page%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22}&checksum=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://tags.bkrtx.com/js/bk-coretag.js?referer=." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://js-sec.indexww.com/ht/p/184056-14682440011580.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://c.amazon-adsystem.com/aax2/apstag.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.adsafeprotected.com/iasPET.1.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://securepubads.g.doubleclick.net/tag/js/gpt.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(PageLoad at, 2469) https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb:37:516]', '[JavaScript Error: "TypeError: You provided an invalid object where a stream was expected. You can provide an Observable, Promise, Array, or Iterable." {file: "https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js" line: 10}]\nt.subscribeTo@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:84771\nt.subscribeToResult@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:22707\nu</t.prototype._innerSub@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57949\nu</t.prototype._tryNext@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57798\nu</t.prototype._next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57621\np</t.prototype.next@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:17378\nt.subscribeToArray/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:83678\ns</e.prototype._trySubscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20957\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20738\nl</e.prototype.call@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:57267\ns</e.prototype.subscribe@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:10:20605\nf/</<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4109\nf/<@https://vanilla.futurecdn.net/pcgamer/147822/media/js/main.min.js:69:4121\n', '[JavaScript Error: "ReferenceError: lh0x3b2" {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 9}]', '[console.error(Error loading Bluekai API script -, [object Event], \n, <anonymous> @ 42:342507 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Index Exchange API script: -, [object Event], \n, <anonymous> @ 42:343628 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading Amazon A9 API script -, [object Event], \n, <anonymous> @ 42:344720 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading IAS API script -, [object Event], \n, <anonymous> @ 42:345896 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.error(Error loading GPT API script -, [object Event], \n, <anonymous> @ 42:346018 in file: https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:42) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:40208]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://googleads.g.doubleclick.net/pagead/id. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.doubleclick.net/instream/ad_status.js." {file: "https://www.youtube.com/embed/04gz8N9i9XI" line: 1}]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(cheerios) https://vanilla.futurecdn.net/pcgamer/147822/media/js/app.js:56:82795]', '[console.log(-RAMP VIDEO- video.setup) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=DBG&r=7086&ad=/10518929/PCGamer_Preroll_Carousel&crid=tag_url." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://ssl.p.jwpcdn.com/player/plugins/googima/v/8.7.6/googima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Loading failed for the <script> with source https://static.adsafeprotected.com/vans-adapter-google-ima.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.warn(JW Player Warning 305002. For more information see https://developer.jwplayer.com/jw-player/docs/developer-guide/api/errors-reference#305002) https://content.jwplatform.com/libraries/xRndq6xb.js:11:90821]', '[console.log(Hawk: No GA tracker is available) https://hawk.pcgamer.com/js/w/pcg.js:1:9592]', '[console.log(-RAMP VIDEO- Video Viewed, [object Object]) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[console.log(-RAMP VIDEO- -RAMP VIDEO- Refresh) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]', '[JavaScript Warning: "Loading failed for the <script> with source https://ads2.servebom.com/event.js?t=VV&r=3528&id=&pdid=&puids=&bid=&cp=&pl=&z=540x304&bdrid=3003&ad=&e=&l=https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[JavaScript Warning: "Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://ads.servebom.com/tmntag.js?v=1.0vr&r=1690&o={%22f%22:1,%22p%22:%22%22,%22l%22:%22https%3A%2F%2Fwww.pcgamer.com%2Fhalo-reach-pc-port-impressions%2F%3Futm_content%3Dbuffere4f3a%26utm_medium%3Dsocial%26utm_source%3Dfacebook%26utm_campaign%3Dbuffer_pcgamerfb%22,%22tt%22:%22Halo%3A%20Reach%20brings%20the%20series%20back%20to%20PC%20with%20a%20mostly%20fantastic%20port%20%7C%20PC%20Gamer%22,%22fs%22:1,%22a%22:[{%22s%22:%22/10518929/PCGamer_Preroll_Carousel%22,%22z%22:[540,304],%22d%22:%22video_content_718%22,%22g%22:{%22apv%22:1}}],%22t%22:%222019-12-04%2009:41:02%22,%22tz%22:0,%22r%22:%22360x755%22,%22pam%22:%22managed%22}&uuid=d3ab5330976c494ba24a3066b7454025&at=v. (Reason: CORS request did not succeed)."]', '[JavaScript Warning: "Loading failed for the <script> with source https://cdn.taboola.com/libtrc/futureplc-pcgamer/loader.js." {file: "https://www.pcgamer.com/halo-reach-pc-port-impressions/?utm_content=buffere4f3a&utm_medium=social&utm_source=facebook&utm_campaign=buffer_pcgamerfb" line: 1}]', '[console.log(-RAMP VIDEO- Video error: TypeError: t.pubads is not a function) https://vanilla.futurecdn.net/pcgamer/147822/media/js/header/header.js:16:26478]']
</pre>
</details>
_From [webcompat.com](https://webcompat.com/) with โค๏ธ_ | priority | see bug description url browser version firefox mobile operating system android tested another browser unknown problem type something else description autoplay isn t blocked despite my settings steps to reproduce browser configuration gfx webrender all false gfx webrender blob images true gfx webrender enabled false image mem shared true buildid channel beta hastouchscreen true mixed active content blocked false mixed passive content blocked false tracking content blocked false console messages reason cors request did not succeed nt subscribeto n in file n in file n in file n in file n in file content uuid at v reason cors request did not succeed from with โค๏ธ | 1 |
183,907 | 31,788,945,468 | IssuesEvent | 2023-09-13 00:36:32 | bcgov/cas-registration | https://api.github.com/repos/bcgov/cas-registration | opened | Incorporate Opt-in workflows into the design | Backlog Refinement Moose ๐ฆ UX Research UX Design | #### Describe the task
Context (to be refined) below:
> **Hanna:** Hi Scrum Team, it seems like there's been a decision in the business area that industrial operations will be allowed to opt in starting in the first year, i.e. at the same time as the other OBPS registrants. We will need to account for this in the Registration App. The implications I can think of off the top of my head are:
-we'll probably need some checkbox to indicate an opt-in (not sure at what stage, i.e. user access approval, operator, operation?)
-we may need to collect additional data from an opt-in, e.g. the BA seems to indicate that they will need to demonstrate that they are ready to participate - we should find out how that demonstration should happen and whether we need to support that in the app. E.g. an additional form they need to fill out, or attach a document, or sign something, etc.
These are initial thoughts ... we should add this to things to discuss with business area.
> **Patricia:** I was able to confirm that Adria made this decision official, so yes, Opt-ins (smaller industry under 10KT) can apply to participate in OBPS. The process will include first applying to the Director (Adria), who will confirm whether or not they can join. Once approved by the Director, they should be allowed to register in (mostly?) the same manner as Regulated Operations and will also received a carbon tax exemption the same way. Apparently Opt-ins will have until Feb 2024 to apply. More info to come on this as we learn more!!
> **Dylan:** Something to consider is an allow-list for operators. Not totally sure if it would work for our use case, but if some operators need to be approved by adria, we'll probably have to record that approval somehow (either online or offline).
#### Acceptance Criteria
- [ ] Review relevant slide in the [Sep 21 Registration Engagement deck](https://bcgov.sharepoint.com/:p:/r/teams/06817/_layouts/15/Doc.aspx?sourcedoc=%7B5E09142A-804F-4603-A130-7F6CD00F9552%7D&file=Sept%2021%20-%20Reg%20engagement%20deck.pptx&wdLOR=c91DBA20A-8069-B74B-AF54-24337EBD6CD2&action=edit&mobileredirect=true)
- [ ] Create wireframes for the features/workflows Opt-ins in Figma
- [ ] Get input from the business area
- [ ] Refine design based on the input gathered
#### Additional context
| 1.0 | Incorporate Opt-in workflows into the design - #### Describe the task
Context (to be refined) below:
> **Hanna:** Hi Scrum Team, it seems like there's been a decision in the business area that industrial operations will be allowed to opt in starting in the first year, i.e. at the same time as the other OBPS registrants. We will need to account for this in the Registration App. The implications I can think of off the top of my head are:
-we'll probably need some checkbox to indicate an opt-in (not sure at what stage, i.e. user access approval, operator, operation?)
-we may need to collect additional data from an opt-in, e.g. the BA seems to indicate that they will need to demonstrate that they are ready to participate - we should find out how that demonstration should happen and whether we need to support that in the app. E.g. an additional form they need to fill out, or attach a document, or sign something, etc.
These are initial thoughts ... we should add this to things to discuss with business area.
> **Patricia:** I was able to confirm that Adria made this decision official, so yes, Opt-ins (smaller industry under 10KT) can apply to participate in OBPS. The process will include first applying to the Director (Adria), who will confirm whether or not they can join. Once approved by the Director, they should be allowed to register in (mostly?) the same manner as Regulated Operations and will also received a carbon tax exemption the same way. Apparently Opt-ins will have until Feb 2024 to apply. More info to come on this as we learn more!!
> **Dylan:** Something to consider is an allow-list for operators. Not totally sure if it would work for our use case, but if some operators need to be approved by adria, we'll probably have to record that approval somehow (either online or offline).
#### Acceptance Criteria
- [ ] Review relevant slide in the [Sep 21 Registration Engagement deck](https://bcgov.sharepoint.com/:p:/r/teams/06817/_layouts/15/Doc.aspx?sourcedoc=%7B5E09142A-804F-4603-A130-7F6CD00F9552%7D&file=Sept%2021%20-%20Reg%20engagement%20deck.pptx&wdLOR=c91DBA20A-8069-B74B-AF54-24337EBD6CD2&action=edit&mobileredirect=true)
- [ ] Create wireframes for the features/workflows Opt-ins in Figma
- [ ] Get input from the business area
- [ ] Refine design based on the input gathered
#### Additional context
| non_priority | incorporate opt in workflows into the design describe the task context to be refined below hanna hi scrum team it seems like there s been a decision in the business area that industrial operations will be allowed to opt in starting in the first year i e at the same time as the other obps registrants we will need to account for this in the registration app the implications i can think of off the top of my head are we ll probably need some checkbox to indicate an opt in not sure at what stage i e user access approval operator operation we may need to collect additional data from an opt in e g the ba seems to indicate that they will need to demonstrate that they are ready to participate we should find out how that demonstration should happen and whether we need to support that in the app e g an additional form they need to fill out or attach a document or sign something etc these are initial thoughts we should add this to things to discuss with business area patricia i was able to confirm that adria made this decision official so yes opt ins smaller industry under can apply to participate in obps the process will include first applying to the director adria who will confirm whether or not they can join once approved by the director they should be allowed to register in mostly the same manner as regulated operations and will also received a carbon tax exemption the same way apparently opt ins will have until feb to apply more info to come on this as we learn more dylan something to consider is an allow list for operators not totally sure if it would work for our use case but if some operators need to be approved by adria we ll probably have to record that approval somehow either online or offline acceptance criteria review relevant slide in the create wireframes for the features workflows opt ins in figma get input from the business area refine design based on the input gathered additional context | 0 |
265,393 | 8,353,762,047 | IssuesEvent | 2018-10-02 11:09:54 | handsontable/handsontable | https://api.github.com/repos/handsontable/handsontable | closed | [Column sorting] New, inserted row breaks the table data | Plugin: column sorting Priority: high Regression Status: Released | ### Description
After creating new rows, Handsontable breaks the dataset.
### Steps to reproduce
<!--- Provide steps to reproduce this issue -->
1. Insert new row when the `columnSorting` plugin is enabled.
2. You can see broken dataset (first row with improper data).

### Your environment
* Handsontable version: 6.0.0
| 1.0 | [Column sorting] New, inserted row breaks the table data - ### Description
After creating new rows, Handsontable breaks the dataset.
### Steps to reproduce
<!--- Provide steps to reproduce this issue -->
1. Insert new row when the `columnSorting` plugin is enabled.
2. You can see broken dataset (first row with improper data).

### Your environment
* Handsontable version: 6.0.0
| priority | new inserted row breaks the table data description after creating new rows handsontable breaks the dataset steps to reproduce insert new row when the columnsorting plugin is enabled you can see broken dataset first row with improper data your environment handsontable version | 1 |
132,560 | 18,268,766,958 | IssuesEvent | 2021-10-04 11:36:36 | artsking/linux-3.0.35 | https://api.github.com/repos/artsking/linux-3.0.35 | opened | CVE-2021-20261 (Medium) detected in linux-stable-rtv3.8.6 | security vulnerability | ## CVE-2021-20261 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/artsking/linux-3.0.35/commit/5992fa81c6ac1b4e9db13f5408d914525c5b7875">5992fa81c6ac1b4e9db13f5408d914525c5b7875</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.
<p>Publish Date: 2021-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20261>CVE-2021-20261</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-20261">https://www.linuxkernelcves.com/cves/CVE-2021-20261</a></p>
<p>Release Date: 2021-03-11</p>
<p>Fix Resolution: v4.4.262</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | True | CVE-2021-20261 (Medium) detected in linux-stable-rtv3.8.6 - ## CVE-2021-20261 - Medium Severity Vulnerability
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Library - <b>linux-stable-rtv3.8.6</b></p></summary>
<p>
<p>Julia Cartwright's fork of linux-stable-rt.git</p>
<p>Library home page: <a href=https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git>https://git.kernel.org/pub/scm/linux/kernel/git/julia/linux-stable-rt.git</a></p>
<p>Found in HEAD commit: <a href="https://github.com/artsking/linux-3.0.35/commit/5992fa81c6ac1b4e9db13f5408d914525c5b7875">5992fa81c6ac1b4e9db13f5408d914525c5b7875</a></p>
<p>Found in base branch: <b>master</b></p></p>
</details>
</p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/vulnerability_details.png' width=19 height=20> Vulnerable Source Files (3)</summary>
<p></p>
<p>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b>
<img src='https://s3.amazonaws.com/wss-public/bitbucketImages/xRedImage.png' width=19 height=20> <b>/drivers/block/floppy.c</b>
</p>
</details>
<p></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/medium_vul.png' width=19 height=20> Vulnerability Details</summary>
<p>
A race condition was found in the Linux kernels implementation of the floppy disk drive controller driver software. The impact of this issue is lessened by the fact that the default permissions on the floppy device (/dev/fd0) are restricted to root. If the permissions on the device have changed the impact changes greatly. In the default configuration root (or equivalent) permissions are required to attack this flaw.
<p>Publish Date: 2021-03-11
<p>URL: <a href=https://vuln.whitesourcesoftware.com/vulnerability/CVE-2021-20261>CVE-2021-20261</a></p>
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/cvss3.png' width=19 height=20> CVSS 3 Score Details (<b>6.4</b>)</summary>
<p>
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Local
- Attack Complexity: High
- Privileges Required: High
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
</p>
For more information on CVSS3 Scores, click <a href="https://www.first.org/cvss/calculator/3.0">here</a>.
</p>
</details>
<p></p>
<details><summary><img src='https://whitesource-resources.whitesourcesoftware.com/suggested_fix.png' width=19 height=20> Suggested Fix</summary>
<p>
<p>Type: Upgrade version</p>
<p>Origin: <a href="https://www.linuxkernelcves.com/cves/CVE-2021-20261">https://www.linuxkernelcves.com/cves/CVE-2021-20261</a></p>
<p>Release Date: 2021-03-11</p>
<p>Fix Resolution: v4.4.262</p>
</p>
</details>
<p></p>
***
Step up your Open Source Security Game with WhiteSource [here](https://www.whitesourcesoftware.com/full_solution_bolt_github) | non_priority | cve medium detected in linux stable cve medium severity vulnerability vulnerable library linux stable julia cartwright s fork of linux stable rt git library home page a href found in head commit a href found in base branch master vulnerable source files drivers block floppy c drivers block floppy c drivers block floppy c vulnerability details a race condition was found in the linux kernels implementation of the floppy disk drive controller driver software the impact of this issue is lessened by the fact that the default permissions on the floppy device dev are restricted to root if the permissions on the device have changed the impact changes greatly in the default configuration root or equivalent permissions are required to attack this flaw publish date url a href cvss score details base score metrics exploitability metrics attack vector local attack complexity high privileges required high user interaction none scope unchanged impact metrics confidentiality impact high integrity impact high availability impact high for more information on scores click a href suggested fix type upgrade version origin a href release date fix resolution step up your open source security game with whitesource | 0 |
40,558 | 10,549,748,713 | IssuesEvent | 2019-10-03 09:26:38 | godotengine/godot | https://api.github.com/repos/godotengine/godot | closed | Many compilation warnings | bug topic:buildsystem | **Godot version:**
Latest master #7b64a24
**OS version:**
MacOSX Mojave
Scons v3.0.1
**Issue description:**
there are many compilation warnings:
```
thirdparty/bullet/LinearMath/btVector3.h:335:7: warning: argument value 10880 is outside the valid range [0, 255] [-Wargument-outside-range]
y = bt_splat_ps(y, 0x80);
^~~~~~~~~~~~~~~~~~~~
thirdparty/bullet/LinearMath/btVector3.h:43:29: note: expanded from macro 'bt_splat_ps'
#define bt_splat_ps(_a, _i) bt_pshufd_ps((_a), BT_SHUFFLE(_i, _i, _i, _i))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
thirdparty/bullet/LinearMath/btVector3.h:41:33: note: expanded from macro 'bt_pshufd_ps'
#define bt_pshufd_ps(_a, _mask) _mm_shuffle_ps((_a), (_a), (_mask))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
```
**Steps to reproduce:**
Try compile source
| 1.0 | Many compilation warnings - **Godot version:**
Latest master #7b64a24
**OS version:**
MacOSX Mojave
Scons v3.0.1
**Issue description:**
there are many compilation warnings:
```
thirdparty/bullet/LinearMath/btVector3.h:335:7: warning: argument value 10880 is outside the valid range [0, 255] [-Wargument-outside-range]
y = bt_splat_ps(y, 0x80);
^~~~~~~~~~~~~~~~~~~~
thirdparty/bullet/LinearMath/btVector3.h:43:29: note: expanded from macro 'bt_splat_ps'
#define bt_splat_ps(_a, _i) bt_pshufd_ps((_a), BT_SHUFFLE(_i, _i, _i, _i))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
thirdparty/bullet/LinearMath/btVector3.h:41:33: note: expanded from macro 'bt_pshufd_ps'
#define bt_pshufd_ps(_a, _mask) _mm_shuffle_ps((_a), (_a), (_mask))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
```
**Steps to reproduce:**
Try compile source
| non_priority | many compilation warnings godot version latest master os version macosx mojave scons issue description there are many compilation warnings thirdparty bullet linearmath h warning argument value is outside the valid range y bt splat ps y thirdparty bullet linearmath h note expanded from macro bt splat ps define bt splat ps a i bt pshufd ps a bt shuffle i i i i thirdparty bullet linearmath h note expanded from macro bt pshufd ps define bt pshufd ps a mask mm shuffle ps a a mask steps to reproduce try compile source | 0 |
458,160 | 13,170,060,380 | IssuesEvent | 2020-08-11 14:38:06 | magento/magento2 | https://api.github.com/repos/magento/magento2 | closed | M 2.4.0 upgrading issue - Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary | Fixed in 2.4.x Issue: Format is not valid Priority: P1 Progress: done Reproduced on 2.4.x Severity: S0 | ### Preconditions
Install Magento 2.3.5 CE using composer
### Steps to reproduce
1. Run SQL command
```sql
INSERT INTO review*entity*summary
(`entity*pk_value`, `entity_type`, `reviews_count`, `rating_summary`, `store*id`)
VALUES (1, 1, 1, 1, 1),(1, 1, 1, 2, 1);
{code}
1. Follow a general upgrade flow <https://devdocs.magento.com/guides/v2.4/comp-mgr/cli/cli-upgrade.html] and upgrade to 2.4.0
(<ins>) Upgrade completed successfully
(-)
{code:bash}
Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento*Review. Original exception message: Warning: preg*match(): Compilation failed: invalid range in character class at offset 40 in /Users/max/srv/composer/m2ee.composer/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779
{code}
**Overview**:
When upgrading from 2.3.5 to 2.4.0 and running **php bin/magento setup:upgrade**, the following error appears:
*Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento_Review. Original exception message: Warning: preg_match(): Compilation failed: invalid range in character class at offset 40 in /home/babygear/www/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779*
Thisย issue is caused by a regular expression used in Magento code, which is not compatible with PHP 7.3 and PHP 7.4ย
{code:bash}
#SQLSTATE\[23000\]: [<sup>:]</ins>: 1062[</sup>\']<ins>\'([\d-\.]</ins>)\'#
```
ย
Please find more details here [https://github.com/magento/magento2/issues/29352>
ย | 1.0 | M 2.4.0 upgrading issue - Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary - ### Preconditions
Install Magento 2.3.5 CE using composer
### Steps to reproduce
1. Run SQL command
```sql
INSERT INTO review*entity*summary
(`entity*pk_value`, `entity_type`, `reviews_count`, `rating_summary`, `store*id`)
VALUES (1, 1, 1, 1, 1),(1, 1, 1, 2, 1);
{code}
1. Follow a general upgrade flow <https://devdocs.magento.com/guides/v2.4/comp-mgr/cli/cli-upgrade.html] and upgrade to 2.4.0
(<ins>) Upgrade completed successfully
(-)
{code:bash}
Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento*Review. Original exception message: Warning: preg*match(): Compilation failed: invalid range in character class at offset 40 in /Users/max/srv/composer/m2ee.composer/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779
{code}
**Overview**:
When upgrading from 2.3.5 to 2.4.0 and running **php bin/magento setup:upgrade**, the following error appears:
*Unable to apply patch Magento\Review\Setup\Patch\Schema\AddUniqueConstraintToReviewEntitySummary for module Magento_Review. Original exception message: Warning: preg_match(): Compilation failed: invalid range in character class at offset 40 in /home/babygear/www/vendor/magento/framework/DB/Adapter/Pdo/Mysql.php on line 2779*
Thisย issue is caused by a regular expression used in Magento code, which is not compatible with PHP 7.3 and PHP 7.4ย
{code:bash}
#SQLSTATE\[23000\]: [<sup>:]</ins>: 1062[</sup>\']<ins>\'([\d-\.]</ins>)\'#
```
ย
Please find more details here [https://github.com/magento/magento2/issues/29352>
ย | priority | m upgrading issue unable to apply patch magento review setup patch schema adduniqueconstrainttoreviewentitysummary preconditions install magento ce using composer steps to reproduce run sql command sql insert into review entity summary entity pk value entity type reviews count rating summary store id values code follow a general upgrade flow and upgrade to upgrade completed successfully code bash unable to apply patch magento review setup patch schema adduniqueconstrainttoreviewentitysummary for module magento review original exception message warning preg match compilation failed invalid range in character class at offset in users max srv composer composer vendor magento framework db adapter pdo mysql php on line code overview when upgrading from to and running php bin magento setup upgrade the following error appears unable to apply patch magento review setup patch schema adduniqueconstrainttoreviewentitysummary for module magento review original exception message warning preg match compilation failed invalid range in character class at offset in home babygear www vendor magento framework db adapter pdo mysql php on line thisย issue is caused by a regular expression used in magento code which is not compatible with php and php ย code bash sqlstate ย please find more details here ย | 1 |
33,931 | 4,866,112,677 | IssuesEvent | 2016-11-14 22:41:36 | part-up/part-up | https://api.github.com/repos/part-up/part-up | closed | disable /start | Acceptance test finding enhancement | #688 removed the start a part-up link in the global header. We should also disable the direct url to prevent mistakes by users.
| 1.0 | disable /start - #688 removed the start a part-up link in the global header. We should also disable the direct url to prevent mistakes by users.
| non_priority | disable start removed the start a part up link in the global header we should also disable the direct url to prevent mistakes by users | 0 |
118,189 | 4,732,918,810 | IssuesEvent | 2016-10-19 09:27:36 | bespokeinteractive/mchapp | https://api.github.com/repos/bespokeinteractive/mchapp | closed | ANC clinic> Add Tetanus immunization: the system gives this error โSaving Failed! Internal Server Errorโ | bug High Priority | ANC clinic> Add Tetanus immunization: the system gives this error โSaving Failed! Internal Server Errorโ
Suggestion
---------------
Allow updating of tetanus vaccine administered to the ANC patient.
Display a pop-up message "tetanus vaccine updated successfully" on successfully updating the vaccine details. | 1.0 | ANC clinic> Add Tetanus immunization: the system gives this error โSaving Failed! Internal Server Errorโ - ANC clinic> Add Tetanus immunization: the system gives this error โSaving Failed! Internal Server Errorโ
Suggestion
---------------
Allow updating of tetanus vaccine administered to the ANC patient.
Display a pop-up message "tetanus vaccine updated successfully" on successfully updating the vaccine details. | priority | anc clinic add tetanus immunization the system gives this error โsaving failed internal server errorโ anc clinic add tetanus immunization the system gives this error โsaving failed internal server errorโ suggestion allow updating of tetanus vaccine administered to the anc patient display a pop up message tetanus vaccine updated successfully on successfully updating the vaccine details | 1 |
539,351 | 15,787,235,798 | IssuesEvent | 2021-04-01 18:55:07 | metabase/metabase | https://api.github.com/repos/metabase/metabase | closed | Time is showing 24:00 instead of 00:00 | Customization/Formatting Priority:P2 Type:Bug Visualization/ | ### Bugs
timedate shows 24:xx instead of 00:xx.
- Firefox 66.0b14 (64-bit)
- Debian 9
- Postgres
- Metabase v0.31.2
- hosted in Debian 9
- H2 database
#### Repeatable steps to reproduce the issue*
Set the date in a table to display in yyyy-m-d h:m:s 24 hour format.
Look at a datetime with the time in 00:xx range. See 24:xx instead of 00:xx

:arrow_down: Please click the :+1: reaction instead of leaving a `+1` or `update?` comment | 1.0 | Time is showing 24:00 instead of 00:00 - ### Bugs
timedate shows 24:xx instead of 00:xx.
- Firefox 66.0b14 (64-bit)
- Debian 9
- Postgres
- Metabase v0.31.2
- hosted in Debian 9
- H2 database
#### Repeatable steps to reproduce the issue*
Set the date in a table to display in yyyy-m-d h:m:s 24 hour format.
Look at a datetime with the time in 00:xx range. See 24:xx instead of 00:xx

:arrow_down: Please click the :+1: reaction instead of leaving a `+1` or `update?` comment | priority | time is showing instead of bugs timedate shows xx instead of xx firefox bit debian postgres metabase hosted in debian database repeatable steps to reproduce the issue set the date in a table to display in yyyy m d h m s hour format look at a datetime with the time in xx range see xx instead of xx arrow down please click the reaction instead of leaving a or update comment | 1 |
579,413 | 17,191,053,739 | IssuesEvent | 2021-07-16 11:00:55 | thoth-station/kebechet | https://api.github.com/repos/thoth-station/kebechet | reopened | Improve formatting of changelog computed | #hacktoberfest good first issue hacktoberfest kind/feature priority/important-soon | **Is your feature request related to a problem? Please describe.**
The current formatting is not very pretty - especially when smart changelog entries are computed. It would be nice to revisit formatting and make it prettier for users. | 1.0 | Improve formatting of changelog computed - **Is your feature request related to a problem? Please describe.**
The current formatting is not very pretty - especially when smart changelog entries are computed. It would be nice to revisit formatting and make it prettier for users. | priority | improve formatting of changelog computed is your feature request related to a problem please describe the current formatting is not very pretty especially when smart changelog entries are computed it would be nice to revisit formatting and make it prettier for users | 1 |
343,798 | 10,336,590,178 | IssuesEvent | 2019-09-03 13:17:17 | wherebyus/general-tasks | https://api.github.com/repos/wherebyus/general-tasks | closed | We need to add Call To Action to the Event model, then add that choice for inline events in promos | Priority: High Product: Events UX: Not Validated | ## Feature or problem
- [ ] Update the event model with a `callToAction` property
- [ ] Add call to action to the inline event editor in promos
- [ ] Update the AggregateEvent component to handle a `callToAction` property
## UX Validation
Not Validated
### Suggested priority
High
### Stakeholders
*Submitted:* michael
### Definition of done
How will we know when this feature is complete?
### Subtasks
A detailed list of changes that need to be made or subtasks. One checkbox per.
- [ ] Brew the coffee
## Developer estimate
To help the team accurately estimate the complexity of this task,
take a moment to walk through this list and estimate each item. At the end, you can total
the estimates and round to the nearest prime number.
If any of these are at a `5` or higher, or if the total is above a `5`, consider breaking
this issue into multiple smaller issues.
- [ ] Changes to the database ()
- [ ] Changes to the API ()
- [ ] Testing Changes to the API ()
- [ ] Changes to Application Code ()
- [ ] Adding or updating unit tests ()
- [ ] Local developer testing ()
### Total developer estimate: 0
## Additional estimate
- [ ] Code review ()
- [ ] QA Testing ()
- [ ] Stakeholder Sign-off ()
- [ ] Deploy to Production ()
### Total additional estimate: 5
## QA Notes
Detailed instructions for testing, one checkbox per test to be completed.
### Contextual tests
- [ ] Accessibility check
- [ ] Cross-browser check (Edge, Chrome, Firefox)
- [ ] Responsive check
| 1.0 | We need to add Call To Action to the Event model, then add that choice for inline events in promos - ## Feature or problem
- [ ] Update the event model with a `callToAction` property
- [ ] Add call to action to the inline event editor in promos
- [ ] Update the AggregateEvent component to handle a `callToAction` property
## UX Validation
Not Validated
### Suggested priority
High
### Stakeholders
*Submitted:* michael
### Definition of done
How will we know when this feature is complete?
### Subtasks
A detailed list of changes that need to be made or subtasks. One checkbox per.
- [ ] Brew the coffee
## Developer estimate
To help the team accurately estimate the complexity of this task,
take a moment to walk through this list and estimate each item. At the end, you can total
the estimates and round to the nearest prime number.
If any of these are at a `5` or higher, or if the total is above a `5`, consider breaking
this issue into multiple smaller issues.
- [ ] Changes to the database ()
- [ ] Changes to the API ()
- [ ] Testing Changes to the API ()
- [ ] Changes to Application Code ()
- [ ] Adding or updating unit tests ()
- [ ] Local developer testing ()
### Total developer estimate: 0
## Additional estimate
- [ ] Code review ()
- [ ] QA Testing ()
- [ ] Stakeholder Sign-off ()
- [ ] Deploy to Production ()
### Total additional estimate: 5
## QA Notes
Detailed instructions for testing, one checkbox per test to be completed.
### Contextual tests
- [ ] Accessibility check
- [ ] Cross-browser check (Edge, Chrome, Firefox)
- [ ] Responsive check
| priority | we need to add call to action to the event model then add that choice for inline events in promos feature or problem update the event model with a calltoaction property add call to action to the inline event editor in promos update the aggregateevent component to handle a calltoaction property ux validation not validated suggested priority high stakeholders submitted michael definition of done how will we know when this feature is complete subtasks a detailed list of changes that need to be made or subtasks one checkbox per brew the coffee developer estimate to help the team accurately estimate the complexity of this task take a moment to walk through this list and estimate each item at the end you can total the estimates and round to the nearest prime number if any of these are at a or higher or if the total is above a consider breaking this issue into multiple smaller issues changes to the database changes to the api testing changes to the api changes to application code adding or updating unit tests local developer testing total developer estimate additional estimate code review qa testing stakeholder sign off deploy to production total additional estimate qa notes detailed instructions for testing one checkbox per test to be completed contextual tests accessibility check cross browser check edge chrome firefox responsive check | 1 |
656,894 | 21,779,074,648 | IssuesEvent | 2022-05-13 16:40:05 | WordPress/openverse-frontend | https://api.github.com/repos/WordPress/openverse-frontend | opened | Feedback page contains Content Security Policy violations | ๐ฉ priority: low ๐ goal: fix ๐น aspect: interface ๐จ tech: javascript | ## Description
<!-- Concisely describe the bug. Compare your experience with what you expected to happen. -->
<!-- For example: "I clicked the 'submit' button and instead of seeing a thank you message, I saw a blank page." -->
The feedback page issues warnings about ignored Content Security Policies.
## Reproduction
<!-- Provide detailed steps to reproduce the bug. -->
1. Open the browser console
2. Visit https://search.openverse.engineering/feedback
## Screenshots
<!-- Add screenshots to show the problem; or delete the section entirely. -->

## Additional context
<!-- Add any other context about the problem here; or delete the section entirely. -->
https://sentry.io/share/issue/0d32050590d8435d9a1e898c6c326379/
## Resolution
<!-- Replace the [ ] with [x] to check the box. -->
- [ ] ๐ I would be interested in resolving this bug.
| 1.0 | Feedback page contains Content Security Policy violations - ## Description
<!-- Concisely describe the bug. Compare your experience with what you expected to happen. -->
<!-- For example: "I clicked the 'submit' button and instead of seeing a thank you message, I saw a blank page." -->
The feedback page issues warnings about ignored Content Security Policies.
## Reproduction
<!-- Provide detailed steps to reproduce the bug. -->
1. Open the browser console
2. Visit https://search.openverse.engineering/feedback
## Screenshots
<!-- Add screenshots to show the problem; or delete the section entirely. -->

## Additional context
<!-- Add any other context about the problem here; or delete the section entirely. -->
https://sentry.io/share/issue/0d32050590d8435d9a1e898c6c326379/
## Resolution
<!-- Replace the [ ] with [x] to check the box. -->
- [ ] ๐ I would be interested in resolving this bug.
| priority | feedback page contains content security policy violations description the feedback page issues warnings about ignored content security policies reproduction open the browser console visit screenshots additional context resolution ๐ i would be interested in resolving this bug | 1 |
303,718 | 26,225,475,105 | IssuesEvent | 2023-01-04 18:16:07 | cockroachdb/cockroach | https://api.github.com/repos/cockroachdb/cockroach | reopened | logictest: mixed-version testserver tests are too flaky | C-bug skipped-test T-sql-sessions | According to the stats on https://teamcity.cockroachdb.com/test/2967917534255592156?currentProjectId=Cockroach_Ci_TestsGcpLinuxX8664BigVm&branch=&expandTestHistoryChartSection=true, 98 of the last 255 runs failed. The failure generally is:
```
Failed
=== RUN TestLogic_testserver_test_22_1_22_2
test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_24214293579
test_log_scope.go:79: use -show-logs to present logs inline
logic.go:3045:
/home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/7181/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-fastbuild/bin/pkg/sql/logictest/tests/cockroach-go-testserver-22.1-22.2/cockroach-go-testserver-22_1-22_2_test_/cockroach-go-testserver-22_1-22_2_test.runfiles/com_github_cockroachdb_cockroach/pkg/sql/logictest/testdata/logic_test/testserver_test_22.1_22.2:13: error while processing
logic.go:3045: init did not finish for node 1
```
Jira issue: CRDB-21892 | 1.0 | logictest: mixed-version testserver tests are too flaky - According to the stats on https://teamcity.cockroachdb.com/test/2967917534255592156?currentProjectId=Cockroach_Ci_TestsGcpLinuxX8664BigVm&branch=&expandTestHistoryChartSection=true, 98 of the last 255 runs failed. The failure generally is:
```
Failed
=== RUN TestLogic_testserver_test_22_1_22_2
test_log_scope.go:161: test logs captured to: /artifacts/tmp/_tmp/a0cd2ed7268f1ad03abb8f1d57f5fcc9/logTestLogic_testserver_test_22_1_22_24214293579
test_log_scope.go:79: use -show-logs to present logs inline
logic.go:3045:
/home/roach/.cache/bazel/_bazel_roach/c5a4e7d36696d9cd970af2045211a7df/sandbox/processwrapper-sandbox/7181/execroot/com_github_cockroachdb_cockroach/bazel-out/k8-fastbuild/bin/pkg/sql/logictest/tests/cockroach-go-testserver-22.1-22.2/cockroach-go-testserver-22_1-22_2_test_/cockroach-go-testserver-22_1-22_2_test.runfiles/com_github_cockroachdb_cockroach/pkg/sql/logictest/testdata/logic_test/testserver_test_22.1_22.2:13: error while processing
logic.go:3045: init did not finish for node 1
```
Jira issue: CRDB-21892 | non_priority | logictest mixed version testserver tests are too flaky according to the stats on of the last runs failed the failure generally is failed run testlogic testserver test test log scope go test logs captured to artifacts tmp tmp logtestlogic testserver test test log scope go use show logs to present logs inline logic go home roach cache bazel bazel roach sandbox processwrapper sandbox execroot com github cockroachdb cockroach bazel out fastbuild bin pkg sql logictest tests cockroach go testserver cockroach go testserver test cockroach go testserver test runfiles com github cockroachdb cockroach pkg sql logictest testdata logic test testserver test error while processing logic go init did not finish for node jira issue crdb | 0 |
219,863 | 16,853,750,271 | IssuesEvent | 2021-06-21 01:25:43 | irods/irods | https://api.github.com/repos/irods/irods | closed | Codespell report for "iRODS" (on fossies.org) | bug documentation | The FOSS server [fossies.org](https://fossies.org) - supporting also the [iRODS](https://fossies.org/iRODS) project - offers among others a feature named "[Source code misspelling reports](https://fossies.org/features.html#codespell)". Such reports are normally only generated on request, but as Fossies administrator I have just created for testing purposes such a [codespell](https://github.com/codespell-project/codespell) based analysis for the iRODS GitHub "master" version:
https://fossies.org/linux/test/irods-master.tar.gz/codespell.html
That version independent URL hopefully always redirects to the report for the latest "master" version identified by the short GitHub commit ID and a year-month-day string (YYMMDD) representing the according git pull date (mostly = commit date). The data are residing within a special restricted "test" folder that isn't really integrated into the standard Fossies services and should also not be accessible to search engines. The report should be available at least for some weeks and is continuously updated (currently with a half-hourly refresh rate).
Although after a first review some obviously wrong matches ("False Positives") are already filtered out (ignored) please inform me if you find more of them so that I can exclude them if applicable.
OK, no errors were found in the code itself and most errors are "only" in comments and are therefore not directly visible and relevant to the user, but some are also in output strings. Particularly striking seemed to me the spelling of the variable [${langauge}](https://fossies.org/linux/test/irods-master.tar.gz/codespell.html#langauge).
Just for information there are also three supplemental pages showing some used "codespell" [configuration details](https://fossies.org/linux/test/irods-master.tar.gz/codespell_conf.html), all obvious [false positives](https://fossies.org/linux/test/irods-master.tar.gz/codespell_fps.html) and an [misspelling history](https://fossies.org/linux/test/irods-master.tar.gz/codespell_hist.html) (log).
Spelling corrections certainly have a low priority, but they may also contribute to the overall quality of a software project. | 1.0 | Codespell report for "iRODS" (on fossies.org) - The FOSS server [fossies.org](https://fossies.org) - supporting also the [iRODS](https://fossies.org/iRODS) project - offers among others a feature named "[Source code misspelling reports](https://fossies.org/features.html#codespell)". Such reports are normally only generated on request, but as Fossies administrator I have just created for testing purposes such a [codespell](https://github.com/codespell-project/codespell) based analysis for the iRODS GitHub "master" version:
https://fossies.org/linux/test/irods-master.tar.gz/codespell.html
That version independent URL hopefully always redirects to the report for the latest "master" version identified by the short GitHub commit ID and a year-month-day string (YYMMDD) representing the according git pull date (mostly = commit date). The data are residing within a special restricted "test" folder that isn't really integrated into the standard Fossies services and should also not be accessible to search engines. The report should be available at least for some weeks and is continuously updated (currently with a half-hourly refresh rate).
Although after a first review some obviously wrong matches ("False Positives") are already filtered out (ignored) please inform me if you find more of them so that I can exclude them if applicable.
OK, no errors were found in the code itself and most errors are "only" in comments and are therefore not directly visible and relevant to the user, but some are also in output strings. Particularly striking seemed to me the spelling of the variable [${langauge}](https://fossies.org/linux/test/irods-master.tar.gz/codespell.html#langauge).
Just for information there are also three supplemental pages showing some used "codespell" [configuration details](https://fossies.org/linux/test/irods-master.tar.gz/codespell_conf.html), all obvious [false positives](https://fossies.org/linux/test/irods-master.tar.gz/codespell_fps.html) and an [misspelling history](https://fossies.org/linux/test/irods-master.tar.gz/codespell_hist.html) (log).
Spelling corrections certainly have a low priority, but they may also contribute to the overall quality of a software project. | non_priority | codespell report for irods on fossies org the foss server supporting also the project offers among others a feature named such reports are normally only generated on request but as fossies administrator i have just created for testing purposes such a based analysis for the irods github master version nbsp that version independent url hopefully always redirects to the report for the latest master version identified by the short github commit id and a year month day string yymmdd representing the according git pull date mostly commit date the data are residing within a special restricted test folder that isn t really integrated into the standard fossies services and should also not be accessible to search engines the report should be available at least for some weeks and is continuously updated currently with a half hourly refresh rate although after a first review some obviously wrong matches false positives are already filtered out ignored please inform me if you find more of them so that i can exclude them if applicable ok no errors were found in the code itself and most errors are only in comments and are therefore not directly visible and relevant to the user but some are also in output strings particularly striking seemed to me the spelling of the variable just for information there are also three supplemental pages showing some used codespell all obvious and an log spelling corrections certainly have a low priority but they may also contribute to the overall quality of a software project | 0 |
90,108 | 25,977,413,018 | IssuesEvent | 2022-12-19 15:54:29 | GoogleContainerTools/skaffold | https://api.github.com/repos/GoogleContainerTools/skaffold | closed | Deploy might not work properly warning while building an image | area/build priority/p2 kind/friction | ### Expected behavior
There should not be any "deploy" related warnings if Kubernetes context is not relevant.
Alternatively I expect an option to suppress such warnings.
### Actual behavior
I get the following on `skaffold build`:
```
time="2022-10-22T14:40:11Z" level=warning msg="unable to get the kubectl context's namespace - deploy might not work properly!" subtask=-1 task=DevLoop
```
https://github.com/GoogleContainerTools/skaffold/pull/7965 assumes I do have a configured namespace in the current context. But I don't even have `kubectl` installed in that environment.
### Information
- Skaffold version: 2.0.0
- Operating system: MacOS 12.4
- Installed via: `storage.googleapis.com/skaffold/releases/v2.0.0`
- Contents of skaffold.yaml:
```yaml
apiVersion: skaffold/v3
kind: Config
build:
artifacts:
- image: quay.io/org/project
context: ./docker/project
docker:
dockerfile: Dockerfile
tagPolicy:
customTemplate:
template: prefix-{{.INPUT_DIGEST}}
local:
useBuildkit: false
```
### Steps to reproduce the behavior
1. Prepare `skaffold.yaml`
2. Remove `kubectl` from the PATH
3. Execute `skaffold build`
| 1.0 | Deploy might not work properly warning while building an image - ### Expected behavior
There should not be any "deploy" related warnings if Kubernetes context is not relevant.
Alternatively I expect an option to suppress such warnings.
### Actual behavior
I get the following on `skaffold build`:
```
time="2022-10-22T14:40:11Z" level=warning msg="unable to get the kubectl context's namespace - deploy might not work properly!" subtask=-1 task=DevLoop
```
https://github.com/GoogleContainerTools/skaffold/pull/7965 assumes I do have a configured namespace in the current context. But I don't even have `kubectl` installed in that environment.
### Information
- Skaffold version: 2.0.0
- Operating system: MacOS 12.4
- Installed via: `storage.googleapis.com/skaffold/releases/v2.0.0`
- Contents of skaffold.yaml:
```yaml
apiVersion: skaffold/v3
kind: Config
build:
artifacts:
- image: quay.io/org/project
context: ./docker/project
docker:
dockerfile: Dockerfile
tagPolicy:
customTemplate:
template: prefix-{{.INPUT_DIGEST}}
local:
useBuildkit: false
```
### Steps to reproduce the behavior
1. Prepare `skaffold.yaml`
2. Remove `kubectl` from the PATH
3. Execute `skaffold build`
| non_priority | deploy might not work properly warning while building an image expected behavior there should not be any deploy related warnings if kubernetes context is not relevant alternatively i expect an option to suppress such warnings actual behavior i get the following on skaffold build time level warning msg unable to get the kubectl context s namespace deploy might not work properly subtask task devloop assumes i do have a configured namespace in the current context but i don t even have kubectl installed in that environment information skaffold version operating system macos installed via storage googleapis com skaffold releases contents of skaffold yaml yaml apiversion skaffold kind config build artifacts image quay io org project context docker project docker dockerfile dockerfile tagpolicy customtemplate template prefix input digest local usebuildkit false steps to reproduce the behavior prepare skaffold yaml remove kubectl from the path execute skaffold build | 0 |
7,089 | 16,494,742,023 | IssuesEvent | 2021-05-25 09:05:50 | RasaHQ/rasa | https://api.github.com/repos/RasaHQ/rasa | closed | Prototype Rasa 3.0 Architecture | area:rasa-oss :ferris_wheel: feature:rasa-3.0/architecture-prototype type:enhancement :sparkles: | Following on from discussions about a new Rasa OS architecture for 3.0:
- [Initial concept](https://www.notion.so/rasa/Rasa-Project-26915237c1c74d578af4a44f0df95755)
- [Discussion of current problems](https://www.notion.so/rasa/Rasa-Open-Source-Architecture-Sync-62f864267188476d9108cdeab2b6a5c3)
- [Exploration of related frameworks](https://www.notion.so/rasa/Workflow-Frameworks-Comparison-429eb61f58184be9b0da0280409ceec1#4bd180db123b43e69996cf658935706e)
We would like to build a prototype to assess the new proposed graph architecture.
## Functionality
### Must have:
* train NLU only based on current model config
* train entire model (core + NLU) based on current model config (including e2e)
* load and persist model
* do action predictions
* implement caching / fingerprinting for training
* users are able to speak to model via input channel (only the entire model, not NLU-only)
### Nice to have:
* extract + deduplicate policy featurization
### Don't need:
* `rasa test` , `rasa interactive`
## Implementation details
Following on from a "protoprototype" we have decided to use [Dask](https://dask.org/) for the prototype.
Dask allows for lightweight task graphs to be created and then run on arbitrary backends (e.g. single thread, multi-process, distributed cluster). It also includes a huge amount of plug and play functionality which can all be used optionally.
It seems to fit the balance of providing a lot of useful hard-to-do functionality, but not being too heavyweight or opinionated. Rather than being a full framework, it is a collection of useful related utilities.
## TODO
- [x] Prototype for the prototype. Initial sanity check and exploration to determine whether a full prototype is possible.
- [x] [Train NLU model](https://github.com/RasaHQ/rasa/issues/8408)
- [ ] [Derive training graph from current NLU config](https://github.com/RasaHQ/rasa/issues/8409)
- [ ] [Train entire model](https://github.com/RasaHQ/rasa/issues/8410)
- [ ] [Make action predictions with graph model](https://github.com/RasaHQ/rasa/issues/8412)
- [ ] [Derive training graph from current model config](https://github.com/RasaHQ/rasa/issues/8411)
- [ ] [Derive prediction graph from training graph or current config format](https://github.com/RasaHQ/rasa/issues/8414)
- [ ] [Persist and load model trained from graph](https://github.com/RasaHQ/rasa/issues/8404)
- [ ] [Implement caching / fingerprinting for training](https://github.com/RasaHQ/rasa/issues/8405)
- [ ] [Integrate graph model in server](https://github.com/RasaHQ/rasa/issues/8406)
- [ ] [Test with realistic dataset](https://github.com/RasaHQ/rasa/issues/8488)
- [ ] [Explore partial dataset loading for NLU graph](https://github.com/RasaHQ/rasa/issues/8407) (Thomas)
## Time estimation: 4 weeks | 1.0 | Prototype Rasa 3.0 Architecture - Following on from discussions about a new Rasa OS architecture for 3.0:
- [Initial concept](https://www.notion.so/rasa/Rasa-Project-26915237c1c74d578af4a44f0df95755)
- [Discussion of current problems](https://www.notion.so/rasa/Rasa-Open-Source-Architecture-Sync-62f864267188476d9108cdeab2b6a5c3)
- [Exploration of related frameworks](https://www.notion.so/rasa/Workflow-Frameworks-Comparison-429eb61f58184be9b0da0280409ceec1#4bd180db123b43e69996cf658935706e)
We would like to build a prototype to assess the new proposed graph architecture.
## Functionality
### Must have:
* train NLU only based on current model config
* train entire model (core + NLU) based on current model config (including e2e)
* load and persist model
* do action predictions
* implement caching / fingerprinting for training
* users are able to speak to model via input channel (only the entire model, not NLU-only)
### Nice to have:
* extract + deduplicate policy featurization
### Don't need:
* `rasa test` , `rasa interactive`
## Implementation details
Following on from a "protoprototype" we have decided to use [Dask](https://dask.org/) for the prototype.
Dask allows for lightweight task graphs to be created and then run on arbitrary backends (e.g. single thread, multi-process, distributed cluster). It also includes a huge amount of plug and play functionality which can all be used optionally.
It seems to fit the balance of providing a lot of useful hard-to-do functionality, but not being too heavyweight or opinionated. Rather than being a full framework, it is a collection of useful related utilities.
## TODO
- [x] Prototype for the prototype. Initial sanity check and exploration to determine whether a full prototype is possible.
- [x] [Train NLU model](https://github.com/RasaHQ/rasa/issues/8408)
- [ ] [Derive training graph from current NLU config](https://github.com/RasaHQ/rasa/issues/8409)
- [ ] [Train entire model](https://github.com/RasaHQ/rasa/issues/8410)
- [ ] [Make action predictions with graph model](https://github.com/RasaHQ/rasa/issues/8412)
- [ ] [Derive training graph from current model config](https://github.com/RasaHQ/rasa/issues/8411)
- [ ] [Derive prediction graph from training graph or current config format](https://github.com/RasaHQ/rasa/issues/8414)
- [ ] [Persist and load model trained from graph](https://github.com/RasaHQ/rasa/issues/8404)
- [ ] [Implement caching / fingerprinting for training](https://github.com/RasaHQ/rasa/issues/8405)
- [ ] [Integrate graph model in server](https://github.com/RasaHQ/rasa/issues/8406)
- [ ] [Test with realistic dataset](https://github.com/RasaHQ/rasa/issues/8488)
- [ ] [Explore partial dataset loading for NLU graph](https://github.com/RasaHQ/rasa/issues/8407) (Thomas)
## Time estimation: 4 weeks | non_priority | prototype rasa architecture following on from discussions about a new rasa os architecture for we would like to build a prototype to assess the new proposed graph architecture functionality must have train nlu only based on current model config train entire model core nlu based on current model config including load and persist model do action predictions implement caching fingerprinting for training users are able to speak to model via input channel only the entire model not nlu only nice to have extract deduplicate policy featurization don t need rasa test rasa interactive implementation details following on from a protoprototype we have decided to use for the prototype dask allows for lightweight task graphs to be created and then run on arbitrary backends e g single thread multi process distributed cluster it also includes a huge amount of plug and play functionality which can all be used optionally it seems to fit the balance of providing a lot of useful hard to do functionality but not being too heavyweight or opinionated rather than being a full framework it is a collection of useful related utilities todo prototype for the prototype initial sanity check and exploration to determine whether a full prototype is possible thomas time estimation weeks | 0 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.